p: 0xc000bcf170 37 D0318 16:20:32.664810 355572 usertrap_amd64.go:225] [ 4396( 18): 4396( 18)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:32.666082 355572 usertrap_amd64.go:212] [ 4392( 668): 4392( 668)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:32.666152 355572 usertrap_amd64.go:122] [ 4392( 668): 4392( 668)] Allocate a new trap: 0xc0078f6300 43 D0318 16:20:32.666222 355572 usertrap_amd64.go:225] [ 4392( 668): 4392( 668)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:32.670304 355572 task_exit.go:204] [ 4392( 668): 4392( 668)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.670569 355572 task_signals.go:204] [ 4392( 668): 4397( 669)] Signal 9, PID: 4392, TID: 4397, fault addr: 0x0: terminating thread group D0318 16:20:32.671042 355572 task_exit.go:204] [ 4392( 668): 4392( 668)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.671101 355572 usertrap_amd64.go:212] [ 4395(1083): 4395(1083)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:32.671175 355572 usertrap_amd64.go:122] [ 4395(1083): 4395(1083)] Allocate a new trap: 0xc005e17020 39 D0318 16:20:32.671244 355572 task_exit.go:204] [ 4392( 668): 4397( 669)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.671265 355572 usertrap_amd64.go:225] [ 4395(1083): 4395(1083)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:32.676081 355572 usertrap_amd64.go:212] [ 4396( 18): 4396( 18)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:32.676187 355572 usertrap_amd64.go:122] [ 4396( 18): 4396( 18)] Allocate a new trap: 0xc000bcf170 38 D0318 16:20:32.676315 355572 usertrap_amd64.go:225] [ 4396( 18): 4396( 18)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:32.676593 355572 task_exit.go:204] [ 4392( 668): 4397( 669)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.676673 355572 task_exit.go:204] [ 4392( 668): 4397( 669)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.676762 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:32.677293 355572 task_exit.go:204] [ 4392( 668): 4392( 668)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000000080), &(0x7f0000000140)=0x4) D0318 16:20:32.682982 355572 usertrap_amd64.go:212] [ 4396( 18): 4396( 18)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:32.683043 355572 usertrap_amd64.go:122] [ 4396( 18): 4396( 18)] Allocate a new trap: 0xc000bcf170 39 D0318 16:20:32.683180 355572 usertrap_amd64.go:225] [ 4396( 18): 4396( 18)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:32.684116 355572 usertrap_amd64.go:212] [ 4395(1083): 4395(1083)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:32.684213 355572 usertrap_amd64.go:122] [ 4395(1083): 4395(1083)] Allocate a new trap: 0xc005e17020 40 D0318 16:20:32.684266 355572 usertrap_amd64.go:225] [ 4395(1083): 4395(1083)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:32.684482 355572 usertrap_amd64.go:212] [ 4396( 18): 4396( 18)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:32.684535 355572 usertrap_amd64.go:122] [ 4396( 18): 4396( 18)] Allocate a new trap: 0xc000bcf170 40 D0318 16:20:32.684620 355572 usertrap_amd64.go:225] [ 4396( 18): 4396( 18)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:32.685003 355572 usertrap_amd64.go:212] [ 4396( 18): 4398( 19)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:32.685066 355572 usertrap_amd64.go:122] [ 4396( 18): 4398( 19)] Allocate a new trap: 0xc000bcf170 41 D0318 16:20:32.685142 355572 usertrap_amd64.go:225] [ 4396( 18): 4398( 19)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:32.685860 355572 usertrap_amd64.go:212] [ 4395(1083): 4395(1083)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:32.685925 355572 usertrap_amd64.go:122] [ 4395(1083): 4395(1083)] Allocate a new trap: 0xc005e17020 41 D0318 16:20:32.686010 355572 usertrap_amd64.go:225] [ 4395(1083): 4395(1083)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:32.686119 355572 usertrap_amd64.go:212] [ 4396( 18): 4396( 18)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:32.686172 355572 usertrap_amd64.go:122] [ 4396( 18): 4396( 18)] Allocate a new trap: 0xc000bcf170 42 D0318 16:20:32.686218 355572 usertrap_amd64.go:225] [ 4396( 18): 4396( 18)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:32.686312 355572 usertrap_amd64.go:212] [ 4395(1083): 4399(1084)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:32.686422 355572 usertrap_amd64.go:122] [ 4395(1083): 4399(1084)] Allocate a new trap: 0xc005e17020 42 D0318 16:20:32.686531 355572 usertrap_amd64.go:225] [ 4395(1083): 4399(1084)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:32.689416 355572 task_exit.go:204] [ 4396( 18): 4396( 18)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.689887 355572 task_exit.go:204] [ 4396( 18): 4396( 18)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.690526 355572 task_signals.go:204] [ 4396( 18): 4398( 19)] Signal 9, PID: 4396, TID: 4398, fault addr: 0x0: terminating thread group D0318 16:20:32.690667 355572 task_exit.go:204] [ 4396( 18): 4398( 19)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.696433 355572 task_exit.go:204] [ 4396( 18): 4398( 19)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.696525 355572 task_exit.go:204] [ 4396( 18): 4398( 19)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.696686 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:32.697214 355572 task_run.go:306] [ 4401(1085): 4401(1085)] Unhandled user fault: addr=0 ip=0 access=r-x sig=11 err=bad address D0318 16:20:32.697301 355572 task_log.go:87] [ 4401(1085): 4401(1085)] Registers: D0318 16:20:32.697370 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Cs = 0000000000000033 D0318 16:20:32.697451 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Ds = 0000000000000000 D0318 16:20:32.697520 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Eflags = 0000000000010217 D0318 16:20:32.697558 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Es = 0000000000000000 D0318 16:20:32.697658 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Fs = 0000000000000000 D0318 16:20:32.697706 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Fs_base = 00007eeec172b6c0 D0318 16:20:32.697794 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Gs = 0000000000000000 D0318 16:20:32.697832 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Gs_base = 0000000000000000 D0318 16:20:32.697869 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Orig_rax = ffffffffffffffff D0318 16:20:32.697904 355572 task_log.go:94] [ 4401(1085): 4401(1085)] R10 = 0000000000000000 D0318 16:20:32.697974 355572 task_log.go:94] [ 4401(1085): 4401(1085)] R11 = 0000000000000246 D0318 16:20:32.698004 355572 task_log.go:94] [ 4401(1085): 4401(1085)] R12 = 0000000000000000 D0318 16:20:32.698066 355572 task_log.go:94] [ 4401(1085): 4401(1085)] R13 = 000000000000000b D0318 16:20:32.698124 355572 task_log.go:94] [ 4401(1085): 4401(1085)] R14 = 0000562e85e24f80 D0318 16:20:32.698190 355572 task_log.go:94] [ 4401(1085): 4401(1085)] R15 = 00007ee9a94e5228 D0318 16:20:32.698254 355572 task_log.go:94] [ 4401(1085): 4401(1085)] R8 = 0000000000000000 D0318 16:20:32.698300 355572 task_log.go:94] [ 4401(1085): 4401(1085)] R9 = 0000000000000000 D0318 16:20:32.698339 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Rax = 0000000000000000 D0318 16:20:32.698380 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Rbp = 0000562e85d4347a D0318 16:20:32.698449 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Rbx = 0000562e85e24f80 D0318 16:20:32.698497 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Rcx = 0000562e85cf6da9 D0318 16:20:32.698566 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Rdi = 0000000000000000 D0318 16:20:32.698600 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Rdx = 0000000000000000 D0318 16:20:32.698419 355572 task_exit.go:204] [ 4396( 18): 4396( 18)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.698680 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Rip = 0000000000000000 D0318 16:20:32.698763 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Rsi = 0000000020000480 D0318 16:20:32.698821 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Rsp = 0000000020000488 D0318 16:20:32.698858 355572 task_log.go:94] [ 4401(1085): 4401(1085)] Ss = 000000000000002b D0318 16:20:32.698888 355572 task_log.go:111] [ 4401(1085): 4401(1085)] Stack: D0318 16:20:32.699001 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699068 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699132 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200004a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699218 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200004b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699303 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200004c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699392 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200004d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699474 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200004e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699560 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200004f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699670 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699713 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699773 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16:20:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, 0x0, &(0x7f0000000040)=0xfffffec3) D0318 16:20:32.699842 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.699981 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700060 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700115 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700165 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700210 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700254 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700293 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200005a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700329 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200005b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700405 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200005c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700441 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200005d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700487 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200005e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700585 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200005f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700673 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700714 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700803 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700854 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.700936 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701005 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701063 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701103 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701135 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701173 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701207 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200006a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701236 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200006b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701278 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200006c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701307 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200006d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701380 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200006e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701455 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200006f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701491 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701522 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701611 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701641 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000730: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701688 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701729 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701775 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701822 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701871 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701945 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.701993 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200007a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702062 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200007b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702099 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200007c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702158 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200007d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702204 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200007e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702253 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 200007f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702301 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702366 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702434 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702503 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702584 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000840: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702639 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702681 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702734 355572 task_log.go:128] [ 4401(1085): 4401(1085)] 20000870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:32.702770 355572 task_log.go:149] [ 4401(1085): 4401(1085)] Code: D0318 16:20:32.702844 355572 task_log.go:170] [ 4401(1085): 4401(1085)] Error reading stack at address ffffffffffffffc0: bad address D0318 16:20:32.702873 355572 task_log.go:71] [ 4401(1085): 4401(1085)] Mappings: VMAs: 00066000-0006b000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2f420000-1b2f460000 rw-s 00000000 00:05 5 /memfd:syz-shared-mem (deleted) 562e85c79000-562e85c9e000 r--p 00000000 00:11 8 /syz-executor 562e85c9e000-562e85d42000 r-xp 00025000 00:11 8 /syz-executor 562e85d42000-562e85df2000 r--p 000c9000 00:11 8 /syz-executor 562e85df2000-562e85dfb000 rw-p 00179000 00:11 8 /syz-executor 562e85e09000-562e86955000 rw-p 00000000 00:00 0 562e86955000-562e86977000 rw-p 00000000 00:00 0 [heap] 7ee9a8ce6000-7ee9a94e6000 rw-p 00000000 00:00 0 [stack] 7eeec1200000-7eeec1600000 r--p 00000000 00:05 4 /memfd:syz-shared-mem (deleted) 7eeec170b000-7eeec170c000 ---p 00000000 00:00 0 7eeec170c000-7eeec172c000 rw-p 00000000 00:00 0 7eeec172c000-7eeec172d000 r--p 00000000 00:00 0 [vvar] 7eeec172d000-7eeec172f000 r-xp 00000000 00:00 0 PMAs: 00066000-00067000 r-xp 1297b000 *pgalloc.MemoryFile 00067000-0006b000 r-xp 12799000 *pgalloc.MemoryFile 20000000-20200000 rwxp 28c00000 *pgalloc.MemoryFile 562e85c79000-562e85c9e000 r--p 16c2a000 *pgalloc.MemoryFile 562e85cba000-562e85cbb000 r-xp 115fc000 *pgalloc.MemoryFile 562e85ccb000-562e85ccc000 r-xp 1301d000 *pgalloc.MemoryFile 562e85cf3000-562e85cf4000 r-xp 12981000 *pgalloc.MemoryFile 562e85cf4000-562e85cf5000 r-xp 127f7000 *pgalloc.MemoryFile 562e85cf5000-562e85cf6000 r-xp 127fa000 *pgalloc.MemoryFile 562e85cf6000-562e85cf7000 r-xp 129a0000 *pgalloc.MemoryFile 562e85cf8000-562e85cf9000 r-xp 12786000 *pgalloc.MemoryFile 562e85d00000-562e85d01000 r-xp 0bc4a000 *pgalloc.MemoryFile 562e85d10000-562e85d11000 r-xp 0bcd7000 *pgalloc.MemoryFile 562e85d22000-562e85d23000 r-xp 1298d000 *pgalloc.MemoryFile 562e85d41000-562e85d42000 r-xp 015ff000 *pgalloc.MemoryFile 562e85d42000-562e85d96000 r--p 17292000 *pgalloc.MemoryFile 562e85d96000-562e85dfb000 r--p 1ac00000 *pgalloc.MemoryFile 562e85e09000-562e86000000 r--p 29400000 *pgalloc.MemoryFile 562e86800000-562e86955000 r--p 28744000 *pgalloc.MemoryFile 562e86955000-562e86956000 r--p 127fc000 *pgalloc.MemoryFile 562e86956000-562e86977000 r--p 19c87000 *pgalloc.MemoryFile 7ee9a9400000-7ee9a94e2000 r--p 185c6000 *pgalloc.MemoryFile 7ee9a94e2000-7ee9a94e4000 r--p 12ffb000 *pgalloc.MemoryFile 7ee9a94e4000-7ee9a94e6000 r--p 12840000 *pgalloc.MemoryFile 7eeec170c000-7eeec172c000 r--p 19cb6000 *pgalloc.MemoryFile D0318 16:20:32.704013 355572 task_log.go:73] [ 4401(1085): 4401(1085)] FDTable: fd:0 => name pipe:[7] fd:1 => name pipe:[7] fd:2 => name pipe:[7] fd:200 => name /dev/net/tun fd:201 => name / D0318 16:20:32.704389 355572 task_signals.go:470] [ 4401(1085): 4401(1085)] Notified of signal 11 D0318 16:20:32.704455 355572 task_signals.go:220] [ 4401(1085): 4401(1085)] Signal 11: delivering to handler D0318 16:20:32.704712 355572 task_signals.go:223] [ 4401(1085): 4401(1085)] Failed to deliver signal &{Signo:11 Errno:0 Code:1 _:0 Fields:[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0]} to user handler: bad address D0318 16:20:32.704972 355572 task_signals.go:481] [ 4401(1085): 4401(1085)] No task notified of signal 11 D0318 16:20:32.705091 355572 task_signals.go:204] [ 4401(1085): 4401(1085)] Signal 11, PID: 4401, TID: 4401, fault addr: 0x0: terminating thread group D0318 16:20:32.705186 355572 task_exit.go:204] [ 4401(1085): 4401(1085)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.707196 355572 usertrap_amd64.go:212] [ 4395(1083): 4395(1083)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:32.707280 355572 usertrap_amd64.go:122] [ 4395(1083): 4395(1083)] Allocate a new trap: 0xc005e17020 43 D0318 16:20:32.707595 355572 usertrap_amd64.go:225] [ 4395(1083): 4395(1083)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:32.707708 355572 usertrap_amd64.go:212] [ 4400( 670): 4400( 670)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:32.707861 355572 usertrap_amd64.go:122] [ 4400( 670): 4400( 670)] Allocate a new trap: 0xc00637c540 37 D0318 16:20:32.708649 355572 usertrap_amd64.go:225] [ 4400( 670): 4400( 670)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:32.709491 355572 task_exit.go:204] [ 4401(1085): 4401(1085)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.712258 355572 usertrap_amd64.go:212] [ 4400( 670): 4400( 670)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:32.712318 355572 usertrap_amd64.go:122] [ 4400( 670): 4400( 670)] Allocate a new trap: 0xc00637c540 38 D0318 16:20:32.712399 355572 usertrap_amd64.go:225] [ 4400( 670): 4400( 670)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:32.713210 355572 task_exit.go:204] [ 4395(1083): 4395(1083)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.713505 355572 task_signals.go:204] [ 4395(1083): 4399(1084)] Signal 9, PID: 4395, TID: 4399, fault addr: 0x0: terminating thread group D0318 16:20:32.713868 355572 task_exit.go:204] [ 4395(1083): 4395(1083)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.713986 355572 task_exit.go:204] [ 4395(1083): 4399(1084)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.719453 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:32.719640 355572 task_exit.go:204] [ 4395(1083): 4399(1084)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.719700 355572 task_exit.go:204] [ 4395(1083): 4399(1084)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.719804 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:32.720061 355572 task_exit.go:204] [ 4395(1083): 4395(1083)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) D0318 16:20:32.727035 355572 usertrap_amd64.go:212] [ 4402( 20): 4402( 20)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:32.727155 355572 usertrap_amd64.go:122] [ 4402( 20): 4402( 20)] Allocate a new trap: 0xc0078f6390 36 D0318 16:20:32.727838 355572 usertrap_amd64.go:225] [ 4402( 20): 4402( 20)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:32.731444 355572 usertrap_amd64.go:212] [ 4402( 20): 4402( 20)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:32.731518 355572 usertrap_amd64.go:122] [ 4402( 20): 4402( 20)] Allocate a new trap: 0xc0078f6390 37 D0318 16:20:32.731664 355572 usertrap_amd64.go:225] [ 4402( 20): 4402( 20)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:32.732988 355572 usertrap_amd64.go:212] [ 4400( 670): 4400( 670)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:32.733088 355572 usertrap_amd64.go:122] [ 4400( 670): 4400( 670)] Allocate a new trap: 0xc00637c540 39 D0318 16:20:32.733215 355572 usertrap_amd64.go:225] [ 4400( 670): 4400( 670)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:32.740397 355572 task_exit.go:204] [ 4401(1085): 4401(1085)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.740817 355572 usertrap_amd64.go:212] [ 4400( 670): 4400( 670)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:32.740915 355572 usertrap_amd64.go:122] [ 4400( 670): 4400( 670)] Allocate a new trap: 0xc00637c540 40 D0318 16:20:32.741004 355572 usertrap_amd64.go:225] [ 4400( 670): 4400( 670)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:32.742711 355572 usertrap_amd64.go:212] [ 4400( 670): 4400( 670)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:32.742813 355572 usertrap_amd64.go:122] [ 4400( 670): 4400( 670)] Allocate a new trap: 0xc00637c540 41 D0318 16:20:32.742889 355572 usertrap_amd64.go:225] [ 4400( 670): 4400( 670)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:32.743230 355572 usertrap_amd64.go:212] [ 4400( 670): 4404( 671)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:32.743301 355572 usertrap_amd64.go:122] [ 4400( 670): 4404( 671)] Allocate a new trap: 0xc00637c540 42 D0318 16:20:32.743371 355572 usertrap_amd64.go:225] [ 4400( 670): 4404( 671)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:32.745139 355572 usertrap_amd64.go:212] [ 4402( 20): 4402( 20)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:32.745223 355572 usertrap_amd64.go:122] [ 4402( 20): 4402( 20)] Allocate a new trap: 0xc0078f6390 38 D0318 16:20:32.745330 355572 usertrap_amd64.go:225] [ 4402( 20): 4402( 20)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:32.746227 355572 usertrap_amd64.go:212] [ 4400( 670): 4400( 670)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:32.746290 355572 usertrap_amd64.go:122] [ 4400( 670): 4400( 670)] Allocate a new trap: 0xc00637c540 43 D0318 16:20:32.746371 355572 usertrap_amd64.go:225] [ 4400( 670): 4400( 670)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:32.747194 355572 usertrap_amd64.go:212] [ 4403(1086): 4403(1086)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:32.747287 355572 usertrap_amd64.go:122] [ 4403(1086): 4403(1086)] Allocate a new trap: 0xc000977110 37 D0318 16:20:32.747886 355572 usertrap_amd64.go:225] [ 4403(1086): 4403(1086)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:32.751208 355572 usertrap_amd64.go:212] [ 4403(1086): 4403(1086)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:32.751312 355572 usertrap_amd64.go:122] [ 4403(1086): 4403(1086)] Allocate a new trap: 0xc000977110 38 D0318 16:20:32.751390 355572 usertrap_amd64.go:225] [ 4403(1086): 4403(1086)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:32.751743 355572 task_exit.go:204] [ 4400( 670): 4400( 670)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.751943 355572 task_signals.go:204] [ 4400( 670): 4404( 671)] Signal 9, PID: 4400, TID: 4404, fault addr: 0x0: terminating thread group D0318 16:20:32.752596 355572 task_exit.go:204] [ 4400( 670): 4404( 671)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.752855 355572 task_exit.go:204] [ 4400( 670): 4400( 670)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.755903 355572 usertrap_amd64.go:212] [ 4402( 20): 4402( 20)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:32.756018 355572 usertrap_amd64.go:122] [ 4402( 20): 4402( 20)] Allocate a new trap: 0xc0078f6390 39 D0318 16:20:32.756097 355572 usertrap_amd64.go:225] [ 4402( 20): 4402( 20)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:32.757529 355572 usertrap_amd64.go:212] [ 4402( 20): 4402( 20)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:32.757594 355572 usertrap_amd64.go:122] [ 4402( 20): 4402( 20)] Allocate a new trap: 0xc0078f6390 40 D0318 16:20:32.757660 355572 usertrap_amd64.go:225] [ 4402( 20): 4402( 20)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:32.758021 355572 task_exit.go:204] [ 4400( 670): 4404( 671)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.758097 355572 task_exit.go:204] [ 4400( 670): 4404( 671)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.758132 355572 usertrap_amd64.go:212] [ 4402( 20): 4405( 21)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:32.758197 355572 usertrap_amd64.go:122] [ 4402( 20): 4405( 21)] Allocate a new trap: 0xc0078f6390 41 D0318 16:20:32.758181 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:32.758246 355572 usertrap_amd64.go:225] [ 4402( 20): 4405( 21)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:32.758267 355572 task_exit.go:204] [ 4400( 670): 4400( 670)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:32 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) D0318 16:20:32.762746 355572 usertrap_amd64.go:212] [ 4402( 20): 4402( 20)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:32.762829 355572 usertrap_amd64.go:122] [ 4402( 20): 4402( 20)] Allocate a new trap: 0xc0078f6390 42 D0318 16:20:32.762905 355572 usertrap_amd64.go:225] [ 4402( 20): 4402( 20)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:32.766896 355572 usertrap_amd64.go:212] [ 4403(1086): 4403(1086)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:32.766966 355572 usertrap_amd64.go:122] [ 4403(1086): 4403(1086)] Allocate a new trap: 0xc000977110 39 D0318 16:20:32.767051 355572 usertrap_amd64.go:225] [ 4403(1086): 4403(1086)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:32.769957 355572 task_exit.go:204] [ 4402( 20): 4402( 20)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.770274 355572 task_signals.go:204] [ 4402( 20): 4405( 21)] Signal 9, PID: 4402, TID: 4405, fault addr: 0x0: terminating thread group D0318 16:20:32.770858 355572 task_exit.go:204] [ 4402( 20): 4405( 21)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.771305 355572 task_exit.go:204] [ 4402( 20): 4402( 20)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.773598 355572 usertrap_amd64.go:212] [ 4403(1086): 4403(1086)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:32.773655 355572 usertrap_amd64.go:122] [ 4403(1086): 4403(1086)] Allocate a new trap: 0xc000977110 40 D0318 16:20:32.773715 355572 usertrap_amd64.go:225] [ 4403(1086): 4403(1086)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:32.774964 355572 usertrap_amd64.go:212] [ 4403(1086): 4403(1086)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:32.775011 355572 usertrap_amd64.go:122] [ 4403(1086): 4403(1086)] Allocate a new trap: 0xc000977110 41 D0318 16:20:32.775128 355572 usertrap_amd64.go:225] [ 4403(1086): 4403(1086)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:32.775708 355572 usertrap_amd64.go:212] [ 4403(1086): 4406(1087)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:32.775845 355572 usertrap_amd64.go:122] [ 4403(1086): 4406(1087)] Allocate a new trap: 0xc000977110 42 D0318 16:20:32.776024 355572 usertrap_amd64.go:225] [ 4403(1086): 4406(1087)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:32.777100 355572 task_exit.go:204] [ 4402( 20): 4405( 21)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.777219 355572 task_exit.go:204] [ 4402( 20): 4405( 21)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.777329 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:32.777763 355572 task_exit.go:204] [ 4402( 20): 4402( 20)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.778304 355572 usertrap_amd64.go:212] [ 4403(1086): 4403(1086)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:32.778374 355572 usertrap_amd64.go:122] [ 4403(1086): 4403(1086)] Allocate a new trap: 0xc000977110 43 D0318 16:20:32.778472 355572 usertrap_amd64.go:225] [ 4403(1086): 4403(1086)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) 16:20:32 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000002e80), 0x0, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) D0318 16:20:32.784974 355572 task_exit.go:204] [ 4403(1086): 4403(1086)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.785135 355572 task_signals.go:204] [ 4403(1086): 4406(1087)] Signal 9, PID: 4403, TID: 4406, fault addr: 0x0: terminating thread group D0318 16:20:32.785647 355572 task_exit.go:204] [ 4403(1086): 4403(1086)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.785876 355572 task_exit.go:204] [ 4403(1086): 4406(1087)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.788697 355572 usertrap_amd64.go:212] [ 4407( 672): 4407( 672)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:32.788896 355572 usertrap_amd64.go:122] [ 4407( 672): 4407( 672)] Allocate a new trap: 0xc00637c570 37 D0318 16:20:32.789630 355572 usertrap_amd64.go:225] [ 4407( 672): 4407( 672)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:32.791328 355572 task_exit.go:204] [ 4403(1086): 4406(1087)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.791425 355572 task_exit.go:204] [ 4403(1086): 4406(1087)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.791560 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:32.791724 355572 task_exit.go:204] [ 4403(1086): 4403(1086)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:32 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @broadcast, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @empty, "", @local, "8e801a9555caab19"}}}}, 0x0) D0318 16:20:32.794504 355572 usertrap_amd64.go:212] [ 4407( 672): 4407( 672)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:32.794570 355572 usertrap_amd64.go:122] [ 4407( 672): 4407( 672)] Allocate a new trap: 0xc00637c570 38 D0318 16:20:32.794644 355572 usertrap_amd64.go:225] [ 4407( 672): 4407( 672)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:32.814551 355572 usertrap_amd64.go:212] [ 4408( 22): 4408( 22)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:32.814698 355572 usertrap_amd64.go:122] [ 4408( 22): 4408( 22)] Allocate a new trap: 0xc0062d9f20 36 D0318 16:20:32.816117 355572 usertrap_amd64.go:225] [ 4408( 22): 4408( 22)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:32.817113 355572 usertrap_amd64.go:212] [ 4407( 672): 4407( 672)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:32.817216 355572 usertrap_amd64.go:122] [ 4407( 672): 4407( 672)] Allocate a new trap: 0xc00637c570 39 D0318 16:20:32.817341 355572 usertrap_amd64.go:225] [ 4407( 672): 4407( 672)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:32.820172 355572 usertrap_amd64.go:212] [ 4408( 22): 4408( 22)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:32.820243 355572 usertrap_amd64.go:122] [ 4408( 22): 4408( 22)] Allocate a new trap: 0xc0062d9f20 37 D0318 16:20:32.820323 355572 usertrap_amd64.go:225] [ 4408( 22): 4408( 22)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:32.821035 355572 usertrap_amd64.go:212] [ 4409(1088): 4409(1088)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:32.821111 355572 usertrap_amd64.go:122] [ 4409(1088): 4409(1088)] Allocate a new trap: 0xc00637c5a0 37 D0318 16:20:32.821678 355572 usertrap_amd64.go:225] [ 4409(1088): 4409(1088)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:32.825168 355572 usertrap_amd64.go:212] [ 4409(1088): 4409(1088)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:32.825227 355572 usertrap_amd64.go:122] [ 4409(1088): 4409(1088)] Allocate a new trap: 0xc00637c5a0 38 D0318 16:20:32.825278 355572 usertrap_amd64.go:225] [ 4409(1088): 4409(1088)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:32.830167 355572 usertrap_amd64.go:212] [ 4408( 22): 4408( 22)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:32.830221 355572 usertrap_amd64.go:122] [ 4408( 22): 4408( 22)] Allocate a new trap: 0xc0062d9f20 38 D0318 16:20:32.830277 355572 usertrap_amd64.go:225] [ 4408( 22): 4408( 22)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:32.836195 355572 usertrap_amd64.go:212] [ 4407( 672): 4407( 672)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:32.836266 355572 usertrap_amd64.go:122] [ 4407( 672): 4407( 672)] Allocate a new trap: 0xc00637c570 40 D0318 16:20:32.836349 355572 usertrap_amd64.go:225] [ 4407( 672): 4407( 672)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:32.837817 355572 usertrap_amd64.go:212] [ 4407( 672): 4407( 672)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:32.837954 355572 usertrap_amd64.go:122] [ 4407( 672): 4407( 672)] Allocate a new trap: 0xc00637c570 41 D0318 16:20:32.838112 355572 usertrap_amd64.go:225] [ 4407( 672): 4407( 672)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:32.838318 355572 usertrap_amd64.go:212] [ 4407( 672): 4410( 673)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:32.838464 355572 usertrap_amd64.go:122] [ 4407( 672): 4410( 673)] Allocate a new trap: 0xc00637c570 42 D0318 16:20:32.838552 355572 usertrap_amd64.go:225] [ 4407( 672): 4410( 673)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:32.840253 355572 usertrap_amd64.go:212] [ 4408( 22): 4408( 22)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:32.840456 355572 usertrap_amd64.go:122] [ 4408( 22): 4408( 22)] Allocate a new trap: 0xc0062d9f20 39 D0318 16:20:32.840552 355572 usertrap_amd64.go:225] [ 4408( 22): 4408( 22)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:32.841080 355572 usertrap_amd64.go:212] [ 4409(1088): 4409(1088)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:32.841142 355572 usertrap_amd64.go:122] [ 4409(1088): 4409(1088)] Allocate a new trap: 0xc00637c5a0 39 D0318 16:20:32.841259 355572 usertrap_amd64.go:225] [ 4409(1088): 4409(1088)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:32.841821 355572 usertrap_amd64.go:212] [ 4407( 672): 4407( 672)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:32.841895 355572 usertrap_amd64.go:122] [ 4407( 672): 4407( 672)] Allocate a new trap: 0xc00637c570 43 D0318 16:20:32.841984 355572 usertrap_amd64.go:225] [ 4407( 672): 4407( 672)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:32.842174 355572 usertrap_amd64.go:212] [ 4408( 22): 4408( 22)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:32.842242 355572 usertrap_amd64.go:122] [ 4408( 22): 4408( 22)] Allocate a new trap: 0xc0062d9f20 40 D0318 16:20:32.842324 355572 usertrap_amd64.go:225] [ 4408( 22): 4408( 22)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:32.843114 355572 usertrap_amd64.go:212] [ 4408( 22): 4411( 23)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:32.843185 355572 usertrap_amd64.go:122] [ 4408( 22): 4411( 23)] Allocate a new trap: 0xc0062d9f20 41 D0318 16:20:32.843296 355572 usertrap_amd64.go:225] [ 4408( 22): 4411( 23)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:32.845297 355572 usertrap_amd64.go:212] [ 4408( 22): 4408( 22)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:32.845446 355572 usertrap_amd64.go:122] [ 4408( 22): 4408( 22)] Allocate a new trap: 0xc0062d9f20 42 D0318 16:20:32.845626 355572 usertrap_amd64.go:225] [ 4408( 22): 4408( 22)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:32.848176 355572 task_exit.go:204] [ 4407( 672): 4407( 672)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.848371 355572 task_signals.go:204] [ 4407( 672): 4410( 673)] Signal 9, PID: 4407, TID: 4410, fault addr: 0x0: terminating thread group D0318 16:20:32.848781 355572 task_exit.go:204] [ 4407( 672): 4407( 672)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.848962 355572 task_exit.go:204] [ 4407( 672): 4410( 673)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.850685 355572 task_exit.go:204] [ 4408( 22): 4408( 22)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.850850 355572 task_signals.go:204] [ 4408( 22): 4411( 23)] Signal 9, PID: 4408, TID: 4411, fault addr: 0x0: terminating thread group D0318 16:20:32.851213 355572 usertrap_amd64.go:212] [ 4409(1088): 4409(1088)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:32.851285 355572 usertrap_amd64.go:122] [ 4409(1088): 4409(1088)] Allocate a new trap: 0xc00637c5a0 40 D0318 16:20:32.851379 355572 usertrap_amd64.go:225] [ 4409(1088): 4409(1088)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:32.851406 355572 task_exit.go:204] [ 4408( 22): 4408( 22)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.852818 355572 usertrap_amd64.go:212] [ 4409(1088): 4409(1088)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:32.852898 355572 usertrap_amd64.go:122] [ 4409(1088): 4409(1088)] Allocate a new trap: 0xc00637c5a0 41 D0318 16:20:32.852989 355572 usertrap_amd64.go:225] [ 4409(1088): 4409(1088)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:32.853432 355572 task_exit.go:204] [ 4408( 22): 4411( 23)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.853822 355572 task_exit.go:204] [ 4407( 672): 4410( 673)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.853919 355572 task_exit.go:204] [ 4407( 672): 4410( 673)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.854027 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:32.854050 355572 usertrap_amd64.go:212] [ 4409(1088): 4412(1089)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:32.854110 355572 usertrap_amd64.go:122] [ 4409(1088): 4412(1089)] Allocate a new trap: 0xc00637c5a0 42 D0318 16:20:32.854260 355572 usertrap_amd64.go:225] [ 4409(1088): 4412(1089)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:32.855217 355572 usertrap_amd64.go:212] [ 4409(1088): 4412(1089)] Found the pattern at ip 562e85cf5ae8:sysno 1 D0318 16:20:32.855195 355572 task_exit.go:204] [ 4407( 672): 4407( 672)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.855286 355572 usertrap_amd64.go:122] [ 4409(1088): 4412(1089)] Allocate a new trap: 0xc00637c5a0 43 D0318 16:20:32.855471 355572 usertrap_amd64.go:225] [ 4409(1088): 4412(1089)] Apply the binary patch addr 562e85cf5ae8 trap addr 66d70 ([184 1 0 0 0 15 5] -> [255 36 37 112 109 6 0]) 16:20:32 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000140)={@remote, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "051429", 0x10, 0x21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "9c1df0", 0x0, "7ff7fd"}}}}}}}, 0x0) D0318 16:20:32.858853 355572 task_exit.go:204] [ 4408( 22): 4411( 23)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.858940 355572 task_exit.go:204] [ 4408( 22): 4411( 23)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.859039 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:32.859527 355572 usertrap_amd64.go:212] [ 4409(1088): 4409(1088)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:32.859624 355572 usertrap_amd64.go:122] [ 4409(1088): 4409(1088)] Allocate a new trap: 0xc00637c5a0 44 D0318 16:20:32.859512 355572 task_exit.go:204] [ 4408( 22): 4408( 22)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.859756 355572 usertrap_amd64.go:225] [ 4409(1088): 4409(1088)] Apply the binary patch addr 562e85cf5c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) 16:20:32 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f000000a200), 0x0, 0x0) sendmsg$netlink(r0, 0x0, 0x0) D0318 16:20:32.863630 355572 task_exit.go:204] [ 4409(1088): 4409(1088)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.863787 355572 task_signals.go:204] [ 4409(1088): 4412(1089)] Signal 9, PID: 4409, TID: 4412, fault addr: 0x0: terminating thread group D0318 16:20:32.864223 355572 task_exit.go:204] [ 4409(1088): 4409(1088)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.864338 355572 task_exit.go:204] [ 4409(1088): 4412(1089)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.870307 355572 task_exit.go:204] [ 4409(1088): 4412(1089)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.870380 355572 task_exit.go:204] [ 4409(1088): 4412(1089)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.870524 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:32.871944 355572 task_exit.go:204] [ 4409(1088): 4409(1088)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:32 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xfbceba01498d058c, 0x0) D0318 16:20:32.885597 355572 usertrap_amd64.go:212] [ 4413( 674): 4413( 674)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:32.885699 355572 usertrap_amd64.go:122] [ 4413( 674): 4413( 674)] Allocate a new trap: 0xc000bcf200 37 D0318 16:20:32.886385 355572 usertrap_amd64.go:225] [ 4413( 674): 4413( 674)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:32.889206 355572 usertrap_amd64.go:212] [ 4413( 674): 4413( 674)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:32.889263 355572 usertrap_amd64.go:122] [ 4413( 674): 4413( 674)] Allocate a new trap: 0xc000bcf200 38 D0318 16:20:32.889313 355572 usertrap_amd64.go:225] [ 4413( 674): 4413( 674)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:32.896077 355572 usertrap_amd64.go:212] [ 4414( 24): 4414( 24)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:32.896187 355572 usertrap_amd64.go:122] [ 4414( 24): 4414( 24)] Allocate a new trap: 0xc005e17140 36 D0318 16:20:32.896816 355572 usertrap_amd64.go:225] [ 4414( 24): 4414( 24)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:32.900595 355572 usertrap_amd64.go:212] [ 4414( 24): 4414( 24)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:32.900654 355572 usertrap_amd64.go:122] [ 4414( 24): 4414( 24)] Allocate a new trap: 0xc005e17140 37 D0318 16:20:32.900727 355572 usertrap_amd64.go:225] [ 4414( 24): 4414( 24)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:32.905449 355572 usertrap_amd64.go:212] [ 4413( 674): 4413( 674)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:32.905572 355572 usertrap_amd64.go:122] [ 4413( 674): 4413( 674)] Allocate a new trap: 0xc000bcf200 39 D0318 16:20:32.905662 355572 usertrap_amd64.go:225] [ 4413( 674): 4413( 674)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:32.908575 355572 usertrap_amd64.go:212] [ 4415(1090): 4415(1090)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:32.908664 355572 usertrap_amd64.go:122] [ 4415(1090): 4415(1090)] Allocate a new trap: 0xc000f9fe60 37 D0318 16:20:32.909262 355572 usertrap_amd64.go:225] [ 4415(1090): 4415(1090)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:32.912394 355572 usertrap_amd64.go:212] [ 4415(1090): 4415(1090)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:32.912523 355572 usertrap_amd64.go:122] [ 4415(1090): 4415(1090)] Allocate a new trap: 0xc000f9fe60 38 D0318 16:20:32.912805 355572 usertrap_amd64.go:225] [ 4415(1090): 4415(1090)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:32.913313 355572 usertrap_amd64.go:212] [ 4413( 674): 4413( 674)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:32.913373 355572 usertrap_amd64.go:122] [ 4413( 674): 4413( 674)] Allocate a new trap: 0xc000bcf200 40 D0318 16:20:32.913471 355572 usertrap_amd64.go:225] [ 4413( 674): 4413( 674)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:32.915080 355572 usertrap_amd64.go:212] [ 4413( 674): 4413( 674)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:32.915138 355572 usertrap_amd64.go:122] [ 4413( 674): 4413( 674)] Allocate a new trap: 0xc000bcf200 41 D0318 16:20:32.915230 355572 usertrap_amd64.go:225] [ 4413( 674): 4413( 674)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:32.915752 355572 usertrap_amd64.go:212] [ 4413( 674): 4416( 675)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:32.915827 355572 usertrap_amd64.go:122] [ 4413( 674): 4416( 675)] Allocate a new trap: 0xc000bcf200 42 D0318 16:20:32.916008 355572 usertrap_amd64.go:225] [ 4413( 674): 4416( 675)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:32.916855 355572 usertrap_amd64.go:212] [ 4414( 24): 4414( 24)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:32.916945 355572 usertrap_amd64.go:122] [ 4414( 24): 4414( 24)] Allocate a new trap: 0xc005e17140 38 D0318 16:20:32.917062 355572 usertrap_amd64.go:225] [ 4414( 24): 4414( 24)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:32.917407 355572 usertrap_amd64.go:212] [ 4413( 674): 4416( 675)] Found the pattern at ip 55ca2d8e4ae8:sysno 1 D0318 16:20:32.917504 355572 usertrap_amd64.go:122] [ 4413( 674): 4416( 675)] Allocate a new trap: 0xc000bcf200 43 D0318 16:20:32.917578 355572 usertrap_amd64.go:225] [ 4413( 674): 4416( 675)] Apply the binary patch addr 55ca2d8e4ae8 trap addr 6ad70 ([184 1 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:32.924302 355572 usertrap_amd64.go:212] [ 4414( 24): 4414( 24)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:32.924256 355572 usertrap_amd64.go:212] [ 4413( 674): 4413( 674)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:32.924386 355572 usertrap_amd64.go:122] [ 4414( 24): 4414( 24)] Allocate a new trap: 0xc005e17140 39 D0318 16:20:32.924440 355572 usertrap_amd64.go:122] [ 4413( 674): 4413( 674)] Allocate a new trap: 0xc000bcf200 44 D0318 16:20:32.924498 355572 usertrap_amd64.go:225] [ 4414( 24): 4414( 24)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:32.924574 355572 usertrap_amd64.go:225] [ 4413( 674): 4413( 674)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6adc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0318 16:20:32.925989 355572 usertrap_amd64.go:212] [ 4414( 24): 4414( 24)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:32.926091 355572 usertrap_amd64.go:122] [ 4414( 24): 4414( 24)] Allocate a new trap: 0xc005e17140 40 D0318 16:20:32.926101 355572 usertrap_amd64.go:212] [ 4415(1090): 4415(1090)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:32.926151 355572 usertrap_amd64.go:122] [ 4415(1090): 4415(1090)] Allocate a new trap: 0xc000f9fe60 39 D0318 16:20:32.926174 355572 usertrap_amd64.go:225] [ 4414( 24): 4414( 24)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:32.926221 355572 usertrap_amd64.go:225] [ 4415(1090): 4415(1090)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:32.926892 355572 task_exit.go:204] [ 4413( 674): 4413( 674)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.927374 355572 task_exit.go:204] [ 4413( 674): 4413( 674)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.927498 355572 usertrap_amd64.go:212] [ 4414( 24): 4417( 25)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:32.927554 355572 usertrap_amd64.go:122] [ 4414( 24): 4417( 25)] Allocate a new trap: 0xc005e17140 41 D0318 16:20:32.927703 355572 usertrap_amd64.go:225] [ 4414( 24): 4417( 25)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:32.927723 355572 task_signals.go:204] [ 4413( 674): 4416( 675)] Signal 9, PID: 4413, TID: 4416, fault addr: 0x0: terminating thread group D0318 16:20:32.927948 355572 task_exit.go:204] [ 4413( 674): 4416( 675)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.929551 355572 usertrap_amd64.go:212] [ 4414( 24): 4414( 24)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:32.929648 355572 usertrap_amd64.go:122] [ 4414( 24): 4414( 24)] Allocate a new trap: 0xc005e17140 42 D0318 16:20:32.929716 355572 usertrap_amd64.go:225] [ 4414( 24): 4414( 24)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:32.932864 355572 task_exit.go:204] [ 4413( 674): 4416( 675)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.932933 355572 task_exit.go:204] [ 4413( 674): 4416( 675)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.933047 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:32.933362 355572 task_exit.go:204] [ 4413( 674): 4413( 674)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.934836 355572 usertrap_amd64.go:212] [ 4415(1090): 4415(1090)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:32.934896 355572 usertrap_amd64.go:122] [ 4415(1090): 4415(1090)] Allocate a new trap: 0xc000f9fe60 40 16:20:32 executing program 2: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0xc00) D0318 16:20:32.934978 355572 usertrap_amd64.go:225] [ 4415(1090): 4415(1090)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:32.935267 355572 task_exit.go:204] [ 4414( 24): 4414( 24)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.936535 355572 task_signals.go:204] [ 4414( 24): 4417( 25)] Signal 9, PID: 4414, TID: 4417, fault addr: 0x0: terminating thread group D0318 16:20:32.936650 355572 usertrap_amd64.go:212] [ 4415(1090): 4415(1090)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:32.936696 355572 usertrap_amd64.go:122] [ 4415(1090): 4415(1090)] Allocate a new trap: 0xc000f9fe60 41 D0318 16:20:32.936758 355572 usertrap_amd64.go:225] [ 4415(1090): 4415(1090)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:32.937012 355572 task_exit.go:204] [ 4414( 24): 4414( 24)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.937158 355572 usertrap_amd64.go:212] [ 4415(1090): 4418(1091)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:32.937233 355572 usertrap_amd64.go:122] [ 4415(1090): 4418(1091)] Allocate a new trap: 0xc000f9fe60 42 D0318 16:20:32.937338 355572 usertrap_amd64.go:225] [ 4415(1090): 4418(1091)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:32.937434 355572 task_exit.go:204] [ 4414( 24): 4417( 25)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.938845 355572 usertrap_amd64.go:212] [ 4415(1090): 4415(1090)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:32.938900 355572 usertrap_amd64.go:122] [ 4415(1090): 4415(1090)] Allocate a new trap: 0xc000f9fe60 43 D0318 16:20:32.938949 355572 usertrap_amd64.go:225] [ 4415(1090): 4415(1090)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:32.942130 355572 task_exit.go:204] [ 4414( 24): 4417( 25)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.942207 355572 task_exit.go:204] [ 4414( 24): 4417( 25)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.942297 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:32.942414 355572 task_signals.go:204] [ 4415(1090): 4418(1091)] Signal 9, PID: 4415, TID: 4418, fault addr: 0x0: terminating thread group D0318 16:20:32.942431 355572 task_exit.go:204] [ 4415(1090): 4415(1090)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.942653 355572 task_exit.go:204] [ 4415(1090): 4418(1091)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:32.943257 355572 task_exit.go:204] [ 4415(1090): 4415(1090)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.943493 355572 task_exit.go:204] [ 4414( 24): 4414( 24)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:32 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched_retired(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001740)=@newchain={0x24}, 0x24}}, 0x0) D0318 16:20:32.948793 355572 task_exit.go:204] [ 4415(1090): 4418(1091)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:32.948942 355572 task_exit.go:204] [ 4415(1090): 4418(1091)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:32.949219 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:32.949422 355572 task_exit.go:204] [ 4415(1090): 4415(1090)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:32 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f000000b100), 0x0, 0x0) D0318 16:20:32.958424 355572 usertrap_amd64.go:212] [ 4419( 676): 4419( 676)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:32.958569 355572 usertrap_amd64.go:122] [ 4419( 676): 4419( 676)] Allocate a new trap: 0xc0005277d0 37 D0318 16:20:32.959271 355572 usertrap_amd64.go:225] [ 4419( 676): 4419( 676)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:32.961934 355572 usertrap_amd64.go:212] [ 4419( 676): 4419( 676)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:32.962024 355572 usertrap_amd64.go:122] [ 4419( 676): 4419( 676)] Allocate a new trap: 0xc0005277d0 38 D0318 16:20:32.962131 355572 usertrap_amd64.go:225] [ 4419( 676): 4419( 676)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:32.976298 355572 usertrap_amd64.go:212] [ 4421(1092): 4421(1092)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:32.976403 355572 usertrap_amd64.go:122] [ 4421(1092): 4421(1092)] Allocate a new trap: 0xc000f9fe90 37 D0318 16:20:32.976993 355572 usertrap_amd64.go:225] [ 4421(1092): 4421(1092)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:32.979560 355572 usertrap_amd64.go:212] [ 4419( 676): 4419( 676)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:32.979651 355572 usertrap_amd64.go:122] [ 4419( 676): 4419( 676)] Allocate a new trap: 0xc0005277d0 39 D0318 16:20:32.979839 355572 usertrap_amd64.go:225] [ 4419( 676): 4419( 676)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:32.981532 355572 usertrap_amd64.go:212] [ 4421(1092): 4421(1092)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:32.981698 355572 usertrap_amd64.go:122] [ 4421(1092): 4421(1092)] Allocate a new trap: 0xc000f9fe90 38 D0318 16:20:32.981868 355572 usertrap_amd64.go:225] [ 4421(1092): 4421(1092)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:32.982850 355572 usertrap_amd64.go:212] [ 4420( 26): 4420( 26)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:32.982962 355572 usertrap_amd64.go:122] [ 4420( 26): 4420( 26)] Allocate a new trap: 0xc000527800 36 D0318 16:20:32.988993 355572 usertrap_amd64.go:225] [ 4420( 26): 4420( 26)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:32.990017 355572 usertrap_amd64.go:212] [ 4419( 676): 4419( 676)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:32.990112 355572 usertrap_amd64.go:122] [ 4419( 676): 4419( 676)] Allocate a new trap: 0xc0005277d0 40 D0318 16:20:32.990191 355572 usertrap_amd64.go:225] [ 4419( 676): 4419( 676)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:32.991973 355572 usertrap_amd64.go:212] [ 4419( 676): 4419( 676)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:32.992056 355572 usertrap_amd64.go:122] [ 4419( 676): 4419( 676)] Allocate a new trap: 0xc0005277d0 41 D0318 16:20:32.992175 355572 usertrap_amd64.go:225] [ 4419( 676): 4419( 676)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:32.992365 355572 usertrap_amd64.go:212] [ 4419( 676): 4422( 677)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:32.992428 355572 usertrap_amd64.go:122] [ 4419( 676): 4422( 677)] Allocate a new trap: 0xc0005277d0 42 D0318 16:20:32.992586 355572 usertrap_amd64.go:225] [ 4419( 676): 4422( 677)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:32.993737 355572 usertrap_amd64.go:212] [ 4420( 26): 4420( 26)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:32.993855 355572 usertrap_amd64.go:122] [ 4420( 26): 4420( 26)] Allocate a new trap: 0xc000527800 37 D0318 16:20:32.993993 355572 usertrap_amd64.go:212] [ 4419( 676): 4419( 676)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:32.994068 355572 usertrap_amd64.go:122] [ 4419( 676): 4419( 676)] Allocate a new trap: 0xc0005277d0 43 D0318 16:20:32.993995 355572 usertrap_amd64.go:225] [ 4420( 26): 4420( 26)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:32.994123 355572 usertrap_amd64.go:225] [ 4419( 676): 4419( 676)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:32.996382 355572 usertrap_amd64.go:212] [ 4421(1092): 4421(1092)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:32.996471 355572 usertrap_amd64.go:122] [ 4421(1092): 4421(1092)] Allocate a new trap: 0xc000f9fe90 39 D0318 16:20:32.996617 355572 usertrap_amd64.go:225] [ 4421(1092): 4421(1092)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.002655 355572 task_exit.go:204] [ 4419( 676): 4419( 676)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.003274 355572 task_exit.go:204] [ 4419( 676): 4419( 676)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.003642 355572 task_signals.go:204] [ 4419( 676): 4422( 677)] Signal 9, PID: 4419, TID: 4422, fault addr: 0x0: terminating thread group D0318 16:20:33.003655 355572 usertrap_amd64.go:212] [ 4421(1092): 4421(1092)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.003823 355572 task_exit.go:204] [ 4419( 676): 4422( 677)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.003889 355572 usertrap_amd64.go:122] [ 4421(1092): 4421(1092)] Allocate a new trap: 0xc000f9fe90 40 D0318 16:20:33.004192 355572 usertrap_amd64.go:225] [ 4421(1092): 4421(1092)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.005899 355572 usertrap_amd64.go:212] [ 4420( 26): 4420( 26)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.005966 355572 usertrap_amd64.go:122] [ 4420( 26): 4420( 26)] Allocate a new trap: 0xc000527800 38 D0318 16:20:33.005938 355572 usertrap_amd64.go:212] [ 4421(1092): 4421(1092)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.006037 355572 usertrap_amd64.go:225] [ 4420( 26): 4420( 26)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.006053 355572 usertrap_amd64.go:122] [ 4421(1092): 4421(1092)] Allocate a new trap: 0xc000f9fe90 41 D0318 16:20:33.006156 355572 usertrap_amd64.go:225] [ 4421(1092): 4421(1092)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.006315 355572 usertrap_amd64.go:212] [ 4421(1092): 4423(1093)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.006441 355572 usertrap_amd64.go:122] [ 4421(1092): 4423(1093)] Allocate a new trap: 0xc000f9fe90 42 D0318 16:20:33.006652 355572 usertrap_amd64.go:225] [ 4421(1092): 4423(1093)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.009588 355572 task_exit.go:204] [ 4419( 676): 4422( 677)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.009626 355572 usertrap_amd64.go:212] [ 4421(1092): 4421(1092)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.009647 355572 task_exit.go:204] [ 4419( 676): 4422( 677)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.009669 355572 usertrap_amd64.go:122] [ 4421(1092): 4421(1092)] Allocate a new trap: 0xc000f9fe90 43 D0318 16:20:33.009734 355572 usertrap_amd64.go:225] [ 4421(1092): 4421(1092)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.009766 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.010510 355572 task_exit.go:204] [ 4419( 676): 4419( 676)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 2: syz_clone(0x8100200, &(0x7f000000de00), 0x0, 0x0, 0x0, 0x0) D0318 16:20:33.014226 355572 usertrap_amd64.go:212] [ 4420( 26): 4420( 26)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.014383 355572 usertrap_amd64.go:122] [ 4420( 26): 4420( 26)] Allocate a new trap: 0xc000527800 39 D0318 16:20:33.014484 355572 usertrap_amd64.go:225] [ 4420( 26): 4420( 26)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.016447 355572 usertrap_amd64.go:212] [ 4420( 26): 4420( 26)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.016518 355572 usertrap_amd64.go:122] [ 4420( 26): 4420( 26)] Allocate a new trap: 0xc000527800 40 D0318 16:20:33.016519 355572 task_signals.go:204] [ 4421(1092): 4423(1093)] Signal 9, PID: 4421, TID: 4423, fault addr: 0x0: terminating thread group D0318 16:20:33.016619 355572 usertrap_amd64.go:225] [ 4420( 26): 4420( 26)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.016641 355572 task_exit.go:204] [ 4421(1092): 4423(1093)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.016948 355572 task_exit.go:204] [ 4421(1092): 4421(1092)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.017075 355572 usertrap_amd64.go:212] [ 4420( 26): 4424( 27)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.017175 355572 usertrap_amd64.go:122] [ 4420( 26): 4424( 27)] Allocate a new trap: 0xc000527800 41 D0318 16:20:33.017318 355572 usertrap_amd64.go:225] [ 4420( 26): 4424( 27)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.017818 355572 task_exit.go:204] [ 4421(1092): 4421(1092)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.020715 355572 usertrap_amd64.go:212] [ 4420( 26): 4420( 26)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.020794 355572 usertrap_amd64.go:122] [ 4420( 26): 4420( 26)] Allocate a new trap: 0xc000527800 42 D0318 16:20:33.020847 355572 usertrap_amd64.go:225] [ 4420( 26): 4420( 26)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.021725 355572 task_exit.go:204] [ 4421(1092): 4423(1093)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.021822 355572 task_exit.go:204] [ 4421(1092): 4423(1093)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.021930 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.022767 355572 task_exit.go:204] [ 4421(1092): 4421(1092)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 1: syz_emit_ethernet(0x5e, &(0x7f0000000140)={@empty, @empty, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "a54665", 0x28, 0x6, 0x0, @private1, @local, {[@fragment], @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}}, 0x0) D0318 16:20:33.026016 355572 task_exit.go:204] [ 4420( 26): 4420( 26)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.026237 355572 task_signals.go:204] [ 4420( 26): 4424( 27)] Signal 9, PID: 4420, TID: 4424, fault addr: 0x0: terminating thread group D0318 16:20:33.026712 355572 task_exit.go:204] [ 4420( 26): 4424( 27)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.027020 355572 task_exit.go:204] [ 4420( 26): 4420( 26)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.032019 355572 task_exit.go:204] [ 4420( 26): 4424( 27)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.032107 355572 task_exit.go:204] [ 4420( 26): 4424( 27)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.032219 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.032424 355572 task_exit.go:204] [ 4420( 26): 4420( 26)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f000000a200), 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000400)='cgroup.procs\x00', 0x2, 0x0) D0318 16:20:33.040294 355572 usertrap_amd64.go:212] [ 4425( 678): 4425( 678)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:33.040402 355572 usertrap_amd64.go:122] [ 4425( 678): 4425( 678)] Allocate a new trap: 0xc000dc7b60 37 D0318 16:20:33.041246 355572 usertrap_amd64.go:225] [ 4425( 678): 4425( 678)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:33.044927 355572 usertrap_amd64.go:212] [ 4425( 678): 4425( 678)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:33.045084 355572 usertrap_amd64.go:122] [ 4425( 678): 4425( 678)] Allocate a new trap: 0xc000dc7b60 38 D0318 16:20:33.045220 355572 usertrap_amd64.go:225] [ 4425( 678): 4425( 678)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:33.051525 355572 usertrap_amd64.go:212] [ 4426(1094): 4426(1094)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.051664 355572 usertrap_amd64.go:122] [ 4426(1094): 4426(1094)] Allocate a new trap: 0xc0005278c0 37 D0318 16:20:33.052217 355572 usertrap_amd64.go:225] [ 4426(1094): 4426(1094)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.060632 355572 usertrap_amd64.go:212] [ 4426(1094): 4426(1094)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.060767 355572 usertrap_amd64.go:122] [ 4426(1094): 4426(1094)] Allocate a new trap: 0xc0005278c0 38 D0318 16:20:33.060906 355572 usertrap_amd64.go:225] [ 4426(1094): 4426(1094)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.062430 355572 usertrap_amd64.go:212] [ 4427( 28): 4427( 28)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.062532 355572 usertrap_amd64.go:122] [ 4427( 28): 4427( 28)] Allocate a new trap: 0xc000b76090 36 D0318 16:20:33.063236 355572 usertrap_amd64.go:225] [ 4427( 28): 4427( 28)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.063701 355572 usertrap_amd64.go:212] [ 4425( 678): 4425( 678)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:33.063806 355572 usertrap_amd64.go:122] [ 4425( 678): 4425( 678)] Allocate a new trap: 0xc000dc7b60 39 D0318 16:20:33.063885 355572 usertrap_amd64.go:225] [ 4425( 678): 4425( 678)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:33.066229 355572 usertrap_amd64.go:212] [ 4427( 28): 4427( 28)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.066352 355572 usertrap_amd64.go:122] [ 4427( 28): 4427( 28)] Allocate a new trap: 0xc000b76090 37 D0318 16:20:33.066444 355572 usertrap_amd64.go:225] [ 4427( 28): 4427( 28)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.070689 355572 usertrap_amd64.go:212] [ 4425( 678): 4425( 678)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:33.070749 355572 usertrap_amd64.go:122] [ 4425( 678): 4425( 678)] Allocate a new trap: 0xc000dc7b60 40 D0318 16:20:33.070830 355572 usertrap_amd64.go:225] [ 4425( 678): 4425( 678)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:33.072286 355572 usertrap_amd64.go:212] [ 4425( 678): 4425( 678)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:33.072390 355572 usertrap_amd64.go:122] [ 4425( 678): 4425( 678)] Allocate a new trap: 0xc000dc7b60 41 D0318 16:20:33.072588 355572 usertrap_amd64.go:225] [ 4425( 678): 4425( 678)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:33.072814 355572 usertrap_amd64.go:212] [ 4425( 678): 4428( 679)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:33.072867 355572 usertrap_amd64.go:122] [ 4425( 678): 4428( 679)] Allocate a new trap: 0xc000dc7b60 42 D0318 16:20:33.072953 355572 usertrap_amd64.go:225] [ 4425( 678): 4428( 679)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:33.074006 355572 usertrap_amd64.go:212] [ 4426(1094): 4426(1094)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.074090 355572 usertrap_amd64.go:122] [ 4426(1094): 4426(1094)] Allocate a new trap: 0xc0005278c0 39 D0318 16:20:33.074160 355572 usertrap_amd64.go:225] [ 4426(1094): 4426(1094)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.077595 355572 usertrap_amd64.go:212] [ 4427( 28): 4427( 28)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.077730 355572 usertrap_amd64.go:122] [ 4427( 28): 4427( 28)] Allocate a new trap: 0xc000b76090 38 D0318 16:20:33.077829 355572 usertrap_amd64.go:225] [ 4427( 28): 4427( 28)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.080976 355572 usertrap_amd64.go:212] [ 4426(1094): 4426(1094)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.081075 355572 usertrap_amd64.go:122] [ 4426(1094): 4426(1094)] Allocate a new trap: 0xc0005278c0 40 D0318 16:20:33.081214 355572 usertrap_amd64.go:225] [ 4426(1094): 4426(1094)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.081735 355572 task_run.go:306] [ 4429( 680): 4429( 680)] Unhandled user fault: addr=0 ip=0 access=r-x sig=11 err=bad address D0318 16:20:33.081817 355572 task_log.go:87] [ 4429( 680): 4429( 680)] Registers: D0318 16:20:33.081921 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Cs = 0000000000000033 D0318 16:20:33.081991 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Ds = 0000000000000000 D0318 16:20:33.082018 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Eflags = 0000000000010217 D0318 16:20:33.082042 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Es = 0000000000000000 D0318 16:20:33.082085 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Fs = 0000000000000000 D0318 16:20:33.082154 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Fs_base = 00007edc37e6d6c0 D0318 16:20:33.082197 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Gs = 0000000000000000 D0318 16:20:33.082245 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Gs_base = 0000000000000000 D0318 16:20:33.082295 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Orig_rax = ffffffffffffffff D0318 16:20:33.082341 355572 task_log.go:94] [ 4429( 680): 4429( 680)] R10 = 0000000000000000 D0318 16:20:33.082388 355572 task_log.go:94] [ 4429( 680): 4429( 680)] R11 = 0000000000000206 D0318 16:20:33.082422 355572 task_log.go:94] [ 4429( 680): 4429( 680)] R12 = 0000000000000000 D0318 16:20:33.082452 355572 task_log.go:94] [ 4429( 680): 4429( 680)] R13 = 000000000000000b D0318 16:20:33.082472 355572 task_log.go:94] [ 4429( 680): 4429( 680)] R14 = 000055ca2da13f80 D0318 16:20:33.082500 355572 task_log.go:94] [ 4429( 680): 4429( 680)] R15 = 00007ec4b5d37228 D0318 16:20:33.082568 355572 task_log.go:94] [ 4429( 680): 4429( 680)] R8 = 0000000000000000 D0318 16:20:33.082615 355572 task_log.go:94] [ 4429( 680): 4429( 680)] R9 = 0000000000000000 D0318 16:20:33.082644 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Rax = 0000000000000000 D0318 16:20:33.082683 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Rbp = 000055ca2d93247a D0318 16:20:33.082717 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Rbx = 000055ca2da13f80 D0318 16:20:33.082755 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Rcx = 000055ca2d8e5da9 D0318 16:20:33.082795 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Rdi = 0000000008100200 D0318 16:20:33.082826 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Rdx = 0000000000000000 D0318 16:20:33.082859 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Rip = 0000000000000000 D0318 16:20:33.082741 355572 usertrap_amd64.go:212] [ 4426(1094): 4426(1094)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.082884 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Rsi = 000000002000de00 D0318 16:20:33.082926 355572 usertrap_amd64.go:122] [ 4426(1094): 4426(1094)] Allocate a new trap: 0xc0005278c0 41 D0318 16:20:33.083002 355572 usertrap_amd64.go:225] [ 4426(1094): 4426(1094)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.082942 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Rsp = 000000002000de08 D0318 16:20:33.083079 355572 task_log.go:94] [ 4429( 680): 4429( 680)] Ss = 000000000000002b D0318 16:20:33.083202 355572 task_log.go:111] [ 4429( 680): 4429( 680)] Stack: D0318 16:20:33.083414 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.083453 355572 usertrap_amd64.go:212] [ 4426(1094): 4430(1095)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.083534 355572 usertrap_amd64.go:122] [ 4426(1094): 4430(1095)] Allocate a new trap: 0xc0005278c0 42 D0318 16:20:33.083531 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.083653 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.083672 355572 usertrap_amd64.go:225] [ 4426(1094): 4430(1095)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.083752 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.083865 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.083939 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084000 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084074 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084122 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084187 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000de90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084258 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000dea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084302 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000deb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084357 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000dec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084470 355572 usertrap_amd64.go:212] [ 4426(1094): 4430(1095)] Found the pattern at ip 562e85cf5ae8:sysno 1 D0318 16:20:33.084541 355572 usertrap_amd64.go:122] [ 4426(1094): 4430(1095)] Allocate a new trap: 0xc0005278c0 43 D0318 16:20:33.084481 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000ded0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084630 355572 usertrap_amd64.go:225] [ 4426(1094): 4430(1095)] Apply the binary patch addr 562e85cf5ae8 trap addr 66d70 ([184 1 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.084714 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000dee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084786 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000def0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084830 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084864 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084903 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084947 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.084985 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085050 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085113 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085156 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085192 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085229 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000df90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085268 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000dfa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085346 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000dfb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085491 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000dfc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085578 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000dfd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085632 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000dfe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085678 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000dff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085719 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085782 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085821 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085883 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085928 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.085993 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086052 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086107 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086144 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086191 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086257 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e0a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086329 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e0b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086366 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e0c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086416 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e0d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086454 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e0e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086482 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e0f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086534 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086618 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086680 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086726 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086773 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086811 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086845 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086888 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.086968 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.087016 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.087042 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e1a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.087095 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e1b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.087122 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e1c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.087165 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e1d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.087229 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e1e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.087256 355572 task_log.go:128] [ 4429( 680): 4429( 680)] 2000e1f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.087288 355572 task_log.go:149] [ 4429( 680): 4429( 680)] Code: D0318 16:20:33.087308 355572 task_log.go:170] [ 4429( 680): 4429( 680)] Error reading stack at address ffffffffffffffc0: bad address D0318 16:20:33.088039 355572 usertrap_amd64.go:212] [ 4426(1094): 4426(1094)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.088148 355572 usertrap_amd64.go:122] [ 4426(1094): 4426(1094)] Allocate a new trap: 0xc0005278c0 44 D0318 16:20:33.088249 355572 usertrap_amd64.go:225] [ 4426(1094): 4426(1094)] Apply the binary patch addr 562e85cf5c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:33.087348 355572 task_log.go:71] [ 4429( 680): 4429( 680)] Mappings: VMAs: 0006a000-0006f000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2eb20000-1b2eb60000 rw-s 00000000 00:05 7 /memfd:syz-shared-mem (deleted) 55ca2d868000-55ca2d88d000 r--p 00000000 00:11 8 /syz-executor 55ca2d88d000-55ca2d931000 r-xp 00025000 00:11 8 /syz-executor 55ca2d931000-55ca2d9e1000 r--p 000c9000 00:11 8 /syz-executor 55ca2d9e1000-55ca2d9ea000 rw-p 00179000 00:11 8 /syz-executor 55ca2d9f8000-55ca2e544000 rw-p 00000000 00:00 0 55ca2e544000-55ca2e566000 rw-p 00000000 00:00 0 [heap] 7ec4b5538000-7ec4b5d38000 rw-p 00000000 00:00 0 [stack] 7edc37a00000-7edc37e00000 r--p 00000000 00:05 6 /memfd:syz-shared-mem (deleted) 7edc37e4d000-7edc37e4e000 ---p 00000000 00:00 0 7edc37e4e000-7edc37e6e000 rw-p 00000000 00:00 0 7edc37e6e000-7edc37e6f000 r--p 00000000 00:00 0 [vvar] 7edc37e6f000-7edc37e71000 r-xp 00000000 00:00 0 PMAs: 0006a000-0006f000 r-xp 127da000 *pgalloc.MemoryFile 20000000-20200000 rwxp 29c00000 *pgalloc.MemoryFile 55ca2d868000-55ca2d88d000 r--p 17380000 *pgalloc.MemoryFile 55ca2d8a9000-55ca2d8aa000 r-xp 128f1000 *pgalloc.MemoryFile 55ca2d8ba000-55ca2d8bb000 r-xp 1301a000 *pgalloc.MemoryFile 55ca2d8e2000-55ca2d8e3000 r-xp 12794000 *pgalloc.MemoryFile 55ca2d8e3000-55ca2d8e4000 r-xp 12787000 *pgalloc.MemoryFile 55ca2d8e4000-55ca2d8e5000 r-xp 1278b000 *pgalloc.MemoryFile 55ca2d8e5000-55ca2d8e6000 r-xp 12982000 *pgalloc.MemoryFile 55ca2d8e7000-55ca2d8e8000 r-xp 0bdbd000 *pgalloc.MemoryFile 55ca2d8ef000-55ca2d8f0000 r-xp 11fff000 *pgalloc.MemoryFile 55ca2d8ff000-55ca2d900000 r-xp 12601000 *pgalloc.MemoryFile 55ca2d911000-55ca2d912000 r-xp 127fc000 *pgalloc.MemoryFile 55ca2d930000-55ca2d931000 r-xp 0bdb9000 *pgalloc.MemoryFile 55ca2d931000-55ca2d985000 r--p 1871a000 *pgalloc.MemoryFile 55ca2d985000-55ca2d9ea000 r--p 1ac00000 *pgalloc.MemoryFile 55ca2da00000-55ca2dc00000 r--p 28e00000 *pgalloc.MemoryFile 55ca2e400000-55ca2e544000 r--p 28744000 *pgalloc.MemoryFile 55ca2e544000-55ca2e545000 r--p 00bff000 *pgalloc.MemoryFile 55ca2e545000-55ca2e566000 r--p 19c87000 *pgalloc.MemoryFile 7ec4b5c00000-7ec4b5d34000 r--p 27600000 *pgalloc.MemoryFile 7ec4b5d34000-7ec4b5d36000 r--p 12988000 *pgalloc.MemoryFile 7ec4b5d36000-7ec4b5d38000 r--p 12840000 *pgalloc.MemoryFile 7edc37e4e000-7edc37e6e000 r--p 18fe0000 *pgalloc.MemoryFile D0318 16:20:33.088841 355572 task_log.go:73] [ 4429( 680): 4429( 680)] FDTable: fd:2 => name pipe:[44] fd:200 => name /dev/net/tun fd:201 => name / fd:0 => name pipe:[44] fd:1 => name pipe:[44] D0318 16:20:33.090015 355572 task_signals.go:470] [ 4429( 680): 4429( 680)] Notified of signal 11 D0318 16:20:33.090107 355572 task_signals.go:220] [ 4429( 680): 4429( 680)] Signal 11: delivering to handler D0318 16:20:33.091094 355572 usertrap_amd64.go:212] [ 4427( 28): 4427( 28)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.091185 355572 usertrap_amd64.go:122] [ 4427( 28): 4427( 28)] Allocate a new trap: 0xc000b76090 39 D0318 16:20:33.091252 355572 usertrap_amd64.go:225] [ 4427( 28): 4427( 28)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.091329 355572 task_exit.go:204] [ 4429( 680): 4429( 680)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.092510 355572 task_signals.go:204] [ 4426(1094): 4430(1095)] Signal 9, PID: 4426, TID: 4430, fault addr: 0x0: terminating thread group D0318 16:20:33.092621 355572 task_exit.go:204] [ 4426(1094): 4430(1095)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.092640 355572 usertrap_amd64.go:212] [ 4427( 28): 4427( 28)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.092763 355572 usertrap_amd64.go:122] [ 4427( 28): 4427( 28)] Allocate a new trap: 0xc000b76090 40 D0318 16:20:33.092834 355572 usertrap_amd64.go:225] [ 4427( 28): 4427( 28)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.093063 355572 usertrap_amd64.go:212] [ 4427( 28): 4431( 29)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.093125 355572 usertrap_amd64.go:122] [ 4427( 28): 4431( 29)] Allocate a new trap: 0xc000b76090 41 D0318 16:20:33.093198 355572 task_exit.go:204] [ 4426(1094): 4430(1095)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.093272 355572 task_exit.go:204] [ 4426(1094): 4430(1095)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.093195 355572 usertrap_amd64.go:225] [ 4427( 28): 4431( 29)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.093374 355572 task_exit.go:204] [ 4426(1094): 4426(1094)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.095315 355572 task_exit.go:204] [ 4429( 680): 4429( 680)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.095844 355572 usertrap_amd64.go:212] [ 4427( 28): 4427( 28)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.095916 355572 usertrap_amd64.go:122] [ 4427( 28): 4427( 28)] Allocate a new trap: 0xc000b76090 42 D0318 16:20:33.095986 355572 usertrap_amd64.go:212] [ 4425( 678): 4425( 678)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:33.096085 355572 usertrap_amd64.go:122] [ 4425( 678): 4425( 678)] Allocate a new trap: 0xc000dc7b60 43 D0318 16:20:33.096107 355572 usertrap_amd64.go:225] [ 4427( 28): 4427( 28)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.096400 355572 usertrap_amd64.go:225] [ 4425( 678): 4425( 678)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:33.098640 355572 task_exit.go:204] [ 4426(1094): 4426(1094)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.098721 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.099063 355572 task_exit.go:204] [ 4426(1094): 4426(1094)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) D0318 16:20:33.101002 355572 task_exit.go:204] [ 4427( 28): 4427( 28)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.101214 355572 task_signals.go:204] [ 4427( 28): 4431( 29)] Signal 9, PID: 4427, TID: 4431, fault addr: 0x0: terminating thread group D0318 16:20:33.101770 355572 task_exit.go:204] [ 4427( 28): 4427( 28)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.101869 355572 task_exit.go:204] [ 4427( 28): 4431( 29)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.103040 355572 task_exit.go:204] [ 4425( 678): 4425( 678)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.103162 355572 task_signals.go:204] [ 4425( 678): 4428( 679)] Signal 9, PID: 4425, TID: 4428, fault addr: 0x0: terminating thread group D0318 16:20:33.103585 355572 task_exit.go:204] [ 4425( 678): 4425( 678)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.103742 355572 task_exit.go:204] [ 4425( 678): 4428( 679)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.107197 355572 task_exit.go:204] [ 4427( 28): 4431( 29)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.107299 355572 task_exit.go:204] [ 4427( 28): 4431( 29)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.107421 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.107772 355572 task_exit.go:204] [ 4427( 28): 4427( 28)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.108842 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 16:20:33 executing program 0: r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) D0318 16:20:33.109126 355572 task_exit.go:204] [ 4425( 678): 4428( 679)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.109297 355572 task_exit.go:204] [ 4425( 678): 4428( 679)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.109539 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.109829 355572 task_exit.go:204] [ 4425( 678): 4425( 678)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.125750 355572 usertrap_amd64.go:212] [ 4432(1096): 4432(1096)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.125873 355572 usertrap_amd64.go:122] [ 4432(1096): 4432(1096)] Allocate a new trap: 0xc0078f6ed0 37 D0318 16:20:33.126568 355572 usertrap_amd64.go:225] [ 4432(1096): 4432(1096)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.129711 355572 usertrap_amd64.go:212] [ 4432(1096): 4432(1096)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.129782 355572 usertrap_amd64.go:122] [ 4432(1096): 4432(1096)] Allocate a new trap: 0xc0078f6ed0 38 D0318 16:20:33.129879 355572 usertrap_amd64.go:225] [ 4432(1096): 4432(1096)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.132760 355572 usertrap_amd64.go:212] [ 4433( 30): 4433( 30)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.132836 355572 usertrap_amd64.go:122] [ 4433( 30): 4433( 30)] Allocate a new trap: 0xc0009771d0 36 D0318 16:20:33.133344 355572 usertrap_amd64.go:225] [ 4433( 30): 4433( 30)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.133987 355572 usertrap_amd64.go:212] [ 4370(1133): 4370(1133)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.134069 355572 usertrap_amd64.go:122] [ 4370(1133): 4370(1133)] Allocate a new trap: 0xc000527500 44 D0318 16:20:33.134138 355572 usertrap_amd64.go:225] [ 4370(1133): 4370(1133)] Apply the binary patch addr 55ec958b2c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:33.135926 355572 usertrap_amd64.go:212] [ 4433( 30): 4433( 30)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.135999 355572 usertrap_amd64.go:122] [ 4433( 30): 4433( 30)] Allocate a new trap: 0xc0009771d0 37 D0318 16:20:33.136063 355572 usertrap_amd64.go:225] [ 4433( 30): 4433( 30)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.139746 355572 task_exit.go:204] [ 4370(1133): 4370(1133)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.140947 355572 task_signals.go:204] [ 4370(1133): 4374(1134)] Signal 9, PID: 4370, TID: 4374, fault addr: 0x0: terminating thread group D0318 16:20:33.141107 355572 task_exit.go:204] [ 4370(1133): 4374(1134)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.141339 355572 usertrap_amd64.go:212] [ 4432(1096): 4432(1096)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.141402 355572 usertrap_amd64.go:122] [ 4432(1096): 4432(1096)] Allocate a new trap: 0xc0078f6ed0 39 D0318 16:20:33.141421 355572 task_exit.go:204] [ 4370(1133): 4370(1133)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.141473 355572 usertrap_amd64.go:225] [ 4432(1096): 4432(1096)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.146182 355572 task_exit.go:204] [ 4370(1133): 4374(1134)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.146241 355572 task_exit.go:204] [ 4370(1133): 4374(1134)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.146383 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.146935 355572 usertrap_amd64.go:212] [ 4433( 30): 4433( 30)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.147012 355572 usertrap_amd64.go:122] [ 4433( 30): 4433( 30)] Allocate a new trap: 0xc0009771d0 38 D0318 16:20:33.147105 355572 usertrap_amd64.go:225] [ 4433( 30): 4433( 30)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.147792 355572 task_exit.go:204] [ 4370(1133): 4370(1133)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.148431 355572 usertrap_amd64.go:212] [ 4432(1096): 4432(1096)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.148507 355572 usertrap_amd64.go:122] [ 4432(1096): 4432(1096)] Allocate a new trap: 0xc0078f6ed0 40 D0318 16:20:33.148618 355572 usertrap_amd64.go:225] [ 4432(1096): 4432(1096)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) 16:20:33 executing program 3: syz_clone(0x0, &(0x7f0000003bc0), 0x0, 0x0, 0x0, 0x0) 16:20:33 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) D0318 16:20:33.150261 355572 usertrap_amd64.go:212] [ 4432(1096): 4432(1096)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.150364 355572 usertrap_amd64.go:122] [ 4432(1096): 4432(1096)] Allocate a new trap: 0xc0078f6ed0 41 D0318 16:20:33.150475 355572 usertrap_amd64.go:225] [ 4432(1096): 4432(1096)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.151025 355572 usertrap_amd64.go:212] [ 4432(1096): 4434(1097)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.151095 355572 usertrap_amd64.go:122] [ 4432(1096): 4434(1097)] Allocate a new trap: 0xc0078f6ed0 42 D0318 16:20:33.151220 355572 usertrap_amd64.go:225] [ 4432(1096): 4434(1097)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.154453 355572 usertrap_amd64.go:212] [ 4432(1096): 4432(1096)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.154547 355572 usertrap_amd64.go:122] [ 4432(1096): 4432(1096)] Allocate a new trap: 0xc0078f6ed0 43 D0318 16:20:33.154583 355572 usertrap_amd64.go:212] [ 4433( 30): 4433( 30)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.154639 355572 usertrap_amd64.go:122] [ 4433( 30): 4433( 30)] Allocate a new trap: 0xc0009771d0 39 D0318 16:20:33.154608 355572 usertrap_amd64.go:225] [ 4432(1096): 4432(1096)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.154718 355572 usertrap_amd64.go:225] [ 4433( 30): 4433( 30)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.155995 355572 usertrap_amd64.go:212] [ 4433( 30): 4433( 30)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.156090 355572 usertrap_amd64.go:122] [ 4433( 30): 4433( 30)] Allocate a new trap: 0xc0009771d0 40 D0318 16:20:33.156158 355572 usertrap_amd64.go:225] [ 4433( 30): 4433( 30)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.156310 355572 usertrap_amd64.go:212] [ 4433( 30): 4435( 31)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.156483 355572 usertrap_amd64.go:122] [ 4433( 30): 4435( 31)] Allocate a new trap: 0xc0009771d0 41 D0318 16:20:33.156634 355572 usertrap_amd64.go:225] [ 4433( 30): 4435( 31)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.160846 355572 usertrap_amd64.go:212] [ 4433( 30): 4433( 30)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.160939 355572 usertrap_amd64.go:122] [ 4433( 30): 4433( 30)] Allocate a new trap: 0xc0009771d0 42 D0318 16:20:33.161008 355572 usertrap_amd64.go:225] [ 4433( 30): 4433( 30)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.161080 355572 task_exit.go:204] [ 4429( 680): 4429( 680)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.162025 355572 task_signals.go:204] [ 4432(1096): 4434(1097)] Signal 9, PID: 4432, TID: 4434, fault addr: 0x0: terminating thread group D0318 16:20:33.162172 355572 task_exit.go:204] [ 4432(1096): 4434(1097)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.162809 355572 task_exit.go:204] [ 4432(1096): 4434(1097)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.162865 355572 task_exit.go:204] [ 4432(1096): 4434(1097)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.163014 355572 task_exit.go:204] [ 4432(1096): 4432(1096)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.164870 355572 task_exit.go:204] [ 4433( 30): 4433( 30)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.165027 355572 task_signals.go:204] [ 4433( 30): 4435( 31)] Signal 9, PID: 4433, TID: 4435, fault addr: 0x0: terminating thread group D0318 16:20:33.165459 355572 task_exit.go:204] [ 4433( 30): 4433( 30)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.165619 355572 task_exit.go:204] [ 4433( 30): 4435( 31)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.167288 355572 usertrap_amd64.go:212] [ 4436( 681): 4436( 681)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:33.167425 355572 usertrap_amd64.go:122] [ 4436( 681): 4436( 681)] Allocate a new trap: 0xc005d57b90 37 D0318 16:20:33.168118 355572 usertrap_amd64.go:225] [ 4436( 681): 4436( 681)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:33.168894 355572 task_exit.go:204] [ 4432(1096): 4432(1096)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.169002 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.169281 355572 task_exit.go:204] [ 4432(1096): 4432(1096)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.171154 355572 task_exit.go:204] [ 4433( 30): 4435( 31)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.171248 355572 task_exit.go:204] [ 4433( 30): 4435( 31)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.171383 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 16:20:33 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @multicast1}, @address_request}}}}, 0x0) D0318 16:20:33.172245 355572 usertrap_amd64.go:212] [ 4436( 681): 4436( 681)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:33.172329 355572 usertrap_amd64.go:122] [ 4436( 681): 4436( 681)] Allocate a new trap: 0xc005d57b90 38 D0318 16:20:33.172422 355572 task_exit.go:204] [ 4433( 30): 4433( 30)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.172454 355572 usertrap_amd64.go:225] [ 4436( 681): 4436( 681)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) 16:20:33 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8901, &(0x7f0000000040)) D0318 16:20:33.179624 355572 usertrap_amd64.go:212] [ 4437(1135): 4437(1135)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.179722 355572 usertrap_amd64.go:122] [ 4437(1135): 4437(1135)] Allocate a new trap: 0xc005d57bc0 37 D0318 16:20:33.180471 355572 usertrap_amd64.go:225] [ 4437(1135): 4437(1135)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.184046 355572 usertrap_amd64.go:212] [ 4437(1135): 4437(1135)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.184135 355572 usertrap_amd64.go:122] [ 4437(1135): 4437(1135)] Allocate a new trap: 0xc005d57bc0 38 D0318 16:20:33.184204 355572 usertrap_amd64.go:225] [ 4437(1135): 4437(1135)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.192581 355572 usertrap_amd64.go:212] [ 4436( 681): 4436( 681)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:33.192693 355572 usertrap_amd64.go:122] [ 4436( 681): 4436( 681)] Allocate a new trap: 0xc005d57b90 39 D0318 16:20:33.192836 355572 usertrap_amd64.go:225] [ 4436( 681): 4436( 681)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:33.198016 355572 usertrap_amd64.go:212] [ 4437(1135): 4437(1135)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.198150 355572 usertrap_amd64.go:122] [ 4437(1135): 4437(1135)] Allocate a new trap: 0xc005d57bc0 39 D0318 16:20:33.198297 355572 usertrap_amd64.go:225] [ 4437(1135): 4437(1135)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.198700 355572 usertrap_amd64.go:212] [ 4438(1098): 4438(1098)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.198813 355572 usertrap_amd64.go:122] [ 4438(1098): 4438(1098)] Allocate a new trap: 0xc0002d2db0 37 D0318 16:20:33.199440 355572 usertrap_amd64.go:225] [ 4438(1098): 4438(1098)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.200319 355572 usertrap_amd64.go:212] [ 4439( 32): 4439( 32)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.200521 355572 usertrap_amd64.go:122] [ 4439( 32): 4439( 32)] Allocate a new trap: 0xc005d57bf0 36 D0318 16:20:33.201327 355572 usertrap_amd64.go:225] [ 4439( 32): 4439( 32)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.202855 355572 usertrap_amd64.go:212] [ 4436( 681): 4436( 681)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:33.202929 355572 usertrap_amd64.go:122] [ 4436( 681): 4436( 681)] Allocate a new trap: 0xc005d57b90 40 D0318 16:20:33.203012 355572 usertrap_amd64.go:225] [ 4436( 681): 4436( 681)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:33.204876 355572 usertrap_amd64.go:212] [ 4438(1098): 4438(1098)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.204978 355572 usertrap_amd64.go:122] [ 4438(1098): 4438(1098)] Allocate a new trap: 0xc0002d2db0 38 D0318 16:20:33.205005 355572 usertrap_amd64.go:212] [ 4439( 32): 4439( 32)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.205015 355572 usertrap_amd64.go:212] [ 4436( 681): 4436( 681)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:33.205071 355572 usertrap_amd64.go:225] [ 4438(1098): 4438(1098)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.205071 355572 usertrap_amd64.go:122] [ 4439( 32): 4439( 32)] Allocate a new trap: 0xc005d57bf0 37 D0318 16:20:33.205120 355572 usertrap_amd64.go:122] [ 4436( 681): 4436( 681)] Allocate a new trap: 0xc005d57b90 41 D0318 16:20:33.205176 355572 usertrap_amd64.go:225] [ 4439( 32): 4439( 32)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.205226 355572 usertrap_amd64.go:225] [ 4436( 681): 4436( 681)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:33.205395 355572 usertrap_amd64.go:212] [ 4436( 681): 4440( 682)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:33.205445 355572 usertrap_amd64.go:122] [ 4436( 681): 4440( 682)] Allocate a new trap: 0xc005d57b90 42 D0318 16:20:33.205509 355572 usertrap_amd64.go:225] [ 4436( 681): 4440( 682)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:33.205756 355572 usertrap_amd64.go:212] [ 4437(1135): 4437(1135)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.205810 355572 usertrap_amd64.go:122] [ 4437(1135): 4437(1135)] Allocate a new trap: 0xc005d57bc0 40 D0318 16:20:33.205862 355572 usertrap_amd64.go:225] [ 4437(1135): 4437(1135)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.207488 355572 usertrap_amd64.go:212] [ 4437(1135): 4437(1135)] Found the pattern at ip 55ec95888c10:sysno 14 I0318 16:20:33.207555 355572 compat.go:120] Unsupported syscall shmctl(0x4,0xc,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/shmctl for more information. D0318 16:20:33.207654 355572 usertrap_amd64.go:122] [ 4437(1135): 4437(1135)] Allocate a new trap: 0xc005d57bc0 41 D0318 16:20:33.207854 355572 usertrap_amd64.go:225] [ 4437(1135): 4437(1135)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.208012 355572 usertrap_amd64.go:212] [ 4437(1135): 4441(1136)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.208123 355572 usertrap_amd64.go:122] [ 4437(1135): 4441(1136)] Allocate a new trap: 0xc005d57bc0 42 D0318 16:20:33.208192 355572 usertrap_amd64.go:225] [ 4437(1135): 4441(1136)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.208628 355572 usertrap_amd64.go:212] [ 4436( 681): 4436( 681)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:33.208717 355572 usertrap_amd64.go:122] [ 4436( 681): 4436( 681)] Allocate a new trap: 0xc005d57b90 43 D0318 16:20:33.208812 355572 usertrap_amd64.go:225] [ 4436( 681): 4436( 681)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:33.215449 355572 task_signals.go:204] [ 4436( 681): 4440( 682)] Signal 9, PID: 4436, TID: 4440, fault addr: 0x0: terminating thread group D0318 16:20:33.215685 355572 task_exit.go:204] [ 4436( 681): 4440( 682)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.216356 355572 task_exit.go:204] [ 4436( 681): 4440( 682)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.216411 355572 task_exit.go:204] [ 4436( 681): 4440( 682)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.216504 355572 task_run.go:306] [ 4442(1137): 4442(1137)] Unhandled user fault: addr=0 ip=0 access=r-x sig=11 err=bad address D0318 16:20:33.216612 355572 task_exit.go:204] [ 4436( 681): 4436( 681)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.216638 355572 task_log.go:87] [ 4442(1137): 4442(1137)] Registers: D0318 16:20:33.216701 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Cs = 0000000000000033 D0318 16:20:33.216768 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Ds = 0000000000000000 D0318 16:20:33.216817 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Eflags = 0000000000010217 D0318 16:20:33.216846 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Es = 0000000000000000 D0318 16:20:33.216922 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Fs = 0000000000000000 D0318 16:20:33.216948 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Fs_base = 00007eeae2c876c0 D0318 16:20:33.216978 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Gs = 0000000000000000 D0318 16:20:33.217026 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Gs_base = 0000000000000000 D0318 16:20:33.217078 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Orig_rax = ffffffffffffffff D0318 16:20:33.217129 355572 task_log.go:94] [ 4442(1137): 4442(1137)] R10 = 0000000000000000 D0318 16:20:33.217153 355572 task_log.go:94] [ 4442(1137): 4442(1137)] R11 = 0000000000000246 D0318 16:20:33.217201 355572 task_log.go:94] [ 4442(1137): 4442(1137)] R12 = 0000000000000000 D0318 16:20:33.217252 355572 task_log.go:94] [ 4442(1137): 4442(1137)] R13 = 000000000000000b D0318 16:20:33.217273 355572 task_log.go:94] [ 4442(1137): 4442(1137)] R14 = 000055ec959e1f80 D0318 16:20:33.217295 355572 task_log.go:94] [ 4442(1137): 4442(1137)] R15 = 00007eecefa05228 D0318 16:20:33.217350 355572 task_log.go:94] [ 4442(1137): 4442(1137)] R8 = 0000000000000000 D0318 16:20:33.217396 355572 task_log.go:94] [ 4442(1137): 4442(1137)] R9 = 0000000000000000 D0318 16:20:33.217425 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Rax = 0000000000000000 D0318 16:20:33.217469 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Rbp = 000055ec9590047a D0318 16:20:33.217557 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Rbx = 000055ec959e1f80 D0318 16:20:33.217597 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Rcx = 000055ec958b3da9 D0318 16:20:33.217635 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Rdi = 0000000000000000 D0318 16:20:33.217673 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Rdx = 0000000000000000 D0318 16:20:33.217734 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Rip = 0000000000000000 D0318 16:20:33.217797 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Rsi = 0000000020003bc0 D0318 16:20:33.217839 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Rsp = 0000000020003bc8 D0318 16:20:33.217889 355572 task_log.go:94] [ 4442(1137): 4442(1137)] Ss = 000000000000002b D0318 16:20:33.217927 355572 task_log.go:111] [ 4442(1137): 4442(1137)] Stack: D0318 16:20:33.218065 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003bc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218137 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003bd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218180 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218238 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218290 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218350 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218410 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218468 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218602 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218758 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218824 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218888 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.218989 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219073 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003c90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219161 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003ca0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219233 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219284 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219392 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219491 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219562 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219652 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219716 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219829 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219884 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219942 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.219996 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220076 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220162 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220225 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220265 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220324 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003da0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220412 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220486 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220548 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003dd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220601 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003de0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220693 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003df0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220781 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220849 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220892 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.220936 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221019 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221084 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221159 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221224 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221358 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221442 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221534 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221621 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221667 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221708 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221898 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.221960 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003ef0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222019 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222056 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222086 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222124 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222154 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222212 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222255 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222312 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222382 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222419 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222490 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222554 355572 task_log.go:128] [ 4442(1137): 4442(1137)] 20003fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:33.222603 355572 task_log.go:149] [ 4442(1137): 4442(1137)] Code: D0318 16:20:33.222642 355572 task_log.go:170] [ 4442(1137): 4442(1137)] Error reading stack at address ffffffffffffffc0: bad address D0318 16:20:33.223366 355572 task_exit.go:204] [ 4436( 681): 4436( 681)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.223478 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.223871 355572 task_exit.go:204] [ 4436( 681): 4436( 681)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.222710 355572 task_log.go:71] [ 4442(1137): 4442(1137)] Mappings: VMAs: 00066000-0006b000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2f620000-1b2f660000 rw-s 00000000 00:05 9 /memfd:syz-shared-mem (deleted) 55ec95836000-55ec9585b000 r--p 00000000 00:11 8 /syz-executor 55ec9585b000-55ec958ff000 r-xp 00025000 00:11 8 /syz-executor 55ec958ff000-55ec959af000 r--p 000c9000 00:11 8 /syz-executor 55ec959af000-55ec959b8000 rw-p 00179000 00:11 8 /syz-executor 55ec959c6000-55ec96512000 rw-p 00000000 00:00 0 55ec96512000-55ec96534000 rw-p 00000000 00:00 0 [heap] 7eeae2800000-7eeae2c00000 r--p 00000000 00:05 8 /memfd:syz-shared-mem (deleted) 7eeae2c67000-7eeae2c68000 ---p 00000000 00:00 0 7eeae2c68000-7eeae2c88000 rw-p 00000000 00:00 0 7eeae2c88000-7eeae2c89000 r--p 00000000 00:00 0 [vvar] 7eeae2c89000-7eeae2c8b000 r-xp 00000000 00:00 0 7eecef206000-7eecefa06000 rw-p 00000000 00:00 0 [stack] PMAs: 00066000-00067000 r-xp 1278a000 *pgalloc.MemoryFile 00067000-0006b000 r-xp 1279e000 *pgalloc.MemoryFile 20000000-20200000 rwxp 29000000 *pgalloc.MemoryFile 55ec95836000-55ec9585b000 r--p 17252000 *pgalloc.MemoryFile 55ec95877000-55ec95878000 r-xp 12898000 *pgalloc.MemoryFile 55ec95888000-55ec95889000 r-xp 1298d000 *pgalloc.MemoryFile 55ec958b0000-55ec958b1000 r-xp 12845000 *pgalloc.MemoryFile 55ec958b1000-55ec958b2000 r-xp 127f9000 *pgalloc.MemoryFile 55ec958b2000-55ec958b3000 r-xp 127fb000 *pgalloc.MemoryFile 55ec958b3000-55ec958b4000 r-xp 127e3000 *pgalloc.MemoryFile 55ec958b5000-55ec958b6000 r-xp 127f6000 *pgalloc.MemoryFile 55ec958bd000-55ec958be000 r-xp 0bcd6000 *pgalloc.MemoryFile 55ec958cd000-55ec958ce000 r-xp 0bd76000 *pgalloc.MemoryFile 55ec958df000-55ec958e0000 r-xp 127da000 *pgalloc.MemoryFile 55ec958fe000-55ec958ff000 r-xp 065ff000 *pgalloc.MemoryFile 55ec958ff000-55ec95953000 r--p 18546000 *pgalloc.MemoryFile 55ec95953000-55ec959b8000 r--p 1ac00000 *pgalloc.MemoryFile 55ec959c6000-55ec95a00000 r--p 1713f000 *pgalloc.MemoryFile 55ec96400000-55ec96512000 r--p 245fb000 *pgalloc.MemoryFile 55ec96512000-55ec96513000 r--p 00bff000 *pgalloc.MemoryFile 55ec96513000-55ec96534000 r--p 19c87000 *pgalloc.MemoryFile 7eeae2c68000-7eeae2c88000 r--p 18fe0000 *pgalloc.MemoryFile 7eecefa00000-7eecefa02000 r--p 12782000 *pgalloc.MemoryFile 7eecefa02000-7eecefa04000 r--p 1278c000 *pgalloc.MemoryFile 7eecefa04000-7eecefa06000 r--p 12608000 *pgalloc.MemoryFile D0318 16:20:33.224260 355572 usertrap_amd64.go:212] [ 4438(1098): 4438(1098)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.224340 355572 usertrap_amd64.go:122] [ 4438(1098): 4438(1098)] Allocate a new trap: 0xc0002d2db0 39 D0318 16:20:33.224402 355572 usertrap_amd64.go:225] [ 4438(1098): 4438(1098)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.224247 355572 task_log.go:73] [ 4442(1137): 4442(1137)] FDTable: fd:201 => name / fd:0 => name pipe:[15] fd:1 => name pipe:[15] fd:2 => name pipe:[15] fd:200 => name /dev/net/tun D0318 16:20:33.224654 355572 task_signals.go:470] [ 4442(1137): 4442(1137)] Notified of signal 11 D0318 16:20:33.224747 355572 task_signals.go:220] [ 4442(1137): 4442(1137)] Signal 11: delivering to handler D0318 16:20:33.225046 355572 usertrap_amd64.go:212] [ 4439( 32): 4439( 32)] Found the pattern at ip 55e9c2741ca2:sysno 14 16:20:33 executing program 2: timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_ROPEN(r0, 0x0, 0x0) close(r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/udp6\x00') D0318 16:20:33.225141 355572 usertrap_amd64.go:122] [ 4439( 32): 4439( 32)] Allocate a new trap: 0xc005d57bf0 38 D0318 16:20:33.225244 355572 usertrap_amd64.go:225] [ 4439( 32): 4439( 32)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.226130 355572 task_exit.go:204] [ 4442(1137): 4442(1137)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.228258 355572 usertrap_amd64.go:212] [ 4437(1135): 4437(1135)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.228333 355572 usertrap_amd64.go:122] [ 4437(1135): 4437(1135)] Allocate a new trap: 0xc005d57bc0 43 D0318 16:20:33.228651 355572 usertrap_amd64.go:225] [ 4437(1135): 4437(1135)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.230472 355572 task_exit.go:204] [ 4442(1137): 4442(1137)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.234076 355572 task_exit.go:204] [ 4437(1135): 4437(1135)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.234260 355572 task_signals.go:204] [ 4437(1135): 4441(1136)] Signal 9, PID: 4437, TID: 4441, fault addr: 0x0: terminating thread group D0318 16:20:33.234851 355572 task_exit.go:204] [ 4437(1135): 4441(1136)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.235374 355572 task_exit.go:204] [ 4437(1135): 4437(1135)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.235984 355572 usertrap_amd64.go:212] [ 4439( 32): 4439( 32)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.236123 355572 usertrap_amd64.go:122] [ 4439( 32): 4439( 32)] Allocate a new trap: 0xc005d57bf0 39 D0318 16:20:33.236224 355572 usertrap_amd64.go:225] [ 4439( 32): 4439( 32)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.237817 355572 usertrap_amd64.go:212] [ 4438(1098): 4438(1098)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.237906 355572 usertrap_amd64.go:122] [ 4438(1098): 4438(1098)] Allocate a new trap: 0xc0002d2db0 40 D0318 16:20:33.238035 355572 usertrap_amd64.go:225] [ 4438(1098): 4438(1098)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.238280 355572 usertrap_amd64.go:212] [ 4439( 32): 4439( 32)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.238356 355572 usertrap_amd64.go:122] [ 4439( 32): 4439( 32)] Allocate a new trap: 0xc005d57bf0 40 D0318 16:20:33.238471 355572 usertrap_amd64.go:225] [ 4439( 32): 4439( 32)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.238752 355572 usertrap_amd64.go:212] [ 4439( 32): 4443( 33)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.238909 355572 usertrap_amd64.go:122] [ 4439( 32): 4443( 33)] Allocate a new trap: 0xc005d57bf0 41 D0318 16:20:33.239061 355572 usertrap_amd64.go:225] [ 4439( 32): 4443( 33)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.239569 355572 usertrap_amd64.go:212] [ 4438(1098): 4438(1098)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.239656 355572 usertrap_amd64.go:122] [ 4438(1098): 4438(1098)] Allocate a new trap: 0xc0002d2db0 41 D0318 16:20:33.239759 355572 usertrap_amd64.go:225] [ 4438(1098): 4438(1098)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.240228 355572 usertrap_amd64.go:212] [ 4438(1098): 4444(1099)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.240323 355572 usertrap_amd64.go:122] [ 4438(1098): 4444(1099)] Allocate a new trap: 0xc0002d2db0 42 D0318 16:20:33.240436 355572 usertrap_amd64.go:225] [ 4438(1098): 4444(1099)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.241096 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.241182 355572 task_exit.go:204] [ 4437(1135): 4441(1136)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.241245 355572 task_exit.go:204] [ 4437(1135): 4441(1136)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.241333 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.241719 355572 usertrap_amd64.go:212] [ 4438(1098): 4444(1099)] Found the pattern at ip 562e85cf5ae8:sysno 1 D0318 16:20:33.241800 355572 usertrap_amd64.go:122] [ 4438(1098): 4444(1099)] Allocate a new trap: 0xc0002d2db0 43 D0318 16:20:33.241867 355572 usertrap_amd64.go:225] [ 4438(1098): 4444(1099)] Apply the binary patch addr 562e85cf5ae8 trap addr 66d70 ([184 1 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.241963 355572 usertrap_amd64.go:212] [ 4439( 32): 4439( 32)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.242010 355572 usertrap_amd64.go:122] [ 4439( 32): 4439( 32)] Allocate a new trap: 0xc005d57bf0 42 D0318 16:20:33.242137 355572 usertrap_amd64.go:225] [ 4439( 32): 4439( 32)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.243103 355572 task_exit.go:204] [ 4437(1135): 4437(1135)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 3: mq_open(&(0x7f0000000280)='!\x00kl\r\x9b\x04\x8f5s\xdf\x87]\x85\x121\xc2\xb4eT\xd0\xdf\x82I=\a\x8e}\x9e\xfa\xfb\xcez\xae\xbag6c\x14[\x9ex\x01\xed\xe1c\xf8#\xd7g\x11\xd5@p\x97\x8b\xfbo\xf2w\xd4\x19\xc1\xdb\x98\x99\x1a\nI\x12\xbe\x93\x12\xd5\x00^ht\fQ\xc1K\x17<\xf2\b \xe5\xf9\xd8:6\xd7\xc9\xdc\xdd\x16\xc3\t\xbem\xc5\x93\xb2%\x93RC\x00'/323, 0x800, 0x8, 0x0) D0318 16:20:33.245911 355572 usertrap_amd64.go:212] [ 4438(1098): 4438(1098)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.245996 355572 usertrap_amd64.go:122] [ 4438(1098): 4438(1098)] Allocate a new trap: 0xc0002d2db0 44 D0318 16:20:33.246119 355572 usertrap_amd64.go:225] [ 4438(1098): 4438(1098)] Apply the binary patch addr 562e85cf5c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:33.248476 355572 task_exit.go:204] [ 4439( 32): 4439( 32)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.248627 355572 task_signals.go:204] [ 4439( 32): 4443( 33)] Signal 9, PID: 4439, TID: 4443, fault addr: 0x0: terminating thread group D0318 16:20:33.249287 355572 task_exit.go:204] [ 4439( 32): 4439( 32)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.249401 355572 task_signals.go:204] [ 4438(1098): 4444(1099)] Signal 9, PID: 4438, TID: 4444, fault addr: 0x0: terminating thread group D0318 16:20:33.249462 355572 task_exit.go:204] [ 4438(1098): 4438(1098)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.250093 355572 task_exit.go:204] [ 4438(1098): 4438(1098)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.250190 355572 task_exit.go:204] [ 4439( 32): 4443( 33)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.250328 355572 task_exit.go:204] [ 4438(1098): 4444(1099)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.254888 355572 usertrap_amd64.go:212] [ 4445( 683): 4445( 683)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:33.255112 355572 usertrap_amd64.go:122] [ 4445( 683): 4445( 683)] Allocate a new trap: 0xc000bcf230 37 D0318 16:20:33.255682 355572 task_exit.go:204] [ 4438(1098): 4444(1099)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.255773 355572 task_exit.go:204] [ 4438(1098): 4444(1099)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.255931 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.256073 355572 usertrap_amd64.go:225] [ 4445( 683): 4445( 683)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:33.256278 355572 task_exit.go:204] [ 4438(1098): 4438(1098)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.257009 355572 task_exit.go:204] [ 4439( 32): 4443( 33)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.257102 355572 task_exit.go:204] [ 4439( 32): 4443( 33)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.257192 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.257350 355572 task_exit.go:204] [ 4439( 32): 4439( 32)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.260052 355572 usertrap_amd64.go:212] [ 4445( 683): 4445( 683)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:33.260158 355572 usertrap_amd64.go:122] [ 4445( 683): 4445( 683)] Allocate a new trap: 0xc000bcf230 38 D0318 16:20:33.260258 355572 usertrap_amd64.go:225] [ 4445( 683): 4445( 683)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) 16:20:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000980)='./file0\x00', 0x0) mount$9p_unix(&(0x7f00000041c0)='./file0\x00', &(0x7f0000004200)='./file0\x00', 0x0, 0xd002, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x40004, 0x0) 16:20:33 executing program 0: getresuid(&(0x7f0000003f80), &(0x7f0000003fc0), &(0x7f0000004000)) D0318 16:20:33.264084 355572 task_exit.go:204] [ 4442(1137): 4442(1137)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.271969 355572 usertrap_amd64.go:212] [ 4446(1138): 4446(1138)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.272071 355572 usertrap_amd64.go:122] [ 4446(1138): 4446(1138)] Allocate a new trap: 0xc000f9ff20 37 D0318 16:20:33.272699 355572 usertrap_amd64.go:225] [ 4446(1138): 4446(1138)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.275731 355572 usertrap_amd64.go:212] [ 4446(1138): 4446(1138)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.275821 355572 usertrap_amd64.go:122] [ 4446(1138): 4446(1138)] Allocate a new trap: 0xc000f9ff20 38 D0318 16:20:33.275904 355572 usertrap_amd64.go:225] [ 4446(1138): 4446(1138)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.281564 355572 usertrap_amd64.go:212] [ 4445( 683): 4445( 683)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:33.281641 355572 usertrap_amd64.go:122] [ 4445( 683): 4445( 683)] Allocate a new trap: 0xc000bcf230 39 D0318 16:20:33.281739 355572 usertrap_amd64.go:225] [ 4445( 683): 4445( 683)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:33.290106 355572 usertrap_amd64.go:212] [ 4446(1138): 4446(1138)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.290215 355572 usertrap_amd64.go:122] [ 4446(1138): 4446(1138)] Allocate a new trap: 0xc000f9ff20 39 D0318 16:20:33.290296 355572 usertrap_amd64.go:225] [ 4446(1138): 4446(1138)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.290807 355572 usertrap_amd64.go:212] [ 4445( 683): 4445( 683)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:33.290872 355572 usertrap_amd64.go:122] [ 4445( 683): 4445( 683)] Allocate a new trap: 0xc000bcf230 40 D0318 16:20:33.290936 355572 usertrap_amd64.go:225] [ 4445( 683): 4445( 683)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:33.290948 355572 usertrap_amd64.go:212] [ 4447( 34): 4447( 34)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.291039 355572 usertrap_amd64.go:122] [ 4447( 34): 4447( 34)] Allocate a new trap: 0xc00637d9e0 36 D0318 16:20:33.291715 355572 usertrap_amd64.go:212] [ 4448(1100): 4448(1100)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.291737 355572 usertrap_amd64.go:225] [ 4447( 34): 4447( 34)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.291798 355572 usertrap_amd64.go:122] [ 4448(1100): 4448(1100)] Allocate a new trap: 0xc005729650 37 D0318 16:20:33.292397 355572 usertrap_amd64.go:225] [ 4448(1100): 4448(1100)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.292549 355572 usertrap_amd64.go:212] [ 4445( 683): 4445( 683)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:33.292601 355572 usertrap_amd64.go:122] [ 4445( 683): 4445( 683)] Allocate a new trap: 0xc000bcf230 41 D0318 16:20:33.292670 355572 usertrap_amd64.go:225] [ 4445( 683): 4445( 683)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:33.292809 355572 usertrap_amd64.go:212] [ 4445( 683): 4449( 684)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:33.292862 355572 usertrap_amd64.go:122] [ 4445( 683): 4449( 684)] Allocate a new trap: 0xc000bcf230 42 D0318 16:20:33.292975 355572 usertrap_amd64.go:225] [ 4445( 683): 4449( 684)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:33.294760 355572 usertrap_amd64.go:212] [ 4447( 34): 4447( 34)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.294850 355572 usertrap_amd64.go:122] [ 4447( 34): 4447( 34)] Allocate a new trap: 0xc00637d9e0 37 D0318 16:20:33.294924 355572 usertrap_amd64.go:225] [ 4447( 34): 4447( 34)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.295349 355572 usertrap_amd64.go:212] [ 4448(1100): 4448(1100)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.295446 355572 usertrap_amd64.go:122] [ 4448(1100): 4448(1100)] Allocate a new trap: 0xc005729650 38 D0318 16:20:33.295574 355572 usertrap_amd64.go:225] [ 4448(1100): 4448(1100)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.296926 355572 usertrap_amd64.go:212] [ 4446(1138): 4446(1138)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.297020 355572 usertrap_amd64.go:122] [ 4446(1138): 4446(1138)] Allocate a new trap: 0xc000f9ff20 40 D0318 16:20:33.297077 355572 usertrap_amd64.go:225] [ 4446(1138): 4446(1138)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.298243 355572 usertrap_amd64.go:212] [ 4446(1138): 4446(1138)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:33.298332 355572 usertrap_amd64.go:122] [ 4446(1138): 4446(1138)] Allocate a new trap: 0xc000f9ff20 41 D0318 16:20:33.298401 355572 usertrap_amd64.go:225] [ 4446(1138): 4446(1138)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.298567 355572 usertrap_amd64.go:212] [ 4446(1138): 4450(1139)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.298654 355572 usertrap_amd64.go:122] [ 4446(1138): 4450(1139)] Allocate a new trap: 0xc000f9ff20 42 D0318 16:20:33.298720 355572 usertrap_amd64.go:225] [ 4446(1138): 4450(1139)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.299960 355572 usertrap_amd64.go:212] [ 4446(1138): 4446(1138)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.300032 355572 usertrap_amd64.go:122] [ 4446(1138): 4446(1138)] Allocate a new trap: 0xc000f9ff20 43 D0318 16:20:33.300097 355572 usertrap_amd64.go:225] [ 4446(1138): 4446(1138)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.303888 355572 task_exit.go:204] [ 4446(1138): 4446(1138)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.304156 355572 task_signals.go:204] [ 4446(1138): 4450(1139)] Signal 9, PID: 4446, TID: 4450, fault addr: 0x0: terminating thread group D0318 16:20:33.304529 355572 task_exit.go:204] [ 4446(1138): 4446(1138)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.304686 355572 task_exit.go:204] [ 4446(1138): 4450(1139)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.306365 355572 usertrap_amd64.go:212] [ 4447( 34): 4447( 34)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.306456 355572 usertrap_amd64.go:122] [ 4447( 34): 4447( 34)] Allocate a new trap: 0xc00637d9e0 38 D0318 16:20:33.306517 355572 usertrap_amd64.go:225] [ 4447( 34): 4447( 34)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.308806 355572 usertrap_amd64.go:212] [ 4448(1100): 4448(1100)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.308885 355572 usertrap_amd64.go:122] [ 4448(1100): 4448(1100)] Allocate a new trap: 0xc005729650 39 D0318 16:20:33.308961 355572 usertrap_amd64.go:225] [ 4448(1100): 4448(1100)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.309238 355572 task_exit.go:204] [ 4446(1138): 4450(1139)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.309309 355572 task_exit.go:204] [ 4446(1138): 4450(1139)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.309439 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.309527 355572 task_exit.go:204] [ 4446(1138): 4446(1138)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000002140), 0x301000, 0x0) D0318 16:20:33.316203 355572 usertrap_amd64.go:212] [ 4448(1100): 4448(1100)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.316313 355572 usertrap_amd64.go:122] [ 4448(1100): 4448(1100)] Allocate a new trap: 0xc005729650 40 D0318 16:20:33.316382 355572 usertrap_amd64.go:225] [ 4448(1100): 4448(1100)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.317909 355572 usertrap_amd64.go:212] [ 4448(1100): 4448(1100)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.317990 355572 usertrap_amd64.go:122] [ 4448(1100): 4448(1100)] Allocate a new trap: 0xc005729650 41 D0318 16:20:33.318062 355572 usertrap_amd64.go:225] [ 4448(1100): 4448(1100)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.318224 355572 usertrap_amd64.go:212] [ 4448(1100): 4451(1101)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.318299 355572 usertrap_amd64.go:122] [ 4448(1100): 4451(1101)] Allocate a new trap: 0xc005729650 42 D0318 16:20:33.318449 355572 usertrap_amd64.go:225] [ 4448(1100): 4451(1101)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.319025 355572 usertrap_amd64.go:212] [ 4447( 34): 4447( 34)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.319126 355572 usertrap_amd64.go:122] [ 4447( 34): 4447( 34)] Allocate a new trap: 0xc00637d9e0 39 D0318 16:20:33.319259 355572 usertrap_amd64.go:225] [ 4447( 34): 4447( 34)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.320623 355572 usertrap_amd64.go:212] [ 4447( 34): 4447( 34)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.320705 355572 usertrap_amd64.go:122] [ 4447( 34): 4447( 34)] Allocate a new trap: 0xc00637d9e0 40 D0318 16:20:33.320757 355572 usertrap_amd64.go:225] [ 4447( 34): 4447( 34)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.321212 355572 usertrap_amd64.go:212] [ 4447( 34): 4452( 35)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.321286 355572 usertrap_amd64.go:122] [ 4447( 34): 4452( 35)] Allocate a new trap: 0xc00637d9e0 41 D0318 16:20:33.321367 355572 usertrap_amd64.go:225] [ 4447( 34): 4452( 35)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.322086 355572 usertrap_amd64.go:212] [ 4448(1100): 4448(1100)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.322170 355572 usertrap_amd64.go:122] [ 4448(1100): 4448(1100)] Allocate a new trap: 0xc005729650 43 D0318 16:20:33.322248 355572 usertrap_amd64.go:225] [ 4448(1100): 4448(1100)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.323038 355572 usertrap_amd64.go:212] [ 4447( 34): 4447( 34)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.323136 355572 usertrap_amd64.go:122] [ 4447( 34): 4447( 34)] Allocate a new trap: 0xc00637d9e0 42 D0318 16:20:33.323285 355572 usertrap_amd64.go:225] [ 4447( 34): 4447( 34)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.327659 355572 task_exit.go:204] [ 4447( 34): 4447( 34)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.328395 355572 task_exit.go:204] [ 4447( 34): 4447( 34)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.328407 355572 task_signals.go:204] [ 4447( 34): 4452( 35)] Signal 9, PID: 4447, TID: 4452, fault addr: 0x0: terminating thread group D0318 16:20:33.328590 355572 task_exit.go:204] [ 4447( 34): 4452( 35)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.329014 355572 task_exit.go:204] [ 4448(1100): 4448(1100)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.329212 355572 task_signals.go:204] [ 4448(1100): 4451(1101)] Signal 9, PID: 4448, TID: 4451, fault addr: 0x0: terminating thread group D0318 16:20:33.329671 355572 task_exit.go:204] [ 4448(1100): 4448(1100)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.329898 355572 task_exit.go:204] [ 4448(1100): 4451(1101)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.334468 355572 task_exit.go:204] [ 4447( 34): 4452( 35)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.334559 355572 task_exit.go:204] [ 4447( 34): 4452( 35)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.334666 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.335013 355572 usertrap_amd64.go:212] [ 4453(1140): 4453(1140)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.335135 355572 usertrap_amd64.go:122] [ 4453(1140): 4453(1140)] Allocate a new trap: 0xc005e172c0 37 D0318 16:20:33.335546 355572 task_exit.go:204] [ 4448(1100): 4451(1101)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.335688 355572 task_exit.go:204] [ 4448(1100): 4451(1101)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.335838 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.335889 355572 usertrap_amd64.go:225] [ 4453(1140): 4453(1140)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.336033 355572 task_exit.go:204] [ 4447( 34): 4447( 34)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.336305 355572 task_exit.go:204] [ 4448(1100): 4448(1100)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 0: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 16:20:33 executing program 1: r0 = mq_open(&(0x7f0000000a40)='!\x00', 0x0, 0x0, 0x0) tee(0xffffffffffffffff, r0, 0x0, 0x0) D0318 16:20:33.339976 355572 usertrap_amd64.go:212] [ 4453(1140): 4453(1140)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.340076 355572 usertrap_amd64.go:122] [ 4453(1140): 4453(1140)] Allocate a new trap: 0xc005e172c0 38 D0318 16:20:33.340207 355572 usertrap_amd64.go:225] [ 4453(1140): 4453(1140)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.354461 355572 usertrap_amd64.go:212] [ 4453(1140): 4453(1140)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.354666 355572 usertrap_amd64.go:122] [ 4453(1140): 4453(1140)] Allocate a new trap: 0xc005e172c0 39 D0318 16:20:33.354795 355572 usertrap_amd64.go:225] [ 4453(1140): 4453(1140)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.361200 355572 usertrap_amd64.go:212] [ 4455( 36): 4455( 36)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.361343 355572 usertrap_amd64.go:122] [ 4455( 36): 4455( 36)] Allocate a new trap: 0xc000dc7d70 36 D0318 16:20:33.361975 355572 usertrap_amd64.go:212] [ 4453(1140): 4453(1140)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.362064 355572 usertrap_amd64.go:122] [ 4453(1140): 4453(1140)] Allocate a new trap: 0xc005e172c0 40 D0318 16:20:33.362184 355572 usertrap_amd64.go:225] [ 4453(1140): 4453(1140)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.362220 355572 usertrap_amd64.go:225] [ 4455( 36): 4455( 36)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.362732 355572 usertrap_amd64.go:212] [ 4456(1102): 4456(1102)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.362806 355572 usertrap_amd64.go:122] [ 4456(1102): 4456(1102)] Allocate a new trap: 0xc000e1dce0 37 D0318 16:20:33.363400 355572 usertrap_amd64.go:225] [ 4456(1102): 4456(1102)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.363790 355572 usertrap_amd64.go:212] [ 4453(1140): 4453(1140)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:33.363840 355572 usertrap_amd64.go:122] [ 4453(1140): 4453(1140)] Allocate a new trap: 0xc005e172c0 41 D0318 16:20:33.363912 355572 usertrap_amd64.go:225] [ 4453(1140): 4453(1140)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.364176 355572 usertrap_amd64.go:212] [ 4453(1140): 4457(1141)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.364229 355572 usertrap_amd64.go:122] [ 4453(1140): 4457(1141)] Allocate a new trap: 0xc005e172c0 42 D0318 16:20:33.364303 355572 usertrap_amd64.go:225] [ 4453(1140): 4457(1141)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.365640 355572 usertrap_amd64.go:212] [ 4455( 36): 4455( 36)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.365730 355572 usertrap_amd64.go:122] [ 4455( 36): 4455( 36)] Allocate a new trap: 0xc000dc7d70 37 D0318 16:20:33.365815 355572 usertrap_amd64.go:225] [ 4455( 36): 4455( 36)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.366268 355572 usertrap_amd64.go:212] [ 4453(1140): 4453(1140)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.366364 355572 usertrap_amd64.go:122] [ 4453(1140): 4453(1140)] Allocate a new trap: 0xc005e172c0 43 D0318 16:20:33.366456 355572 usertrap_amd64.go:225] [ 4453(1140): 4453(1140)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.367080 355572 usertrap_amd64.go:212] [ 4456(1102): 4456(1102)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.367177 355572 usertrap_amd64.go:122] [ 4456(1102): 4456(1102)] Allocate a new trap: 0xc000e1dce0 38 D0318 16:20:33.367272 355572 usertrap_amd64.go:225] [ 4456(1102): 4456(1102)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.370926 355572 task_exit.go:204] [ 4453(1140): 4453(1140)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.371165 355572 task_signals.go:204] [ 4453(1140): 4457(1141)] Signal 9, PID: 4453, TID: 4457, fault addr: 0x0: terminating thread group D0318 16:20:33.371462 355572 task_exit.go:204] [ 4453(1140): 4453(1140)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.371573 355572 task_exit.go:204] [ 4453(1140): 4457(1141)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.377401 355572 task_exit.go:204] [ 4453(1140): 4457(1141)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.377516 355572 task_exit.go:204] [ 4453(1140): 4457(1141)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.377627 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.377766 355572 task_exit.go:204] [ 4453(1140): 4453(1140)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RUNLINKAT(r1, 0x0, 0x0) D0318 16:20:33.380539 355572 usertrap_amd64.go:212] [ 4456(1102): 4456(1102)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.380609 355572 usertrap_amd64.go:122] [ 4456(1102): 4456(1102)] Allocate a new trap: 0xc000e1dce0 39 D0318 16:20:33.380673 355572 usertrap_amd64.go:212] [ 4455( 36): 4455( 36)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.380698 355572 usertrap_amd64.go:225] [ 4456(1102): 4456(1102)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.380745 355572 usertrap_amd64.go:122] [ 4455( 36): 4455( 36)] Allocate a new trap: 0xc000dc7d70 38 D0318 16:20:33.380800 355572 usertrap_amd64.go:225] [ 4455( 36): 4455( 36)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.387728 355572 usertrap_amd64.go:212] [ 4455( 36): 4455( 36)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.387787 355572 usertrap_amd64.go:122] [ 4455( 36): 4455( 36)] Allocate a new trap: 0xc000dc7d70 39 D0318 16:20:33.387843 355572 usertrap_amd64.go:225] [ 4455( 36): 4455( 36)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.389045 355572 usertrap_amd64.go:212] [ 4456(1102): 4456(1102)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.389106 355572 usertrap_amd64.go:122] [ 4456(1102): 4456(1102)] Allocate a new trap: 0xc000e1dce0 40 D0318 16:20:33.389180 355572 usertrap_amd64.go:225] [ 4456(1102): 4456(1102)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.389294 355572 usertrap_amd64.go:212] [ 4455( 36): 4455( 36)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.389418 355572 usertrap_amd64.go:122] [ 4455( 36): 4455( 36)] Allocate a new trap: 0xc000dc7d70 40 D0318 16:20:33.389503 355572 usertrap_amd64.go:225] [ 4455( 36): 4455( 36)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.389742 355572 usertrap_amd64.go:212] [ 4455( 36): 4458( 37)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.389802 355572 usertrap_amd64.go:122] [ 4455( 36): 4458( 37)] Allocate a new trap: 0xc000dc7d70 41 D0318 16:20:33.389869 355572 usertrap_amd64.go:225] [ 4455( 36): 4458( 37)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.391054 355572 usertrap_amd64.go:212] [ 4456(1102): 4456(1102)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.391153 355572 usertrap_amd64.go:122] [ 4456(1102): 4456(1102)] Allocate a new trap: 0xc000e1dce0 41 D0318 16:20:33.391167 355572 usertrap_amd64.go:212] [ 4455( 36): 4455( 36)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.391300 355572 usertrap_amd64.go:122] [ 4455( 36): 4455( 36)] Allocate a new trap: 0xc000dc7d70 42 D0318 16:20:33.391280 355572 usertrap_amd64.go:225] [ 4456(1102): 4456(1102)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.391394 355572 usertrap_amd64.go:225] [ 4455( 36): 4455( 36)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.391459 355572 usertrap_amd64.go:212] [ 4456(1102): 4459(1103)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.391529 355572 usertrap_amd64.go:122] [ 4456(1102): 4459(1103)] Allocate a new trap: 0xc000e1dce0 42 D0318 16:20:33.391651 355572 usertrap_amd64.go:225] [ 4456(1102): 4459(1103)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.393508 355572 usertrap_amd64.go:212] [ 4456(1102): 4456(1102)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.393598 355572 usertrap_amd64.go:122] [ 4456(1102): 4456(1102)] Allocate a new trap: 0xc000e1dce0 43 D0318 16:20:33.393713 355572 usertrap_amd64.go:225] [ 4456(1102): 4456(1102)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.395000 355572 task_exit.go:204] [ 4455( 36): 4455( 36)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.395660 355572 task_signals.go:204] [ 4455( 36): 4458( 37)] Signal 9, PID: 4455, TID: 4458, fault addr: 0x0: terminating thread group D0318 16:20:33.395799 355572 task_exit.go:204] [ 4455( 36): 4455( 36)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.395940 355572 task_exit.go:204] [ 4455( 36): 4458( 37)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.400682 355572 task_exit.go:204] [ 4456(1102): 4456(1102)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.400943 355572 task_signals.go:204] [ 4456(1102): 4459(1103)] Signal 9, PID: 4456, TID: 4459, fault addr: 0x0: terminating thread group D0318 16:20:33.401716 355572 task_exit.go:204] [ 4456(1102): 4456(1102)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.401936 355572 task_exit.go:204] [ 4456(1102): 4459(1103)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.403967 355572 task_exit.go:204] [ 4455( 36): 4458( 37)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.404044 355572 task_exit.go:204] [ 4455( 36): 4458( 37)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.404136 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.404239 355572 task_exit.go:204] [ 4455( 36): 4455( 36)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.404512 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.405236 355572 usertrap_amd64.go:212] [ 4460(1142): 4460(1142)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.405412 355572 usertrap_amd64.go:122] [ 4460(1142): 4460(1142)] Allocate a new trap: 0xc005d57c50 37 16:20:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000021c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000003400)=[{{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f0000002280)="03", 0x1}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000033c0)=[@cred={{0x1c}}], 0x20}}], 0x2, 0x0) D0318 16:20:33.406297 355572 usertrap_amd64.go:225] [ 4460(1142): 4460(1142)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.406811 355572 usertrap_amd64.go:212] [ 4445( 683): 4461( 686)] Found the pattern at ip 55ca2d8e4999:sysno 257 D0318 16:20:33.406916 355572 usertrap_amd64.go:122] [ 4445( 683): 4461( 686)] Allocate a new trap: 0xc000bcf230 43 D0318 16:20:33.407011 355572 usertrap_amd64.go:225] [ 4445( 683): 4461( 686)] Apply the binary patch addr 55ca2d8e4999 trap addr 6ad70 ([184 1 1 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:33.408403 355572 task_exit.go:204] [ 4456(1102): 4459(1103)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.408493 355572 task_exit.go:204] [ 4456(1102): 4459(1103)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.408635 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.408983 355572 task_exit.go:204] [ 4456(1102): 4456(1102)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x44) D0318 16:20:33.410490 355572 usertrap_amd64.go:212] [ 4460(1142): 4460(1142)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.410615 355572 usertrap_amd64.go:122] [ 4460(1142): 4460(1142)] Allocate a new trap: 0xc005d57c50 38 D0318 16:20:33.410692 355572 usertrap_amd64.go:225] [ 4460(1142): 4460(1142)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.411871 355572 usertrap_amd64.go:212] [ 4445( 683): 4445( 683)] Found the pattern at ip 55ca2d9111ae:sysno 230 D0318 16:20:33.411952 355572 usertrap_amd64.go:122] [ 4445( 683): 4445( 683)] Allocate a new trap: 0xc000bcf230 44 D0318 16:20:33.412041 355572 usertrap_amd64.go:225] [ 4445( 683): 4445( 683)] Apply the binary patch addr 55ca2d9111ae trap addr 6adc0 ([184 230 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0318 16:20:33.414757 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.422874 355572 usertrap_amd64.go:212] [ 4460(1142): 4460(1142)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.422948 355572 usertrap_amd64.go:122] [ 4460(1142): 4460(1142)] Allocate a new trap: 0xc005d57c50 39 D0318 16:20:33.423045 355572 usertrap_amd64.go:225] [ 4460(1142): 4460(1142)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.425197 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.431379 355572 usertrap_amd64.go:212] [ 4460(1142): 4460(1142)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.431465 355572 usertrap_amd64.go:122] [ 4460(1142): 4460(1142)] Allocate a new trap: 0xc005d57c50 40 D0318 16:20:33.431563 355572 usertrap_amd64.go:225] [ 4460(1142): 4460(1142)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.431641 355572 usertrap_amd64.go:212] [ 4462( 38): 4462( 38)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.431705 355572 usertrap_amd64.go:122] [ 4462( 38): 4462( 38)] Allocate a new trap: 0xc000bcf2f0 36 D0318 16:20:33.432252 355572 usertrap_amd64.go:225] [ 4462( 38): 4462( 38)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.433050 355572 usertrap_amd64.go:212] [ 4460(1142): 4460(1142)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:33.433113 355572 usertrap_amd64.go:122] [ 4460(1142): 4460(1142)] Allocate a new trap: 0xc005d57c50 41 D0318 16:20:33.433219 355572 usertrap_amd64.go:225] [ 4460(1142): 4460(1142)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.433648 355572 usertrap_amd64.go:212] [ 4460(1142): 4464(1143)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.433711 355572 usertrap_amd64.go:122] [ 4460(1142): 4464(1143)] Allocate a new trap: 0xc005d57c50 42 D0318 16:20:33.433725 355572 usertrap_amd64.go:212] [ 4463(1104): 4463(1104)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.433814 355572 usertrap_amd64.go:122] [ 4463(1104): 4463(1104)] Allocate a new trap: 0xc0078f6f30 37 D0318 16:20:33.433790 355572 usertrap_amd64.go:225] [ 4460(1142): 4464(1143)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.434498 355572 usertrap_amd64.go:212] [ 4462( 38): 4462( 38)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.434556 355572 usertrap_amd64.go:225] [ 4463(1104): 4463(1104)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.434592 355572 usertrap_amd64.go:122] [ 4462( 38): 4462( 38)] Allocate a new trap: 0xc000bcf2f0 37 D0318 16:20:33.434569 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.434681 355572 usertrap_amd64.go:225] [ 4462( 38): 4462( 38)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.435979 355572 usertrap_amd64.go:212] [ 4460(1142): 4460(1142)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.436122 355572 usertrap_amd64.go:122] [ 4460(1142): 4460(1142)] Allocate a new trap: 0xc005d57c50 43 D0318 16:20:33.436170 355572 task_signals.go:470] [ 4445( 683): 4445( 683)] Notified of signal 20 D0318 16:20:33.436207 355572 usertrap_amd64.go:225] [ 4460(1142): 4460(1142)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.436366 355572 task_signals.go:808] [ 4445( 683): 4445( 683)] Signal 20: stopping 4 threads in thread group D0318 16:20:33.436545 355572 task_stop.go:118] [ 4445( 683): 4449( 684)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.436665 355572 task_signals.go:885] [ 4445( 683): 4461( 686)] Completing group stop D0318 16:20:33.436729 355572 task_stop.go:118] [ 4445( 683): 4445( 683)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.436881 355572 task_stop.go:118] [ 4445( 683): 4454( 685)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.437160 355572 task_stop.go:118] [ 4445( 683): 4461( 686)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.437259 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.438253 355572 usertrap_amd64.go:212] [ 4463(1104): 4463(1104)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.438393 355572 usertrap_amd64.go:122] [ 4463(1104): 4463(1104)] Allocate a new trap: 0xc0078f6f30 38 D0318 16:20:33.438475 355572 usertrap_amd64.go:225] [ 4463(1104): 4463(1104)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.440346 355572 task_exit.go:204] [ 4460(1142): 4460(1142)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.440478 355572 task_signals.go:204] [ 4460(1142): 4464(1143)] Signal 9, PID: 4460, TID: 4464, fault addr: 0x0: terminating thread group D0318 16:20:33.440590 355572 task_exit.go:204] [ 4460(1142): 4464(1143)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.441324 355572 task_exit.go:204] [ 4460(1142): 4460(1142)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.444583 355572 task_signals.go:828] [ 4445( 683): 4445( 683)] Ending complete group stop with 0 threads pending D0318 16:20:33.444651 355572 task_stop.go:138] [ 4445( 683): 4445( 683)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.444710 355572 task_stop.go:138] [ 4445( 683): 4449( 684)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.444778 355572 task_stop.go:138] [ 4445( 683): 4454( 685)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.444841 355572 task_stop.go:138] [ 4445( 683): 4461( 686)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.444951 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.445152 355572 task_run.go:186] [ 4445( 683): 4461( 686)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.445148 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.445264 355572 task_run.go:186] [ 4445( 683): 4454( 685)] Restarting syscall 1: not interrupted by handled signal D0318 16:20:33.445435 355572 task_run.go:183] [ 4445( 683): 4445( 683)] Restarting syscall 230 with restart block: not interrupted by handled signal D0318 16:20:33.445773 355572 usertrap_amd64.go:212] [ 4445( 683): 4445( 683)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:33.445868 355572 usertrap_amd64.go:122] [ 4445( 683): 4445( 683)] Allocate a new trap: 0xc000bcf230 45 D0318 16:20:33.445986 355572 task_exit.go:204] [ 4460(1142): 4464(1143)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.446119 355572 task_exit.go:204] [ 4460(1142): 4464(1143)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.445991 355572 usertrap_amd64.go:225] [ 4445( 683): 4445( 683)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ae10 ([184 3 0 0 0 15 5] -> [255 36 37 16 174 6 0]) D0318 16:20:33.446248 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.446550 355572 task_signals.go:470] [ 4445( 683): 4445( 683)] Notified of signal 20 D0318 16:20:33.446703 355572 usertrap_amd64.go:212] [ 4462( 38): 4462( 38)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.446799 355572 usertrap_amd64.go:122] [ 4462( 38): 4462( 38)] Allocate a new trap: 0xc000bcf2f0 38 D0318 16:20:33.446956 355572 usertrap_amd64.go:225] [ 4462( 38): 4462( 38)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.447188 355572 task_exit.go:204] [ 4460(1142): 4460(1142)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.447412 355572 task_signals.go:808] [ 4445( 683): 4445( 683)] Signal 20: stopping 4 threads in thread group D0318 16:20:33.447507 355572 task_stop.go:118] [ 4445( 683): 4445( 683)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.447649 355572 task_stop.go:118] [ 4445( 683): 4449( 684)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.447792 355572 task_stop.go:118] [ 4445( 683): 4461( 686)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.447908 355572 task_signals.go:885] [ 4445( 683): 4454( 685)] Completing group stop D0318 16:20:33.447996 355572 task_stop.go:118] [ 4445( 683): 4454( 685)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.448058 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 16:20:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNISCRNMAP(r0, 0x5609, &(0x7f0000000000)='4:A') D0318 16:20:33.449856 355572 usertrap_amd64.go:212] [ 4463(1104): 4463(1104)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.449958 355572 usertrap_amd64.go:122] [ 4463(1104): 4463(1104)] Allocate a new trap: 0xc0078f6f30 39 D0318 16:20:33.450080 355572 usertrap_amd64.go:225] [ 4463(1104): 4463(1104)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.454869 355572 task_signals.go:828] [ 4445( 683): 4445( 683)] Ending complete group stop with 0 threads pending D0318 16:20:33.454954 355572 task_stop.go:138] [ 4445( 683): 4445( 683)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.455017 355572 task_stop.go:138] [ 4445( 683): 4449( 684)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.455154 355572 task_stop.go:138] [ 4445( 683): 4454( 685)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.455221 355572 task_stop.go:138] [ 4445( 683): 4461( 686)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.455289 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.455466 355572 task_run.go:186] [ 4445( 683): 4449( 684)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.455479 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.455500 355572 task_run.go:186] [ 4445( 683): 4454( 685)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.455666 355572 task_run.go:186] [ 4445( 683): 4461( 686)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.456406 355572 task_signals.go:470] [ 4445( 683): 4445( 683)] Notified of signal 20 D0318 16:20:33.456645 355572 task_signals.go:808] [ 4445( 683): 4445( 683)] Signal 20: stopping 4 threads in thread group D0318 16:20:33.456675 355572 usertrap_amd64.go:212] [ 4462( 38): 4462( 38)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.456802 355572 task_stop.go:118] [ 4445( 683): 4449( 684)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.456813 355572 usertrap_amd64.go:122] [ 4462( 38): 4462( 38)] Allocate a new trap: 0xc000bcf2f0 39 D0318 16:20:33.456890 355572 task_stop.go:118] [ 4445( 683): 4445( 683)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.456927 355572 usertrap_amd64.go:225] [ 4462( 38): 4462( 38)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.457021 355572 task_stop.go:118] [ 4445( 683): 4461( 686)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.457120 355572 task_signals.go:885] [ 4445( 683): 4454( 685)] Completing group stop D0318 16:20:33.457206 355572 task_stop.go:118] [ 4445( 683): 4454( 685)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.457311 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.457464 355572 usertrap_amd64.go:212] [ 4463(1104): 4463(1104)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.457580 355572 usertrap_amd64.go:122] [ 4463(1104): 4463(1104)] Allocate a new trap: 0xc0078f6f30 40 D0318 16:20:33.457648 355572 usertrap_amd64.go:225] [ 4463(1104): 4463(1104)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.458577 355572 usertrap_amd64.go:212] [ 4462( 38): 4462( 38)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.458636 355572 usertrap_amd64.go:122] [ 4462( 38): 4462( 38)] Allocate a new trap: 0xc000bcf2f0 40 D0318 16:20:33.458712 355572 usertrap_amd64.go:225] [ 4462( 38): 4462( 38)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.459018 355572 usertrap_amd64.go:212] [ 4462( 38): 4465( 39)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.459115 355572 usertrap_amd64.go:122] [ 4462( 38): 4465( 39)] Allocate a new trap: 0xc000bcf2f0 41 D0318 16:20:33.459306 355572 usertrap_amd64.go:225] [ 4462( 38): 4465( 39)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.459881 355572 usertrap_amd64.go:212] [ 4463(1104): 4463(1104)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.459938 355572 usertrap_amd64.go:122] [ 4463(1104): 4463(1104)] Allocate a new trap: 0xc0078f6f30 41 D0318 16:20:33.460028 355572 usertrap_amd64.go:225] [ 4463(1104): 4463(1104)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.460347 355572 usertrap_amd64.go:212] [ 4463(1104): 4466(1105)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.460409 355572 usertrap_amd64.go:122] [ 4463(1104): 4466(1105)] Allocate a new trap: 0xc0078f6f30 42 D0318 16:20:33.460499 355572 usertrap_amd64.go:225] [ 4463(1104): 4466(1105)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.461902 355572 usertrap_amd64.go:212] [ 4462( 38): 4462( 38)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.461978 355572 usertrap_amd64.go:122] [ 4462( 38): 4462( 38)] Allocate a new trap: 0xc000bcf2f0 42 D0318 16:20:33.461969 355572 usertrap_amd64.go:212] [ 4463(1104): 4463(1104)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.462022 355572 usertrap_amd64.go:122] [ 4463(1104): 4463(1104)] Allocate a new trap: 0xc0078f6f30 43 D0318 16:20:33.462038 355572 usertrap_amd64.go:225] [ 4462( 38): 4462( 38)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.462081 355572 usertrap_amd64.go:225] [ 4463(1104): 4463(1104)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.464949 355572 task_signals.go:828] [ 4445( 683): 4445( 683)] Ending complete group stop with 0 threads pending D0318 16:20:33.465026 355572 task_stop.go:138] [ 4445( 683): 4445( 683)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.465073 355572 task_stop.go:138] [ 4445( 683): 4449( 684)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.465105 355572 task_stop.go:138] [ 4445( 683): 4454( 685)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.465165 355572 task_stop.go:138] [ 4445( 683): 4461( 686)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.465211 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.465335 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.465452 355572 task_run.go:186] [ 4445( 683): 4461( 686)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.465622 355572 task_run.go:186] [ 4445( 683): 4449( 684)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.465787 355572 task_run.go:186] [ 4445( 683): 4454( 685)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.466476 355572 task_signals.go:470] [ 4445( 683): 4445( 683)] Notified of signal 20 D0318 16:20:33.466641 355572 task_signals.go:808] [ 4445( 683): 4445( 683)] Signal 20: stopping 4 threads in thread group D0318 16:20:33.466758 355572 task_stop.go:118] [ 4445( 683): 4445( 683)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.466870 355572 task_stop.go:118] [ 4445( 683): 4449( 684)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.467004 355572 task_signals.go:885] [ 4445( 683): 4461( 686)] Completing group stop D0318 16:20:33.467130 355572 task_stop.go:118] [ 4445( 683): 4454( 685)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.467249 355572 task_exit.go:204] [ 4462( 38): 4462( 38)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.467438 355572 task_stop.go:118] [ 4445( 683): 4461( 686)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.467565 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.467751 355572 task_exit.go:204] [ 4463(1104): 4463(1104)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.467893 355572 task_signals.go:204] [ 4462( 38): 4465( 39)] Signal 9, PID: 4462, TID: 4465, fault addr: 0x0: terminating thread group D0318 16:20:33.467916 355572 task_signals.go:204] [ 4463(1104): 4466(1105)] Signal 9, PID: 4463, TID: 4466, fault addr: 0x0: terminating thread group D0318 16:20:33.468360 355572 task_exit.go:204] [ 4463(1104): 4463(1104)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.468497 355572 task_exit.go:204] [ 4462( 38): 4465( 39)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.469098 355572 task_exit.go:204] [ 4463(1104): 4466(1105)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.469289 355572 task_exit.go:204] [ 4462( 38): 4462( 38)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.471255 355572 usertrap_amd64.go:212] [ 4467(1144): 4467(1144)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.471337 355572 usertrap_amd64.go:122] [ 4467(1144): 4467(1144)] Allocate a new trap: 0xc000f9ffb0 37 D0318 16:20:33.472391 355572 usertrap_amd64.go:225] [ 4467(1144): 4467(1144)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.474908 355572 task_signals.go:828] [ 4445( 683): 4445( 683)] Ending complete group stop with 0 threads pending D0318 16:20:33.474978 355572 task_stop.go:138] [ 4445( 683): 4445( 683)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.475039 355572 task_stop.go:138] [ 4445( 683): 4449( 684)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.475115 355572 task_stop.go:138] [ 4445( 683): 4454( 685)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.475178 355572 task_stop.go:138] [ 4445( 683): 4461( 686)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.475220 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.475333 355572 task_exit.go:204] [ 4463(1104): 4466(1105)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.475387 355572 task_exit.go:204] [ 4463(1104): 4466(1105)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.475422 355572 task_run.go:186] [ 4445( 683): 4461( 686)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.475502 355572 task_run.go:186] [ 4445( 683): 4449( 684)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.475496 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.475757 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.475917 355572 task_run.go:186] [ 4445( 683): 4454( 685)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.476053 355572 task_exit.go:204] [ 4463(1104): 4463(1104)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.476374 355572 task_signals.go:470] [ 4445( 683): 4445( 683)] Notified of signal 20 D0318 16:20:33.476519 355572 task_signals.go:808] [ 4445( 683): 4445( 683)] Signal 20: stopping 4 threads in thread group D0318 16:20:33.476669 355572 task_stop.go:118] [ 4445( 683): 4461( 686)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.476805 355572 task_stop.go:118] [ 4445( 683): 4454( 685)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.476916 355572 task_signals.go:885] [ 4445( 683): 4449( 684)] Completing group stop 16:20:33 executing program 1: prctl$PR_SET_SECCOMP(0x33, 0x0, 0x0) D0318 16:20:33.477480 355572 task_stop.go:118] [ 4445( 683): 4449( 684)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.477599 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.477607 355572 task_stop.go:118] [ 4445( 683): 4445( 683)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.477803 355572 task_exit.go:204] [ 4462( 38): 4465( 39)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.477865 355572 task_exit.go:204] [ 4462( 38): 4465( 39)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.477905 355572 usertrap_amd64.go:212] [ 4467(1144): 4467(1144)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.477976 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.477962 355572 usertrap_amd64.go:122] [ 4467(1144): 4467(1144)] Allocate a new trap: 0xc000f9ffb0 38 D0318 16:20:33.478100 355572 task_exit.go:204] [ 4462( 38): 4462( 38)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.478099 355572 usertrap_amd64.go:225] [ 4467(1144): 4467(1144)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) 16:20:33 executing program 0: prctl$PR_SET_SECCOMP(0x38, 0x0, 0x0) D0318 16:20:33.488614 355572 task_signals.go:828] [ 4445( 683): 4445( 683)] Ending complete group stop with 0 threads pending D0318 16:20:33.488893 355572 task_stop.go:138] [ 4445( 683): 4445( 683)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.492212 355572 task_stop.go:138] [ 4445( 683): 4449( 684)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.492263 355572 task_stop.go:138] [ 4445( 683): 4454( 685)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.492314 355572 task_stop.go:138] [ 4445( 683): 4461( 686)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.492421 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.492725 355572 task_run.go:186] [ 4445( 683): 4449( 684)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.492804 355572 task_signals.go:470] [ 4445( 683): 4445( 683)] Notified of signal 20 D0318 16:20:33.492957 355572 task_run.go:186] [ 4445( 683): 4461( 686)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.493020 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.493125 355572 task_signals.go:808] [ 4445( 683): 4445( 683)] Signal 20: stopping 4 threads in thread group D0318 16:20:33.493293 355572 task_stop.go:118] [ 4445( 683): 4461( 686)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.493407 355572 task_stop.go:118] [ 4445( 683): 4445( 683)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.493649 355572 task_signals.go:885] [ 4445( 683): 4454( 685)] Completing group stop D0318 16:20:33.493763 355572 task_stop.go:118] [ 4445( 683): 4454( 685)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.493875 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.493970 355572 task_stop.go:118] [ 4445( 683): 4449( 684)] Entering internal stop (*kernel.groupStop)(nil) D0318 16:20:33.498593 355572 task_signals.go:828] [ 4445( 683): 4445( 683)] Ending complete group stop with 0 threads pending D0318 16:20:33.498671 355572 task_stop.go:138] [ 4445( 683): 4445( 683)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.498717 355572 task_stop.go:138] [ 4445( 683): 4449( 684)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.498745 355572 task_stop.go:138] [ 4445( 683): 4454( 685)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.498771 355572 task_stop.go:138] [ 4445( 683): 4461( 686)] Leaving internal stop (*kernel.groupStop)(nil) D0318 16:20:33.498806 355572 task_signals.go:443] [ 4445( 683): 4445( 683)] Discarding ignored signal 18 D0318 16:20:33.499002 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.499136 355572 task_run.go:186] [ 4445( 683): 4454( 685)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.499213 355572 task_run.go:186] [ 4445( 683): 4449( 684)] Restarting syscall 202: not interrupted by handled signal D0318 16:20:33.500238 355572 task_exit.go:204] [ 4445( 683): 4445( 683)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.500988 355572 task_signals.go:204] [ 4445( 683): 4454( 685)] Signal 9, PID: 4445, TID: 4454, fault addr: 0x0: terminating thread group D0318 16:20:33.501025 355572 task_signals.go:204] [ 4445( 683): 4461( 686)] Signal 9, PID: 4445, TID: 4461, fault addr: 0x0: terminating thread group D0318 16:20:33.501007 355572 task_signals.go:481] [ 4445( 683): 4445( 683)] No task notified of signal 20 D0318 16:20:33.501179 355572 task_exit.go:204] [ 4445( 683): 4445( 683)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.501208 355572 usertrap_amd64.go:212] [ 4467(1144): 4467(1144)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.501274 355572 usertrap_amd64.go:122] [ 4467(1144): 4467(1144)] Allocate a new trap: 0xc000f9ffb0 39 D0318 16:20:33.501379 355572 usertrap_amd64.go:225] [ 4467(1144): 4467(1144)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.501401 355572 task_exit.go:204] [ 4445( 683): 4461( 686)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.502028 355572 task_exit.go:204] [ 4445( 683): 4461( 686)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.502079 355572 task_exit.go:204] [ 4445( 683): 4461( 686)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.502242 355572 task_exit.go:204] [ 4445( 683): 4454( 685)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.503743 355572 task_signals.go:204] [ 4445( 683): 4449( 684)] Signal 9, PID: 4445, TID: 4449, fault addr: 0x0: terminating thread group D0318 16:20:33.505292 355572 task_exit.go:204] [ 4445( 683): 4449( 684)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.505458 355572 task_signals.go:481] [ 4445( 683): 4445( 683)] No task notified of signal 18 D0318 16:20:33.505725 355572 task_exit.go:204] [ 4445( 683): 4454( 685)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.505793 355572 task_exit.go:204] [ 4445( 683): 4454( 685)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.506626 355572 task_signals.go:481] [ 4445( 683): 4445( 683)] No task notified of signal 20 D0318 16:20:33.510316 355572 usertrap_amd64.go:212] [ 4467(1144): 4467(1144)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.510474 355572 usertrap_amd64.go:122] [ 4467(1144): 4467(1144)] Allocate a new trap: 0xc000f9ffb0 40 D0318 16:20:33.510572 355572 usertrap_amd64.go:225] [ 4467(1144): 4467(1144)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.512453 355572 task_exit.go:204] [ 4445( 683): 4449( 684)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.512550 355572 task_exit.go:204] [ 4445( 683): 4449( 684)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.512646 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.512642 355572 usertrap_amd64.go:212] [ 4467(1144): 4467(1144)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:33.512730 355572 usertrap_amd64.go:122] [ 4467(1144): 4467(1144)] Allocate a new trap: 0xc000f9ffb0 41 D0318 16:20:33.512824 355572 usertrap_amd64.go:225] [ 4467(1144): 4467(1144)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.513014 355572 task_exit.go:204] [ 4445( 683): 4445( 683)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.513444 355572 usertrap_amd64.go:212] [ 4467(1144): 4470(1145)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.513612 355572 usertrap_amd64.go:122] [ 4467(1144): 4470(1145)] Allocate a new trap: 0xc000f9ffb0 42 D0318 16:20:33.513728 355572 usertrap_amd64.go:225] [ 4467(1144): 4470(1145)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) 16:20:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001500), 0x0, 0x0) ioctl$FIOCLEX(r0, 0x5451) D0318 16:20:33.515435 355572 usertrap_amd64.go:212] [ 4467(1144): 4470(1145)] Found the pattern at ip 55ec958b2999:sysno 257 D0318 16:20:33.515683 355572 usertrap_amd64.go:122] [ 4467(1144): 4470(1145)] Allocate a new trap: 0xc000f9ffb0 43 D0318 16:20:33.515820 355572 usertrap_amd64.go:225] [ 4467(1144): 4470(1145)] Apply the binary patch addr 55ec958b2999 trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.517128 355572 usertrap_amd64.go:212] [ 4468( 40): 4468( 40)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.517211 355572 usertrap_amd64.go:122] [ 4468( 40): 4468( 40)] Allocate a new trap: 0xc000976030 36 D0318 16:20:33.517336 355572 usertrap_amd64.go:212] [ 4469(1106): 4469(1106)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.517450 355572 usertrap_amd64.go:122] [ 4469(1106): 4469(1106)] Allocate a new trap: 0xc005e16000 37 D0318 16:20:33.517785 355572 usertrap_amd64.go:225] [ 4468( 40): 4468( 40)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.518192 355572 usertrap_amd64.go:225] [ 4469(1106): 4469(1106)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.520359 355572 usertrap_amd64.go:212] [ 4468( 40): 4468( 40)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.520435 355572 usertrap_amd64.go:122] [ 4468( 40): 4468( 40)] Allocate a new trap: 0xc000976030 37 D0318 16:20:33.520506 355572 usertrap_amd64.go:225] [ 4468( 40): 4468( 40)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.521591 355572 usertrap_amd64.go:212] [ 4467(1144): 4467(1144)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.521569 355572 usertrap_amd64.go:212] [ 4469(1106): 4469(1106)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.521647 355572 usertrap_amd64.go:122] [ 4467(1144): 4467(1144)] Allocate a new trap: 0xc000f9ffb0 44 D0318 16:20:33.521659 355572 usertrap_amd64.go:122] [ 4469(1106): 4469(1106)] Allocate a new trap: 0xc005e16000 38 D0318 16:20:33.521709 355572 usertrap_amd64.go:225] [ 4467(1144): 4467(1144)] Apply the binary patch addr 55ec958b2c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:33.521892 355572 usertrap_amd64.go:225] [ 4469(1106): 4469(1106)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.526375 355572 task_exit.go:204] [ 4467(1144): 4467(1144)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.526524 355572 task_signals.go:204] [ 4467(1144): 4470(1145)] Signal 9, PID: 4467, TID: 4470, fault addr: 0x0: terminating thread group D0318 16:20:33.526742 355572 task_exit.go:204] [ 4467(1144): 4470(1145)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.528695 355572 task_exit.go:204] [ 4467(1144): 4467(1144)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.534574 355572 usertrap_amd64.go:212] [ 4468( 40): 4468( 40)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.534614 355572 task_exit.go:204] [ 4467(1144): 4470(1145)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.534710 355572 usertrap_amd64.go:122] [ 4468( 40): 4468( 40)] Allocate a new trap: 0xc000976030 38 D0318 16:20:33.534762 355572 task_exit.go:204] [ 4467(1144): 4470(1145)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.534806 355572 usertrap_amd64.go:225] [ 4468( 40): 4468( 40)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.535022 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.535592 355572 task_exit.go:204] [ 4467(1144): 4467(1144)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 3: syz_clone3(&(0x7f0000002440)={0x101000, 0x0, 0x0, &(0x7f0000002300), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) D0318 16:20:33.538033 355572 usertrap_amd64.go:212] [ 4469(1106): 4469(1106)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.538127 355572 usertrap_amd64.go:122] [ 4469(1106): 4469(1106)] Allocate a new trap: 0xc005e16000 39 D0318 16:20:33.538227 355572 usertrap_amd64.go:225] [ 4469(1106): 4469(1106)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.544141 355572 usertrap_amd64.go:212] [ 4471( 687): 4471( 687)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:33.544261 355572 usertrap_amd64.go:122] [ 4471( 687): 4471( 687)] Allocate a new trap: 0xc0002d2150 37 D0318 16:20:33.544854 355572 usertrap_amd64.go:225] [ 4471( 687): 4471( 687)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:33.546714 355572 usertrap_amd64.go:212] [ 4469(1106): 4469(1106)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.546831 355572 usertrap_amd64.go:122] [ 4469(1106): 4469(1106)] Allocate a new trap: 0xc005e16000 40 D0318 16:20:33.546923 355572 usertrap_amd64.go:225] [ 4469(1106): 4469(1106)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.547875 355572 usertrap_amd64.go:212] [ 4468( 40): 4468( 40)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.547973 355572 usertrap_amd64.go:122] [ 4468( 40): 4468( 40)] Allocate a new trap: 0xc000976030 39 D0318 16:20:33.548085 355572 usertrap_amd64.go:225] [ 4468( 40): 4468( 40)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.548327 355572 usertrap_amd64.go:212] [ 4471( 687): 4471( 687)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:33.548406 355572 usertrap_amd64.go:122] [ 4471( 687): 4471( 687)] Allocate a new trap: 0xc0002d2150 38 D0318 16:20:33.548503 355572 usertrap_amd64.go:225] [ 4471( 687): 4471( 687)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:33.549056 355572 usertrap_amd64.go:212] [ 4469(1106): 4469(1106)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.549158 355572 usertrap_amd64.go:122] [ 4469(1106): 4469(1106)] Allocate a new trap: 0xc005e16000 41 D0318 16:20:33.549259 355572 usertrap_amd64.go:225] [ 4469(1106): 4469(1106)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.549651 355572 usertrap_amd64.go:212] [ 4469(1106): 4472(1107)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.549735 355572 usertrap_amd64.go:122] [ 4469(1106): 4472(1107)] Allocate a new trap: 0xc005e16000 42 D0318 16:20:33.549841 355572 usertrap_amd64.go:225] [ 4469(1106): 4472(1107)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.550800 355572 usertrap_amd64.go:212] [ 4468( 40): 4468( 40)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.550885 355572 usertrap_amd64.go:122] [ 4468( 40): 4468( 40)] Allocate a new trap: 0xc000976030 40 D0318 16:20:33.550972 355572 usertrap_amd64.go:225] [ 4468( 40): 4468( 40)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.551276 355572 usertrap_amd64.go:212] [ 4468( 40): 4473( 41)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.551353 355572 usertrap_amd64.go:122] [ 4468( 40): 4473( 41)] Allocate a new trap: 0xc000976030 41 D0318 16:20:33.551370 355572 usertrap_amd64.go:212] [ 4469(1106): 4469(1106)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.551425 355572 usertrap_amd64.go:122] [ 4469(1106): 4469(1106)] Allocate a new trap: 0xc005e16000 43 D0318 16:20:33.551433 355572 usertrap_amd64.go:225] [ 4468( 40): 4473( 41)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.551483 355572 usertrap_amd64.go:225] [ 4469(1106): 4469(1106)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.552921 355572 usertrap_amd64.go:212] [ 4468( 40): 4468( 40)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.553102 355572 usertrap_amd64.go:122] [ 4468( 40): 4468( 40)] Allocate a new trap: 0xc000976030 42 D0318 16:20:33.553191 355572 usertrap_amd64.go:225] [ 4468( 40): 4468( 40)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.556720 355572 task_exit.go:204] [ 4469(1106): 4469(1106)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.556989 355572 task_signals.go:204] [ 4469(1106): 4472(1107)] Signal 9, PID: 4469, TID: 4472, fault addr: 0x0: terminating thread group D0318 16:20:33.557575 355572 task_exit.go:204] [ 4469(1106): 4469(1106)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.557948 355572 task_exit.go:204] [ 4469(1106): 4472(1107)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.559352 355572 task_exit.go:204] [ 4468( 40): 4468( 40)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.559652 355572 task_signals.go:204] [ 4468( 40): 4473( 41)] Signal 9, PID: 4468, TID: 4473, fault addr: 0x0: terminating thread group D0318 16:20:33.560069 355572 task_exit.go:204] [ 4468( 40): 4473( 41)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.560341 355572 task_exit.go:204] [ 4468( 40): 4468( 40)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.563442 355572 task_exit.go:204] [ 4469(1106): 4472(1107)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.563505 355572 task_exit.go:204] [ 4469(1106): 4472(1107)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.563669 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.563904 355572 task_exit.go:204] [ 4469(1106): 4469(1106)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 1: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)='devices.allow\x00', 0x2, 0x0) D0318 16:20:33.565664 355572 task_exit.go:204] [ 4468( 40): 4473( 41)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.565720 355572 task_exit.go:204] [ 4468( 40): 4473( 41)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.565882 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.566026 355572 task_exit.go:204] [ 4468( 40): 4468( 40)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.566682 355572 usertrap_amd64.go:212] [ 4474(1146): 4474(1146)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.566788 355572 usertrap_amd64.go:122] [ 4474(1146): 4474(1146)] Allocate a new trap: 0xc000dc6060 37 16:20:33 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_SCRNMAP(r0, 0x4b71, &(0x7f0000000740)=""/107) D0318 16:20:33.567698 355572 usertrap_amd64.go:225] [ 4474(1146): 4474(1146)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.569749 355572 usertrap_amd64.go:212] [ 4471( 687): 4471( 687)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:33.569839 355572 usertrap_amd64.go:122] [ 4471( 687): 4471( 687)] Allocate a new trap: 0xc0002d2150 39 D0318 16:20:33.569954 355572 usertrap_amd64.go:225] [ 4471( 687): 4471( 687)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:33.572513 355572 usertrap_amd64.go:212] [ 4474(1146): 4474(1146)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.572606 355572 usertrap_amd64.go:122] [ 4474(1146): 4474(1146)] Allocate a new trap: 0xc000dc6060 38 D0318 16:20:33.572698 355572 usertrap_amd64.go:225] [ 4474(1146): 4474(1146)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.577880 355572 usertrap_amd64.go:212] [ 4471( 687): 4471( 687)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:33.577976 355572 usertrap_amd64.go:122] [ 4471( 687): 4471( 687)] Allocate a new trap: 0xc0002d2150 40 D0318 16:20:33.578053 355572 usertrap_amd64.go:225] [ 4471( 687): 4471( 687)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:33.580426 355572 usertrap_amd64.go:212] [ 4471( 687): 4471( 687)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:33.580514 355572 usertrap_amd64.go:122] [ 4471( 687): 4471( 687)] Allocate a new trap: 0xc0002d2150 41 D0318 16:20:33.580632 355572 usertrap_amd64.go:225] [ 4471( 687): 4471( 687)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:33.580851 355572 usertrap_amd64.go:212] [ 4471( 687): 4475( 688)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:33.580959 355572 usertrap_amd64.go:122] [ 4471( 687): 4475( 688)] Allocate a new trap: 0xc0002d2150 42 D0318 16:20:33.581338 355572 usertrap_amd64.go:225] [ 4471( 687): 4475( 688)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:33.583996 355572 usertrap_amd64.go:212] [ 4471( 687): 4471( 687)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:33.584065 355572 usertrap_amd64.go:122] [ 4471( 687): 4471( 687)] Allocate a new trap: 0xc0002d2150 43 D0318 16:20:33.584123 355572 usertrap_amd64.go:225] [ 4471( 687): 4471( 687)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:33.587181 355572 usertrap_amd64.go:212] [ 4474(1146): 4474(1146)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.587318 355572 usertrap_amd64.go:122] [ 4474(1146): 4474(1146)] Allocate a new trap: 0xc000dc6060 39 D0318 16:20:33.587407 355572 usertrap_amd64.go:225] [ 4474(1146): 4474(1146)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.591024 355572 task_exit.go:204] [ 4471( 687): 4471( 687)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.591335 355572 task_signals.go:204] [ 4471( 687): 4475( 688)] Signal 9, PID: 4471, TID: 4475, fault addr: 0x0: terminating thread group D0318 16:20:33.591985 355572 task_exit.go:204] [ 4471( 687): 4471( 687)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.592151 355572 task_exit.go:204] [ 4471( 687): 4475( 688)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.595997 355572 usertrap_amd64.go:212] [ 4476(1108): 4476(1108)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.596155 355572 usertrap_amd64.go:122] [ 4476(1108): 4476(1108)] Allocate a new trap: 0xc002100000 37 D0318 16:20:33.596974 355572 usertrap_amd64.go:225] [ 4476(1108): 4476(1108)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.598211 355572 task_exit.go:204] [ 4471( 687): 4475( 688)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.598318 355572 task_exit.go:204] [ 4471( 687): 4475( 688)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.598458 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.598847 355572 task_exit.go:204] [ 4471( 687): 4471( 687)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.598941 355572 usertrap_amd64.go:212] [ 4477( 42): 4477( 42)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.599165 355572 usertrap_amd64.go:122] [ 4477( 42): 4477( 42)] Allocate a new trap: 0xc005d56150 36 D0318 16:20:33.599672 355572 usertrap_amd64.go:212] [ 4474(1146): 4474(1146)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.599817 355572 usertrap_amd64.go:225] [ 4477( 42): 4477( 42)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.599911 355572 usertrap_amd64.go:122] [ 4474(1146): 4474(1146)] Allocate a new trap: 0xc000dc6060 40 D0318 16:20:33.600233 355572 usertrap_amd64.go:225] [ 4474(1146): 4474(1146)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) 16:20:33 executing program 2: prctl$PR_SET_SECCOMP(0x35, 0x0, 0x0) D0318 16:20:33.602679 355572 usertrap_amd64.go:212] [ 4474(1146): 4474(1146)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:33.602782 355572 usertrap_amd64.go:122] [ 4474(1146): 4474(1146)] Allocate a new trap: 0xc000dc6060 41 D0318 16:20:33.602892 355572 usertrap_amd64.go:225] [ 4474(1146): 4474(1146)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.603274 355572 usertrap_amd64.go:212] [ 4474(1146): 4478(1147)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.603370 355572 usertrap_amd64.go:122] [ 4474(1146): 4478(1147)] Allocate a new trap: 0xc000dc6060 42 D0318 16:20:33.603467 355572 usertrap_amd64.go:225] [ 4474(1146): 4478(1147)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.603486 355572 usertrap_amd64.go:212] [ 4476(1108): 4476(1108)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.603578 355572 usertrap_amd64.go:122] [ 4476(1108): 4476(1108)] Allocate a new trap: 0xc002100000 38 D0318 16:20:33.603707 355572 usertrap_amd64.go:225] [ 4476(1108): 4476(1108)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.605260 355572 usertrap_amd64.go:212] [ 4477( 42): 4477( 42)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.605351 355572 usertrap_amd64.go:122] [ 4477( 42): 4477( 42)] Allocate a new trap: 0xc005d56150 37 D0318 16:20:33.605463 355572 usertrap_amd64.go:225] [ 4477( 42): 4477( 42)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.605715 355572 usertrap_amd64.go:212] [ 4474(1146): 4474(1146)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.605815 355572 usertrap_amd64.go:122] [ 4474(1146): 4474(1146)] Allocate a new trap: 0xc000dc6060 43 D0318 16:20:33.605926 355572 usertrap_amd64.go:225] [ 4474(1146): 4474(1146)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.612771 355572 task_exit.go:204] [ 4474(1146): 4474(1146)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.612970 355572 task_signals.go:204] [ 4474(1146): 4478(1147)] Signal 9, PID: 4474, TID: 4478, fault addr: 0x0: terminating thread group D0318 16:20:33.613399 355572 task_exit.go:204] [ 4474(1146): 4478(1147)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.613580 355572 task_exit.go:204] [ 4474(1146): 4474(1146)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.619546 355572 task_exit.go:204] [ 4474(1146): 4478(1147)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.619702 355572 task_exit.go:204] [ 4474(1146): 4478(1147)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.619848 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.620138 355572 task_exit.go:204] [ 4474(1146): 4474(1146)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.620349 355572 usertrap_amd64.go:212] [ 4476(1108): 4476(1108)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.620431 355572 usertrap_amd64.go:122] [ 4476(1108): 4476(1108)] Allocate a new trap: 0xc002100000 39 D0318 16:20:33.620559 355572 usertrap_amd64.go:225] [ 4476(1108): 4476(1108)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.621497 355572 usertrap_amd64.go:212] [ 4477( 42): 4477( 42)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.621606 355572 usertrap_amd64.go:122] [ 4477( 42): 4477( 42)] Allocate a new trap: 0xc005d56150 38 D0318 16:20:33.621695 355572 usertrap_amd64.go:225] [ 4477( 42): 4477( 42)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) 16:20:33 executing program 3: shmat(0x0, &(0x7f0000ff7000/0x4000)=nil, 0x0) D0318 16:20:33.629342 355572 usertrap_amd64.go:212] [ 4476(1108): 4476(1108)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.629464 355572 usertrap_amd64.go:122] [ 4476(1108): 4476(1108)] Allocate a new trap: 0xc002100000 40 D0318 16:20:33.629582 355572 usertrap_amd64.go:225] [ 4476(1108): 4476(1108)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.630077 355572 usertrap_amd64.go:212] [ 4479( 689): 4479( 689)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:33.630198 355572 usertrap_amd64.go:122] [ 4479( 689): 4479( 689)] Allocate a new trap: 0xc000dc60c0 37 D0318 16:20:33.630914 355572 usertrap_amd64.go:225] [ 4479( 689): 4479( 689)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:33.631270 355572 usertrap_amd64.go:212] [ 4477( 42): 4477( 42)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.631379 355572 usertrap_amd64.go:122] [ 4477( 42): 4477( 42)] Allocate a new trap: 0xc005d56150 39 D0318 16:20:33.631434 355572 usertrap_amd64.go:212] [ 4476(1108): 4476(1108)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.631509 355572 usertrap_amd64.go:122] [ 4476(1108): 4476(1108)] Allocate a new trap: 0xc002100000 41 D0318 16:20:33.631488 355572 usertrap_amd64.go:225] [ 4477( 42): 4477( 42)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.631575 355572 usertrap_amd64.go:225] [ 4476(1108): 4476(1108)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.631895 355572 usertrap_amd64.go:212] [ 4476(1108): 4480(1109)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.632012 355572 usertrap_amd64.go:122] [ 4476(1108): 4480(1109)] Allocate a new trap: 0xc002100000 42 D0318 16:20:33.632103 355572 usertrap_amd64.go:225] [ 4476(1108): 4480(1109)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.633389 355572 usertrap_amd64.go:212] [ 4477( 42): 4477( 42)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.633455 355572 usertrap_amd64.go:122] [ 4477( 42): 4477( 42)] Allocate a new trap: 0xc005d56150 40 D0318 16:20:33.633562 355572 usertrap_amd64.go:225] [ 4477( 42): 4477( 42)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.635346 355572 usertrap_amd64.go:212] [ 4479( 689): 4479( 689)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:33.635450 355572 usertrap_amd64.go:122] [ 4479( 689): 4479( 689)] Allocate a new trap: 0xc000dc60c0 38 D0318 16:20:33.635544 355572 usertrap_amd64.go:225] [ 4479( 689): 4479( 689)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:33.639959 355572 usertrap_amd64.go:212] [ 4477( 42): 4481( 43)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.640147 355572 usertrap_amd64.go:122] [ 4477( 42): 4481( 43)] Allocate a new trap: 0xc005d56150 41 D0318 16:20:33.640283 355572 usertrap_amd64.go:225] [ 4477( 42): 4481( 43)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.641238 355572 usertrap_amd64.go:212] [ 4476(1108): 4476(1108)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.641313 355572 usertrap_amd64.go:122] [ 4476(1108): 4476(1108)] Allocate a new trap: 0xc002100000 43 D0318 16:20:33.641407 355572 usertrap_amd64.go:225] [ 4476(1108): 4476(1108)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.641710 355572 usertrap_amd64.go:212] [ 4477( 42): 4481( 43)] Found the pattern at ip 55e9c276b999:sysno 257 D0318 16:20:33.641813 355572 usertrap_amd64.go:122] [ 4477( 42): 4481( 43)] Allocate a new trap: 0xc005d56150 42 D0318 16:20:33.641891 355572 usertrap_amd64.go:225] [ 4477( 42): 4481( 43)] Apply the binary patch addr 55e9c276b999 trap addr 60d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.646767 355572 task_exit.go:204] [ 4476(1108): 4476(1108)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.646922 355572 task_signals.go:204] [ 4476(1108): 4480(1109)] Signal 9, PID: 4476, TID: 4480, fault addr: 0x0: terminating thread group D0318 16:20:33.647097 355572 task_exit.go:204] [ 4476(1108): 4480(1109)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.647828 355572 usertrap_amd64.go:212] [ 4477( 42): 4477( 42)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.647908 355572 task_exit.go:204] [ 4476(1108): 4476(1108)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.647970 355572 usertrap_amd64.go:122] [ 4477( 42): 4477( 42)] Allocate a new trap: 0xc005d56150 43 D0318 16:20:33.648110 355572 usertrap_amd64.go:225] [ 4477( 42): 4477( 42)] Apply the binary patch addr 55e9c276bc93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 16:20:33.650390 355572 usertrap_amd64.go:212] [ 4482(1148): 4482(1148)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.650513 355572 usertrap_amd64.go:122] [ 4482(1148): 4482(1148)] Allocate a new trap: 0xc0002d21e0 37 D0318 16:20:33.651213 355572 usertrap_amd64.go:225] [ 4482(1148): 4482(1148)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.651738 355572 task_exit.go:204] [ 4477( 42): 4477( 42)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.651929 355572 task_signals.go:204] [ 4477( 42): 4481( 43)] Signal 9, PID: 4477, TID: 4481, fault addr: 0x0: terminating thread group D0318 16:20:33.652681 355572 task_exit.go:204] [ 4477( 42): 4477( 42)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.652857 355572 task_exit.go:204] [ 4477( 42): 4481( 43)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.654785 355572 task_exit.go:204] [ 4476(1108): 4480(1109)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.654861 355572 task_exit.go:204] [ 4476(1108): 4480(1109)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.655031 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.655411 355572 usertrap_amd64.go:212] [ 4479( 689): 4479( 689)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:33.655512 355572 usertrap_amd64.go:122] [ 4479( 689): 4479( 689)] Allocate a new trap: 0xc000dc60c0 39 D0318 16:20:33.655520 355572 task_exit.go:204] [ 4476(1108): 4476(1108)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.655595 355572 usertrap_amd64.go:225] [ 4479( 689): 4479( 689)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:33.656666 355572 usertrap_amd64.go:212] [ 4482(1148): 4482(1148)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.656745 355572 usertrap_amd64.go:122] [ 4482(1148): 4482(1148)] Allocate a new trap: 0xc0002d21e0 38 D0318 16:20:33.656820 355572 usertrap_amd64.go:225] [ 4482(1148): 4482(1148)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) 16:20:33 executing program 1: prctl$PR_GET_TID_ADDRESS(0x3a, 0x0) D0318 16:20:33.658740 355572 task_exit.go:204] [ 4477( 42): 4481( 43)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.658803 355572 task_exit.go:204] [ 4477( 42): 4481( 43)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.658909 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.659025 355572 task_exit.go:204] [ 4477( 42): 4477( 42)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 0: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000006600)='.pending_reads\x00', 0x4841, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) D0318 16:20:33.665334 355572 usertrap_amd64.go:212] [ 4479( 689): 4479( 689)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:33.665394 355572 usertrap_amd64.go:122] [ 4479( 689): 4479( 689)] Allocate a new trap: 0xc000dc60c0 40 D0318 16:20:33.665489 355572 usertrap_amd64.go:225] [ 4479( 689): 4479( 689)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:33.666962 355572 usertrap_amd64.go:212] [ 4479( 689): 4479( 689)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:33.667051 355572 usertrap_amd64.go:122] [ 4479( 689): 4479( 689)] Allocate a new trap: 0xc000dc60c0 41 D0318 16:20:33.667116 355572 usertrap_amd64.go:225] [ 4479( 689): 4479( 689)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:33.667661 355572 usertrap_amd64.go:212] [ 4479( 689): 4483( 690)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:33.667730 355572 usertrap_amd64.go:122] [ 4479( 689): 4483( 690)] Allocate a new trap: 0xc000dc60c0 42 D0318 16:20:33.667844 355572 usertrap_amd64.go:225] [ 4479( 689): 4483( 690)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:33.672436 355572 usertrap_amd64.go:212] [ 4482(1148): 4482(1148)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.672416 355572 usertrap_amd64.go:212] [ 4479( 689): 4479( 689)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:33.672514 355572 usertrap_amd64.go:122] [ 4482(1148): 4482(1148)] Allocate a new trap: 0xc0002d21e0 39 D0318 16:20:33.672541 355572 usertrap_amd64.go:122] [ 4479( 689): 4479( 689)] Allocate a new trap: 0xc000dc60c0 43 D0318 16:20:33.672630 355572 usertrap_amd64.go:225] [ 4482(1148): 4482(1148)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.672653 355572 usertrap_amd64.go:225] [ 4479( 689): 4479( 689)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:33.678250 355572 task_exit.go:204] [ 4479( 689): 4479( 689)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.678490 355572 task_signals.go:204] [ 4479( 689): 4483( 690)] Signal 9, PID: 4479, TID: 4483, fault addr: 0x0: terminating thread group D0318 16:20:33.679157 355572 task_exit.go:204] [ 4479( 689): 4479( 689)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.679314 355572 task_exit.go:204] [ 4479( 689): 4483( 690)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.680686 355572 usertrap_amd64.go:212] [ 4482(1148): 4482(1148)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.680786 355572 usertrap_amd64.go:122] [ 4482(1148): 4482(1148)] Allocate a new trap: 0xc0002d21e0 40 D0318 16:20:33.680886 355572 usertrap_amd64.go:225] [ 4482(1148): 4482(1148)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.683978 355572 usertrap_amd64.go:212] [ 4482(1148): 4482(1148)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:33.684081 355572 usertrap_amd64.go:122] [ 4482(1148): 4482(1148)] Allocate a new trap: 0xc0002d21e0 41 D0318 16:20:33.684241 355572 usertrap_amd64.go:225] [ 4482(1148): 4482(1148)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.684643 355572 usertrap_amd64.go:212] [ 4482(1148): 4486(1149)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.684744 355572 usertrap_amd64.go:122] [ 4482(1148): 4486(1149)] Allocate a new trap: 0xc0002d21e0 42 D0318 16:20:33.684891 355572 usertrap_amd64.go:225] [ 4482(1148): 4486(1149)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.684919 355572 task_exit.go:204] [ 4479( 689): 4483( 690)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.685023 355572 task_exit.go:204] [ 4479( 689): 4483( 690)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.685186 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.685834 355572 task_exit.go:204] [ 4479( 689): 4479( 689)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 2: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xa772fc6952bad6c3, &(0x7f0000000100), 0x0, 0x0, 0x0) D0318 16:20:33.687979 355572 usertrap_amd64.go:212] [ 4482(1148): 4482(1148)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.688098 355572 usertrap_amd64.go:122] [ 4482(1148): 4482(1148)] Allocate a new trap: 0xc0002d21e0 43 D0318 16:20:33.688202 355572 usertrap_amd64.go:225] [ 4482(1148): 4482(1148)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.691920 355572 usertrap_amd64.go:212] [ 4485( 44): 4485( 44)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.692057 355572 usertrap_amd64.go:122] [ 4485( 44): 4485( 44)] Allocate a new trap: 0xc00637c0c0 36 D0318 16:20:33.692744 355572 usertrap_amd64.go:225] [ 4485( 44): 4485( 44)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.695998 355572 task_exit.go:204] [ 4482(1148): 4482(1148)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.696342 355572 task_signals.go:204] [ 4482(1148): 4486(1149)] Signal 9, PID: 4482, TID: 4486, fault addr: 0x0: terminating thread group D0318 16:20:33.696803 355572 task_exit.go:204] [ 4482(1148): 4482(1148)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.696996 355572 task_exit.go:204] [ 4482(1148): 4486(1149)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.697406 355572 usertrap_amd64.go:212] [ 4485( 44): 4485( 44)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.697477 355572 usertrap_amd64.go:122] [ 4485( 44): 4485( 44)] Allocate a new trap: 0xc00637c0c0 37 D0318 16:20:33.697561 355572 usertrap_amd64.go:225] [ 4485( 44): 4485( 44)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.700472 355572 usertrap_amd64.go:212] [ 4484(1110): 4484(1110)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.700577 355572 usertrap_amd64.go:122] [ 4484(1110): 4484(1110)] Allocate a new trap: 0xc0002d2210 37 D0318 16:20:33.701150 355572 usertrap_amd64.go:225] [ 4484(1110): 4484(1110)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.704604 355572 task_exit.go:204] [ 4482(1148): 4486(1149)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.704734 355572 task_exit.go:204] [ 4482(1148): 4486(1149)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.704834 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.704844 355572 usertrap_amd64.go:212] [ 4484(1110): 4484(1110)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.704930 355572 usertrap_amd64.go:122] [ 4484(1110): 4484(1110)] Allocate a new trap: 0xc0002d2210 38 D0318 16:20:33.705030 355572 task_exit.go:204] [ 4482(1148): 4482(1148)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.705014 355572 usertrap_amd64.go:225] [ 4484(1110): 4484(1110)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) 16:20:33 executing program 3: prctl$PR_GET_TID_ADDRESS(0x2b, 0x0) D0318 16:20:33.717074 355572 usertrap_amd64.go:212] [ 4485( 44): 4485( 44)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.717183 355572 usertrap_amd64.go:122] [ 4485( 44): 4485( 44)] Allocate a new trap: 0xc00637c0c0 38 D0318 16:20:33.717301 355572 usertrap_amd64.go:225] [ 4485( 44): 4485( 44)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.717840 355572 usertrap_amd64.go:212] [ 4487( 691): 4487( 691)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:33.717940 355572 usertrap_amd64.go:122] [ 4487( 691): 4487( 691)] Allocate a new trap: 0xc002100150 37 D0318 16:20:33.718589 355572 usertrap_amd64.go:225] [ 4487( 691): 4487( 691)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:33.718725 355572 usertrap_amd64.go:212] [ 4484(1110): 4484(1110)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.718789 355572 usertrap_amd64.go:122] [ 4484(1110): 4484(1110)] Allocate a new trap: 0xc0002d2210 39 D0318 16:20:33.718869 355572 usertrap_amd64.go:225] [ 4484(1110): 4484(1110)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.722826 355572 usertrap_amd64.go:212] [ 4487( 691): 4487( 691)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:33.722910 355572 usertrap_amd64.go:122] [ 4487( 691): 4487( 691)] Allocate a new trap: 0xc002100150 38 D0318 16:20:33.722992 355572 usertrap_amd64.go:225] [ 4487( 691): 4487( 691)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:33.724722 355572 usertrap_amd64.go:212] [ 4485( 44): 4485( 44)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.724834 355572 usertrap_amd64.go:122] [ 4485( 44): 4485( 44)] Allocate a new trap: 0xc00637c0c0 39 D0318 16:20:33.724948 355572 usertrap_amd64.go:225] [ 4485( 44): 4485( 44)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.726102 355572 usertrap_amd64.go:212] [ 4484(1110): 4484(1110)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.726171 355572 usertrap_amd64.go:122] [ 4484(1110): 4484(1110)] Allocate a new trap: 0xc0002d2210 40 D0318 16:20:33.726237 355572 usertrap_amd64.go:225] [ 4484(1110): 4484(1110)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.726733 355572 usertrap_amd64.go:212] [ 4485( 44): 4485( 44)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.726829 355572 usertrap_amd64.go:122] [ 4485( 44): 4485( 44)] Allocate a new trap: 0xc00637c0c0 40 D0318 16:20:33.726919 355572 usertrap_amd64.go:225] [ 4485( 44): 4485( 44)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.727366 355572 usertrap_amd64.go:212] [ 4485( 44): 4489( 45)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.727442 355572 usertrap_amd64.go:122] [ 4485( 44): 4489( 45)] Allocate a new trap: 0xc00637c0c0 41 D0318 16:20:33.727505 355572 usertrap_amd64.go:225] [ 4485( 44): 4489( 45)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.728087 355572 usertrap_amd64.go:212] [ 4484(1110): 4484(1110)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.728176 355572 usertrap_amd64.go:122] [ 4484(1110): 4484(1110)] Allocate a new trap: 0xc0002d2210 41 D0318 16:20:33.728289 355572 usertrap_amd64.go:225] [ 4484(1110): 4484(1110)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.728529 355572 usertrap_amd64.go:212] [ 4484(1110): 4490(1111)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.728594 355572 usertrap_amd64.go:122] [ 4484(1110): 4490(1111)] Allocate a new trap: 0xc0002d2210 42 D0318 16:20:33.728657 355572 usertrap_amd64.go:225] [ 4484(1110): 4490(1111)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.729795 355572 usertrap_amd64.go:212] [ 4484(1110): 4484(1110)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.729881 355572 usertrap_amd64.go:122] [ 4484(1110): 4484(1110)] Allocate a new trap: 0xc0002d2210 43 D0318 16:20:33.729938 355572 usertrap_amd64.go:212] [ 4485( 44): 4485( 44)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.729975 355572 usertrap_amd64.go:225] [ 4484(1110): 4484(1110)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.730010 355572 usertrap_amd64.go:122] [ 4485( 44): 4485( 44)] Allocate a new trap: 0xc00637c0c0 42 D0318 16:20:33.730101 355572 usertrap_amd64.go:225] [ 4485( 44): 4485( 44)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.732555 355572 usertrap_amd64.go:212] [ 4488(1150): 4488(1150)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.732651 355572 usertrap_amd64.go:122] [ 4488(1150): 4488(1150)] Allocate a new trap: 0xc000b761e0 37 D0318 16:20:33.733254 355572 usertrap_amd64.go:225] [ 4488(1150): 4488(1150)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.735810 355572 task_exit.go:204] [ 4484(1110): 4484(1110)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.736002 355572 task_exit.go:204] [ 4485( 44): 4485( 44)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.736709 355572 task_signals.go:204] [ 4485( 44): 4489( 45)] Signal 9, PID: 4485, TID: 4489, fault addr: 0x0: terminating thread group D0318 16:20:33.736878 355572 task_exit.go:204] [ 4485( 44): 4489( 45)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.736879 355572 task_signals.go:204] [ 4484(1110): 4490(1111)] Signal 9, PID: 4484, TID: 4490, fault addr: 0x0: terminating thread group D0318 16:20:33.736997 355572 task_exit.go:204] [ 4484(1110): 4490(1111)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.737966 355572 task_exit.go:204] [ 4485( 44): 4485( 44)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.738318 355572 task_exit.go:204] [ 4484(1110): 4484(1110)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.738700 355572 usertrap_amd64.go:212] [ 4487( 691): 4487( 691)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:33.738851 355572 usertrap_amd64.go:122] [ 4487( 691): 4487( 691)] Allocate a new trap: 0xc002100150 39 D0318 16:20:33.738944 355572 usertrap_amd64.go:225] [ 4487( 691): 4487( 691)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:33.739918 355572 usertrap_amd64.go:212] [ 4488(1150): 4488(1150)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.740032 355572 usertrap_amd64.go:122] [ 4488(1150): 4488(1150)] Allocate a new trap: 0xc000b761e0 38 D0318 16:20:33.740284 355572 usertrap_amd64.go:225] [ 4488(1150): 4488(1150)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.743706 355572 task_exit.go:204] [ 4484(1110): 4490(1111)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.743983 355572 task_exit.go:204] [ 4484(1110): 4490(1111)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.744160 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.745234 355572 task_exit.go:204] [ 4484(1110): 4484(1110)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.745660 355572 task_exit.go:204] [ 4485( 44): 4489( 45)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.745751 355572 task_exit.go:204] [ 4485( 44): 4489( 45)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.745837 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.746262 355572 task_exit.go:204] [ 4485( 44): 4485( 44)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 1: prctl$PR_SET_SECCOMP(0x1c, 0x0, 0x0) 16:20:33 executing program 0: modify_ldt$write(0x1, &(0x7f0000000000)={0x3ff}, 0x10) modify_ldt$write(0x1, &(0x7f0000000040), 0x10) D0318 16:20:33.750496 355572 usertrap_amd64.go:212] [ 4487( 691): 4487( 691)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:33.750639 355572 usertrap_amd64.go:122] [ 4487( 691): 4487( 691)] Allocate a new trap: 0xc002100150 40 D0318 16:20:33.750715 355572 usertrap_amd64.go:225] [ 4487( 691): 4487( 691)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:33.752246 355572 usertrap_amd64.go:212] [ 4487( 691): 4487( 691)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:33.752318 355572 usertrap_amd64.go:122] [ 4487( 691): 4487( 691)] Allocate a new trap: 0xc002100150 41 D0318 16:20:33.752456 355572 usertrap_amd64.go:225] [ 4487( 691): 4487( 691)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:33.752802 355572 usertrap_amd64.go:212] [ 4487( 691): 4491( 692)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:33.752891 355572 usertrap_amd64.go:122] [ 4487( 691): 4491( 692)] Allocate a new trap: 0xc002100150 42 D0318 16:20:33.752978 355572 usertrap_amd64.go:225] [ 4487( 691): 4491( 692)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:33.755070 355572 usertrap_amd64.go:212] [ 4487( 691): 4487( 691)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:33.755251 355572 usertrap_amd64.go:122] [ 4487( 691): 4487( 691)] Allocate a new trap: 0xc002100150 43 D0318 16:20:33.755370 355572 usertrap_amd64.go:225] [ 4487( 691): 4487( 691)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:33.761108 355572 task_exit.go:204] [ 4487( 691): 4487( 691)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.761275 355572 task_signals.go:204] [ 4487( 691): 4491( 692)] Signal 9, PID: 4487, TID: 4491, fault addr: 0x0: terminating thread group D0318 16:20:33.761399 355572 task_exit.go:204] [ 4487( 691): 4491( 692)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.762070 355572 task_exit.go:204] [ 4487( 691): 4487( 691)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.762638 355572 usertrap_amd64.go:212] [ 4488(1150): 4488(1150)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.762723 355572 usertrap_amd64.go:122] [ 4488(1150): 4488(1150)] Allocate a new trap: 0xc000b761e0 39 D0318 16:20:33.762800 355572 usertrap_amd64.go:225] [ 4488(1150): 4488(1150)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.767784 355572 task_exit.go:204] [ 4487( 691): 4491( 692)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.767855 355572 task_exit.go:204] [ 4487( 691): 4491( 692)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.767996 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.769166 355572 usertrap_amd64.go:212] [ 4488(1150): 4488(1150)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.769262 355572 usertrap_amd64.go:122] [ 4488(1150): 4488(1150)] Allocate a new trap: 0xc000b761e0 40 D0318 16:20:33.769335 355572 usertrap_amd64.go:225] [ 4488(1150): 4488(1150)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.769308 355572 task_exit.go:204] [ 4487( 691): 4487( 691)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000100)={@loopback}, 0x14) D0318 16:20:33.771147 355572 usertrap_amd64.go:212] [ 4488(1150): 4488(1150)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:33.771225 355572 usertrap_amd64.go:122] [ 4488(1150): 4488(1150)] Allocate a new trap: 0xc000b761e0 41 D0318 16:20:33.771369 355572 usertrap_amd64.go:225] [ 4488(1150): 4488(1150)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.772222 355572 usertrap_amd64.go:212] [ 4488(1150): 4493(1151)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.772301 355572 usertrap_amd64.go:122] [ 4488(1150): 4493(1151)] Allocate a new trap: 0xc000b761e0 42 D0318 16:20:33.772462 355572 usertrap_amd64.go:225] [ 4488(1150): 4493(1151)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) I0318 16:20:33.773961 355572 compat.go:120] Unsupported syscall prctl(0x2b,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/prctl for more information. D0318 16:20:33.774890 355572 usertrap_amd64.go:212] [ 4488(1150): 4488(1150)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.774998 355572 usertrap_amd64.go:122] [ 4488(1150): 4488(1150)] Allocate a new trap: 0xc000b761e0 43 D0318 16:20:33.775093 355572 usertrap_amd64.go:225] [ 4488(1150): 4488(1150)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.779355 355572 task_exit.go:204] [ 4488(1150): 4488(1150)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.779682 355572 task_signals.go:204] [ 4488(1150): 4493(1151)] Signal 9, PID: 4488, TID: 4493, fault addr: 0x0: terminating thread group D0318 16:20:33.780239 355572 task_exit.go:204] [ 4488(1150): 4488(1150)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.780577 355572 task_exit.go:204] [ 4488(1150): 4493(1151)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.781591 355572 usertrap_amd64.go:212] [ 4492(1112): 4492(1112)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.781762 355572 usertrap_amd64.go:122] [ 4492(1112): 4492(1112)] Allocate a new trap: 0xc005d561b0 37 D0318 16:20:33.782950 355572 usertrap_amd64.go:225] [ 4492(1112): 4492(1112)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.784807 355572 usertrap_amd64.go:212] [ 4494( 46): 4494( 46)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.784910 355572 usertrap_amd64.go:122] [ 4494( 46): 4494( 46)] Allocate a new trap: 0xc002100450 36 D0318 16:20:33.785624 355572 usertrap_amd64.go:225] [ 4494( 46): 4494( 46)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.786140 355572 task_exit.go:204] [ 4488(1150): 4493(1151)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.786299 355572 task_exit.go:204] [ 4488(1150): 4493(1151)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.786449 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.786608 355572 task_exit.go:204] [ 4488(1150): 4488(1150)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.786835 355572 usertrap_amd64.go:212] [ 4492(1112): 4492(1112)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.786911 355572 usertrap_amd64.go:122] [ 4492(1112): 4492(1112)] Allocate a new trap: 0xc005d561b0 38 D0318 16:20:33.786989 355572 usertrap_amd64.go:225] [ 4492(1112): 4492(1112)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) 16:20:33 executing program 3: prctl$PR_GET_TID_ADDRESS(0x17, &(0x7f0000008640)) D0318 16:20:33.790464 355572 usertrap_amd64.go:212] [ 4494( 46): 4494( 46)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.790539 355572 usertrap_amd64.go:122] [ 4494( 46): 4494( 46)] Allocate a new trap: 0xc002100450 37 D0318 16:20:33.790644 355572 usertrap_amd64.go:225] [ 4494( 46): 4494( 46)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:33.799736 355572 usertrap_amd64.go:212] [ 4492(1112): 4492(1112)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.799823 355572 usertrap_amd64.go:122] [ 4492(1112): 4492(1112)] Allocate a new trap: 0xc005d561b0 39 D0318 16:20:33.799895 355572 usertrap_amd64.go:225] [ 4492(1112): 4492(1112)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.806383 355572 usertrap_amd64.go:212] [ 4494( 46): 4494( 46)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.806506 355572 usertrap_amd64.go:122] [ 4494( 46): 4494( 46)] Allocate a new trap: 0xc002100450 38 D0318 16:20:33.806605 355572 usertrap_amd64.go:225] [ 4494( 46): 4494( 46)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.806713 355572 usertrap_amd64.go:212] [ 4495( 693): 4495( 693)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:33.806838 355572 usertrap_amd64.go:122] [ 4495( 693): 4495( 693)] Allocate a new trap: 0xc000dc6180 37 D0318 16:20:33.807476 355572 usertrap_amd64.go:225] [ 4495( 693): 4495( 693)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:33.808669 355572 usertrap_amd64.go:212] [ 4492(1112): 4492(1112)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.808739 355572 usertrap_amd64.go:122] [ 4492(1112): 4492(1112)] Allocate a new trap: 0xc005d561b0 40 D0318 16:20:33.808851 355572 usertrap_amd64.go:225] [ 4492(1112): 4492(1112)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.810377 355572 usertrap_amd64.go:212] [ 4492(1112): 4492(1112)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.810451 355572 usertrap_amd64.go:122] [ 4492(1112): 4492(1112)] Allocate a new trap: 0xc005d561b0 41 D0318 16:20:33.810593 355572 usertrap_amd64.go:225] [ 4492(1112): 4492(1112)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.811236 355572 usertrap_amd64.go:212] [ 4492(1112): 4497(1113)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.811325 355572 usertrap_amd64.go:122] [ 4492(1112): 4497(1113)] Allocate a new trap: 0xc005d561b0 42 D0318 16:20:33.811420 355572 usertrap_amd64.go:225] [ 4492(1112): 4497(1113)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.812322 355572 usertrap_amd64.go:212] [ 4495( 693): 4495( 693)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:33.812399 355572 usertrap_amd64.go:122] [ 4495( 693): 4495( 693)] Allocate a new trap: 0xc000dc6180 38 D0318 16:20:33.812465 355572 usertrap_amd64.go:225] [ 4495( 693): 4495( 693)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:33.812994 355572 usertrap_amd64.go:212] [ 4492(1112): 4492(1112)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.813079 355572 usertrap_amd64.go:122] [ 4492(1112): 4492(1112)] Allocate a new trap: 0xc005d561b0 43 D0318 16:20:33.813215 355572 usertrap_amd64.go:225] [ 4492(1112): 4492(1112)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.815322 355572 usertrap_amd64.go:212] [ 4494( 46): 4494( 46)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.815402 355572 usertrap_amd64.go:122] [ 4494( 46): 4494( 46)] Allocate a new trap: 0xc002100450 39 D0318 16:20:33.815494 355572 usertrap_amd64.go:225] [ 4494( 46): 4494( 46)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.817420 355572 usertrap_amd64.go:212] [ 4494( 46): 4494( 46)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.817524 355572 usertrap_amd64.go:122] [ 4494( 46): 4494( 46)] Allocate a new trap: 0xc002100450 40 D0318 16:20:33.817634 355572 usertrap_amd64.go:225] [ 4494( 46): 4494( 46)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.817816 355572 usertrap_amd64.go:212] [ 4494( 46): 4498( 47)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.817960 355572 usertrap_amd64.go:122] [ 4494( 46): 4498( 47)] Allocate a new trap: 0xc002100450 41 D0318 16:20:33.818086 355572 usertrap_amd64.go:225] [ 4494( 46): 4498( 47)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.820206 355572 usertrap_amd64.go:212] [ 4494( 46): 4494( 46)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:33.820275 355572 usertrap_amd64.go:122] [ 4494( 46): 4494( 46)] Allocate a new trap: 0xc002100450 42 D0318 16:20:33.820272 355572 usertrap_amd64.go:212] [ 4496(1152): 4496(1152)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.820369 355572 usertrap_amd64.go:122] [ 4496(1152): 4496(1152)] Allocate a new trap: 0xc0078f6180 37 D0318 16:20:33.820360 355572 usertrap_amd64.go:225] [ 4494( 46): 4494( 46)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.820761 355572 task_exit.go:204] [ 4492(1112): 4492(1112)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.821015 355572 usertrap_amd64.go:225] [ 4496(1152): 4496(1152)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.821566 355572 task_signals.go:204] [ 4492(1112): 4497(1113)] Signal 9, PID: 4492, TID: 4497, fault addr: 0x0: terminating thread group D0318 16:20:33.821694 355572 task_exit.go:204] [ 4492(1112): 4492(1112)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.821948 355572 task_exit.go:204] [ 4492(1112): 4497(1113)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.824064 355572 task_exit.go:204] [ 4494( 46): 4494( 46)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.824182 355572 task_signals.go:204] [ 4494( 46): 4498( 47)] Signal 9, PID: 4494, TID: 4498, fault addr: 0x0: terminating thread group D0318 16:20:33.824572 355572 usertrap_amd64.go:212] [ 4496(1152): 4496(1152)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.824641 355572 usertrap_amd64.go:122] [ 4496(1152): 4496(1152)] Allocate a new trap: 0xc0078f6180 38 D0318 16:20:33.824695 355572 usertrap_amd64.go:225] [ 4496(1152): 4496(1152)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.824767 355572 task_exit.go:204] [ 4494( 46): 4494( 46)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.824915 355572 task_exit.go:204] [ 4494( 46): 4498( 47)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.827411 355572 task_exit.go:204] [ 4492(1112): 4497(1113)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.827538 355572 task_exit.go:204] [ 4492(1112): 4497(1113)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.827747 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.828314 355572 task_exit.go:204] [ 4492(1112): 4492(1112)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000100), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000240)={0x28}, 0x28) D0318 16:20:33.830752 355572 task_exit.go:204] [ 4494( 46): 4498( 47)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.830843 355572 task_exit.go:204] [ 4494( 46): 4498( 47)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.830940 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:33.831136 355572 task_exit.go:204] [ 4494( 46): 4494( 46)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) D0318 16:20:33.832708 355572 usertrap_amd64.go:212] [ 4495( 693): 4495( 693)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:33.832793 355572 usertrap_amd64.go:122] [ 4495( 693): 4495( 693)] Allocate a new trap: 0xc000dc6180 39 D0318 16:20:33.832898 355572 usertrap_amd64.go:225] [ 4495( 693): 4495( 693)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:33.843041 355572 usertrap_amd64.go:212] [ 4495( 693): 4495( 693)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:33.843162 355572 usertrap_amd64.go:122] [ 4495( 693): 4495( 693)] Allocate a new trap: 0xc000dc6180 40 D0318 16:20:33.843239 355572 usertrap_amd64.go:225] [ 4495( 693): 4495( 693)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:33.843375 355572 usertrap_amd64.go:212] [ 4496(1152): 4496(1152)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.843471 355572 usertrap_amd64.go:122] [ 4496(1152): 4496(1152)] Allocate a new trap: 0xc0078f6180 39 D0318 16:20:33.843725 355572 usertrap_amd64.go:225] [ 4496(1152): 4496(1152)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.844866 355572 usertrap_amd64.go:212] [ 4495( 693): 4495( 693)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:33.844985 355572 usertrap_amd64.go:122] [ 4495( 693): 4495( 693)] Allocate a new trap: 0xc000dc6180 41 D0318 16:20:33.845074 355572 usertrap_amd64.go:225] [ 4495( 693): 4495( 693)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:33.845290 355572 usertrap_amd64.go:212] [ 4495( 693): 4499( 694)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:33.845371 355572 usertrap_amd64.go:122] [ 4495( 693): 4499( 694)] Allocate a new trap: 0xc000dc6180 42 D0318 16:20:33.845491 355572 usertrap_amd64.go:225] [ 4495( 693): 4499( 694)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:33.848616 355572 usertrap_amd64.go:212] [ 4495( 693): 4495( 693)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:33.848719 355572 usertrap_amd64.go:122] [ 4495( 693): 4495( 693)] Allocate a new trap: 0xc000dc6180 43 D0318 16:20:33.848805 355572 usertrap_amd64.go:225] [ 4495( 693): 4495( 693)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:33.851962 355572 usertrap_amd64.go:212] [ 4496(1152): 4496(1152)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.852050 355572 usertrap_amd64.go:122] [ 4496(1152): 4496(1152)] Allocate a new trap: 0xc0078f6180 40 D0318 16:20:33.852167 355572 usertrap_amd64.go:225] [ 4496(1152): 4496(1152)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.853576 355572 usertrap_amd64.go:212] [ 4496(1152): 4496(1152)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:33.853729 355572 usertrap_amd64.go:122] [ 4496(1152): 4496(1152)] Allocate a new trap: 0xc0078f6180 41 D0318 16:20:33.853918 355572 usertrap_amd64.go:225] [ 4496(1152): 4496(1152)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.854161 355572 usertrap_amd64.go:212] [ 4496(1152): 4501(1153)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.854226 355572 usertrap_amd64.go:122] [ 4496(1152): 4501(1153)] Allocate a new trap: 0xc0078f6180 42 D0318 16:20:33.854338 355572 usertrap_amd64.go:225] [ 4496(1152): 4501(1153)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.855595 355572 usertrap_amd64.go:212] [ 4496(1152): 4496(1152)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.855732 355572 usertrap_amd64.go:122] [ 4496(1152): 4496(1152)] Allocate a new trap: 0xc0078f6180 43 D0318 16:20:33.855805 355572 usertrap_amd64.go:225] [ 4496(1152): 4496(1152)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.856825 355572 task_exit.go:204] [ 4495( 693): 4495( 693)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.857058 355572 task_signals.go:204] [ 4495( 693): 4499( 694)] Signal 9, PID: 4495, TID: 4499, fault addr: 0x0: terminating thread group D0318 16:20:33.857493 355572 task_exit.go:204] [ 4495( 693): 4499( 694)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.857716 355572 task_exit.go:204] [ 4495( 693): 4495( 693)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.859066 355572 usertrap_amd64.go:212] [ 4500( 48): 4500( 48)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:33.859232 355572 usertrap_amd64.go:122] [ 4500( 48): 4500( 48)] Allocate a new trap: 0xc0002d2330 36 D0318 16:20:33.859953 355572 usertrap_amd64.go:225] [ 4500( 48): 4500( 48)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:33.861515 355572 task_signals.go:204] [ 4496(1152): 4501(1153)] Signal 9, PID: 4496, TID: 4501, fault addr: 0x0: terminating thread group D0318 16:20:33.861731 355572 task_exit.go:204] [ 4496(1152): 4496(1152)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.862285 355572 task_exit.go:204] [ 4496(1152): 4496(1152)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.862420 355572 task_exit.go:204] [ 4496(1152): 4501(1153)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.863111 355572 task_exit.go:204] [ 4495( 693): 4499( 694)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.863175 355572 task_exit.go:204] [ 4495( 693): 4499( 694)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.863248 355572 usertrap_amd64.go:212] [ 4500( 48): 4500( 48)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:33.863291 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:33.863326 355572 usertrap_amd64.go:122] [ 4500( 48): 4500( 48)] Allocate a new trap: 0xc0002d2330 37 D0318 16:20:33.863409 355572 task_exit.go:204] [ 4495( 693): 4495( 693)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.863411 355572 usertrap_amd64.go:225] [ 4500( 48): 4500( 48)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) 16:20:33 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:33.867235 355572 task_exit.go:204] [ 4496(1152): 4501(1153)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.867308 355572 task_exit.go:204] [ 4496(1152): 4501(1153)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.867467 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.868136 355572 task_exit.go:204] [ 4496(1152): 4496(1152)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 3: shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x7000) D0318 16:20:33.873712 355572 usertrap_amd64.go:212] [ 4502(1114): 4502(1114)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.873818 355572 usertrap_amd64.go:122] [ 4502(1114): 4502(1114)] Allocate a new trap: 0xc005d56240 37 D0318 16:20:33.874493 355572 usertrap_amd64.go:225] [ 4502(1114): 4502(1114)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.877527 355572 usertrap_amd64.go:212] [ 4502(1114): 4502(1114)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.877623 355572 usertrap_amd64.go:122] [ 4502(1114): 4502(1114)] Allocate a new trap: 0xc005d56240 38 D0318 16:20:33.877684 355572 usertrap_amd64.go:225] [ 4502(1114): 4502(1114)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.880643 355572 usertrap_amd64.go:212] [ 4500( 48): 4500( 48)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:33.880744 355572 usertrap_amd64.go:122] [ 4500( 48): 4500( 48)] Allocate a new trap: 0xc0002d2330 38 D0318 16:20:33.880817 355572 usertrap_amd64.go:225] [ 4500( 48): 4500( 48)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:33.888408 355572 usertrap_amd64.go:212] [ 4500( 48): 4500( 48)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:33.888477 355572 usertrap_amd64.go:122] [ 4500( 48): 4500( 48)] Allocate a new trap: 0xc0002d2330 39 D0318 16:20:33.888569 355572 usertrap_amd64.go:225] [ 4500( 48): 4500( 48)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:33.890268 355572 usertrap_amd64.go:212] [ 4500( 48): 4500( 48)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:33.890353 355572 usertrap_amd64.go:122] [ 4500( 48): 4500( 48)] Allocate a new trap: 0xc0002d2330 40 D0318 16:20:33.890482 355572 usertrap_amd64.go:225] [ 4500( 48): 4500( 48)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:33.890699 355572 usertrap_amd64.go:212] [ 4500( 48): 4505( 49)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:33.890858 355572 usertrap_amd64.go:122] [ 4500( 48): 4505( 49)] Allocate a new trap: 0xc0002d2330 41 D0318 16:20:33.890950 355572 usertrap_amd64.go:225] [ 4500( 48): 4505( 49)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:33.894766 355572 usertrap_amd64.go:212] [ 4502(1114): 4502(1114)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.894840 355572 usertrap_amd64.go:122] [ 4502(1114): 4502(1114)] Allocate a new trap: 0xc005d56240 39 D0318 16:20:33.894958 355572 usertrap_amd64.go:225] [ 4502(1114): 4502(1114)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.896767 355572 usertrap_amd64.go:212] [ 4503( 695): 4503( 695)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:33.896875 355572 usertrap_amd64.go:122] [ 4503( 695): 4503( 695)] Allocate a new trap: 0xc000bce2a0 37 D0318 16:20:33.897458 355572 usertrap_amd64.go:225] [ 4503( 695): 4503( 695)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:33.899785 355572 task_syscall.go:246] [ 4500( 48): 4505( 49)] Syscall 202: killed by seccomp D0318 16:20:33.899957 355572 task_exit.go:204] [ 4500( 48): 4505( 49)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.900505 355572 usertrap_amd64.go:212] [ 4503( 695): 4503( 695)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:33.900515 355572 task_exit.go:204] [ 4500( 48): 4505( 49)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.900861 355572 task_exit.go:204] [ 4500( 48): 4505( 49)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.900707 355572 usertrap_amd64.go:122] [ 4503( 695): 4503( 695)] Allocate a new trap: 0xc000bce2a0 38 D0318 16:20:33.900980 355572 usertrap_amd64.go:225] [ 4503( 695): 4503( 695)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:33.901862 355572 usertrap_amd64.go:212] [ 4502(1114): 4502(1114)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.901952 355572 usertrap_amd64.go:122] [ 4502(1114): 4502(1114)] Allocate a new trap: 0xc005d56240 40 D0318 16:20:33.902050 355572 usertrap_amd64.go:225] [ 4502(1114): 4502(1114)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.903701 355572 usertrap_amd64.go:212] [ 4502(1114): 4502(1114)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.903787 355572 usertrap_amd64.go:122] [ 4502(1114): 4502(1114)] Allocate a new trap: 0xc005d56240 41 D0318 16:20:33.903864 355572 usertrap_amd64.go:225] [ 4502(1114): 4502(1114)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.904179 355572 usertrap_amd64.go:212] [ 4502(1114): 4506(1115)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.904265 355572 usertrap_amd64.go:122] [ 4502(1114): 4506(1115)] Allocate a new trap: 0xc005d56240 42 D0318 16:20:33.904326 355572 usertrap_amd64.go:225] [ 4502(1114): 4506(1115)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.908079 355572 usertrap_amd64.go:212] [ 4502(1114): 4502(1114)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.908151 355572 usertrap_amd64.go:122] [ 4502(1114): 4502(1114)] Allocate a new trap: 0xc005d56240 43 D0318 16:20:33.908250 355572 usertrap_amd64.go:225] [ 4502(1114): 4502(1114)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.908834 355572 usertrap_amd64.go:212] [ 4504(1154): 4504(1154)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.908920 355572 usertrap_amd64.go:122] [ 4504(1154): 4504(1154)] Allocate a new trap: 0xc000526300 37 D0318 16:20:33.909529 355572 usertrap_amd64.go:225] [ 4504(1154): 4504(1154)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.913225 355572 usertrap_amd64.go:212] [ 4504(1154): 4504(1154)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.913323 355572 usertrap_amd64.go:122] [ 4504(1154): 4504(1154)] Allocate a new trap: 0xc000526300 38 D0318 16:20:33.913433 355572 usertrap_amd64.go:225] [ 4504(1154): 4504(1154)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.914555 355572 usertrap_amd64.go:212] [ 4503( 695): 4503( 695)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:33.914615 355572 usertrap_amd64.go:122] [ 4503( 695): 4503( 695)] Allocate a new trap: 0xc000bce2a0 39 D0318 16:20:33.914688 355572 usertrap_amd64.go:225] [ 4503( 695): 4503( 695)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:33.915887 355572 task_exit.go:204] [ 4502(1114): 4502(1114)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.916061 355572 task_signals.go:204] [ 4502(1114): 4506(1115)] Signal 9, PID: 4502, TID: 4506, fault addr: 0x0: terminating thread group D0318 16:20:33.916476 355572 task_exit.go:204] [ 4502(1114): 4502(1114)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.916669 355572 task_exit.go:204] [ 4502(1114): 4506(1115)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.921450 355572 task_exit.go:204] [ 4502(1114): 4506(1115)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.921562 355572 task_exit.go:204] [ 4502(1114): 4506(1115)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.921655 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.921881 355572 usertrap_amd64.go:212] [ 4503( 695): 4503( 695)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:33.921953 355572 usertrap_amd64.go:122] [ 4503( 695): 4503( 695)] Allocate a new trap: 0xc000bce2a0 40 D0318 16:20:33.921949 355572 task_exit.go:204] [ 4502(1114): 4502(1114)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.922007 355572 usertrap_amd64.go:225] [ 4503( 695): 4503( 695)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:33.923204 355572 usertrap_amd64.go:212] [ 4503( 695): 4503( 695)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:33.923265 355572 usertrap_amd64.go:122] [ 4503( 695): 4503( 695)] Allocate a new trap: 0xc000bce2a0 41 16:20:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8927, &(0x7f0000000240)={'syztnl2\x00', 0x0}) D0318 16:20:33.923334 355572 usertrap_amd64.go:225] [ 4503( 695): 4503( 695)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:33.923519 355572 usertrap_amd64.go:212] [ 4503( 695): 4507( 696)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:33.923701 355572 usertrap_amd64.go:122] [ 4503( 695): 4507( 696)] Allocate a new trap: 0xc000bce2a0 42 D0318 16:20:33.923799 355572 usertrap_amd64.go:225] [ 4503( 695): 4507( 696)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:33.924596 355572 usertrap_amd64.go:212] [ 4504(1154): 4504(1154)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.924650 355572 usertrap_amd64.go:122] [ 4504(1154): 4504(1154)] Allocate a new trap: 0xc000526300 39 D0318 16:20:33.924720 355572 usertrap_amd64.go:225] [ 4504(1154): 4504(1154)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.930576 355572 usertrap_amd64.go:212] [ 4504(1154): 4504(1154)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:33.930654 355572 usertrap_amd64.go:122] [ 4504(1154): 4504(1154)] Allocate a new trap: 0xc000526300 40 D0318 16:20:33.930731 355572 usertrap_amd64.go:225] [ 4504(1154): 4504(1154)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.932242 355572 usertrap_amd64.go:212] [ 4504(1154): 4504(1154)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:33.932301 355572 usertrap_amd64.go:122] [ 4504(1154): 4504(1154)] Allocate a new trap: 0xc000526300 41 D0318 16:20:33.932364 355572 usertrap_amd64.go:225] [ 4504(1154): 4504(1154)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.932619 355572 usertrap_amd64.go:212] [ 4504(1154): 4508(1155)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:33.932719 355572 usertrap_amd64.go:122] [ 4504(1154): 4508(1155)] Allocate a new trap: 0xc000526300 42 D0318 16:20:33.932793 355572 usertrap_amd64.go:225] [ 4504(1154): 4508(1155)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.933735 355572 usertrap_amd64.go:212] [ 4504(1154): 4504(1154)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:33.933795 355572 usertrap_amd64.go:122] [ 4504(1154): 4504(1154)] Allocate a new trap: 0xc000526300 43 D0318 16:20:33.933847 355572 usertrap_amd64.go:225] [ 4504(1154): 4504(1154)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.937148 355572 task_exit.go:204] [ 4504(1154): 4504(1154)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.937289 355572 task_signals.go:204] [ 4504(1154): 4508(1155)] Signal 9, PID: 4504, TID: 4508, fault addr: 0x0: terminating thread group D0318 16:20:33.937729 355572 task_exit.go:204] [ 4504(1154): 4508(1155)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.937881 355572 task_exit.go:204] [ 4504(1154): 4504(1154)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.942552 355572 task_exit.go:204] [ 4504(1154): 4508(1155)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.942627 355572 task_exit.go:204] [ 4504(1154): 4508(1155)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.942734 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:33.942846 355572 task_exit.go:204] [ 4504(1154): 4504(1154)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000080)) D0318 16:20:33.948299 355572 usertrap_amd64.go:212] [ 4509(1116): 4509(1116)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:33.948467 355572 usertrap_amd64.go:122] [ 4509(1116): 4509(1116)] Allocate a new trap: 0xc0009760c0 37 D0318 16:20:33.949280 355572 usertrap_amd64.go:225] [ 4509(1116): 4509(1116)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.953386 355572 usertrap_amd64.go:212] [ 4509(1116): 4509(1116)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:33.953544 355572 usertrap_amd64.go:122] [ 4509(1116): 4509(1116)] Allocate a new trap: 0xc0009760c0 38 D0318 16:20:33.953658 355572 usertrap_amd64.go:225] [ 4509(1116): 4509(1116)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.968290 355572 usertrap_amd64.go:212] [ 4509(1116): 4509(1116)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:33.968520 355572 usertrap_amd64.go:122] [ 4509(1116): 4509(1116)] Allocate a new trap: 0xc0009760c0 39 D0318 16:20:33.968676 355572 usertrap_amd64.go:225] [ 4509(1116): 4509(1116)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.970447 355572 usertrap_amd64.go:212] [ 4510(1156): 4510(1156)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:33.970553 355572 usertrap_amd64.go:122] [ 4510(1156): 4510(1156)] Allocate a new trap: 0xc0002d2420 37 D0318 16:20:33.971249 355572 usertrap_amd64.go:225] [ 4510(1156): 4510(1156)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:33.975142 355572 usertrap_amd64.go:212] [ 4510(1156): 4510(1156)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:33.975237 355572 usertrap_amd64.go:122] [ 4510(1156): 4510(1156)] Allocate a new trap: 0xc0002d2420 38 D0318 16:20:33.975376 355572 usertrap_amd64.go:225] [ 4510(1156): 4510(1156)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:33.976086 355572 usertrap_amd64.go:212] [ 4509(1116): 4509(1116)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:33.976185 355572 usertrap_amd64.go:122] [ 4509(1116): 4509(1116)] Allocate a new trap: 0xc0009760c0 40 D0318 16:20:33.976263 355572 usertrap_amd64.go:225] [ 4509(1116): 4509(1116)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:33.977930 355572 usertrap_amd64.go:212] [ 4509(1116): 4509(1116)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:33.978092 355572 usertrap_amd64.go:122] [ 4509(1116): 4509(1116)] Allocate a new trap: 0xc0009760c0 41 D0318 16:20:33.978203 355572 usertrap_amd64.go:225] [ 4509(1116): 4509(1116)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:33.978510 355572 usertrap_amd64.go:212] [ 4509(1116): 4511(1117)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:33.978623 355572 usertrap_amd64.go:122] [ 4509(1116): 4511(1117)] Allocate a new trap: 0xc0009760c0 42 D0318 16:20:33.978744 355572 usertrap_amd64.go:225] [ 4509(1116): 4511(1117)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:33.979905 355572 task_signals.go:309] [ 4503( 695): 4512( 697)] failed to restore from a signal frame: bad address D0318 16:20:33.980159 355572 task_signals.go:470] [ 4503( 695): 4512( 697)] Notified of signal 11 D0318 16:20:33.980282 355572 task_signals.go:220] [ 4503( 695): 4512( 697)] Signal 11: delivering to handler D0318 16:20:33.982536 355572 usertrap_amd64.go:212] [ 4509(1116): 4509(1116)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:33.982610 355572 usertrap_amd64.go:122] [ 4509(1116): 4509(1116)] Allocate a new trap: 0xc0009760c0 43 D0318 16:20:33.982690 355572 usertrap_amd64.go:225] [ 4509(1116): 4509(1116)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:33.983682 355572 usertrap_amd64.go:212] [ 4503( 695): 4503( 695)] Found the pattern at ip 55ca2d9111ae:sysno 230 D0318 16:20:33.983875 355572 usertrap_amd64.go:122] [ 4503( 695): 4503( 695)] Allocate a new trap: 0xc000bce2a0 43 D0318 16:20:33.984004 355572 usertrap_amd64.go:225] [ 4503( 695): 4503( 695)] Apply the binary patch addr 55ca2d9111ae trap addr 6ad70 ([184 230 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:33.984302 355572 usertrap_amd64.go:212] [ 4503( 695): 4507( 696)] Found the pattern at ip 55ca2d8e4ae8:sysno 1 D0318 16:20:33.984381 355572 usertrap_amd64.go:122] [ 4503( 695): 4507( 696)] Allocate a new trap: 0xc000bce2a0 44 D0318 16:20:33.984478 355572 usertrap_amd64.go:225] [ 4503( 695): 4507( 696)] Apply the binary patch addr 55ca2d8e4ae8 trap addr 6adc0 ([184 1 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0318 16:20:33.986275 355572 task_exit.go:204] [ 4509(1116): 4509(1116)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.986883 355572 task_signals.go:204] [ 4509(1116): 4511(1117)] Signal 9, PID: 4509, TID: 4511, fault addr: 0x0: terminating thread group D0318 16:20:33.986933 355572 task_exit.go:204] [ 4509(1116): 4509(1116)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.987221 355572 task_exit.go:204] [ 4509(1116): 4511(1117)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.992349 355572 task_exit.go:204] [ 4509(1116): 4511(1117)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.992429 355572 task_exit.go:204] [ 4509(1116): 4511(1117)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.992397 355572 usertrap_amd64.go:212] [ 4510(1156): 4510(1156)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:33.992489 355572 usertrap_amd64.go:122] [ 4510(1156): 4510(1156)] Allocate a new trap: 0xc0002d2420 39 D0318 16:20:33.992517 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:33.992593 355572 usertrap_amd64.go:225] [ 4510(1156): 4510(1156)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:33.993095 355572 task_exit.go:204] [ 4509(1116): 4509(1116)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.993543 355572 task_exit.go:204] [ 4503( 695): 4507( 696)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.993819 355572 task_signals.go:204] [ 4503( 695): 4512( 697)] Signal 9, PID: 4503, TID: 4512, fault addr: 0x0: terminating thread group D0318 16:20:33.993909 355572 task_signals.go:204] [ 4503( 695): 4503( 695)] Signal 9, PID: 4503, TID: 4503, fault addr: 0x0: terminating thread group D0318 16:20:33.994478 355572 task_exit.go:204] [ 4503( 695): 4507( 696)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.994547 355572 task_exit.go:204] [ 4503( 695): 4507( 696)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:33.994456 355572 task_signals.go:204] [ 4503( 695): 4513( 698)] Signal 9, PID: 4503, TID: 4513, fault addr: 0x0: terminating thread group D0318 16:20:33.994736 355572 task_exit.go:204] [ 4503( 695): 4512( 697)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.994867 355572 task_exit.go:204] [ 4503( 695): 4503( 695)] Transitioning from exit state TaskExitNone to TaskExitInitiated 16:20:33 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x21820, &(0x7f0000002100), 0x0, 0x0, 0x0) D0318 16:20:33.996593 355572 task_exit.go:204] [ 4503( 695): 4513( 698)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:33.996732 355572 task_exit.go:204] [ 4503( 695): 4503( 695)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.997275 355572 usertrap_amd64.go:212] [ 4500( 48): 4500( 48)] Found the pattern at ip 55e9c27981ae:sysno 230 D0318 16:20:33.997346 355572 usertrap_amd64.go:122] [ 4500( 48): 4500( 48)] Allocate a new trap: 0xc0002d2330 42 D0318 16:20:33.997435 355572 usertrap_amd64.go:225] [ 4500( 48): 4500( 48)] Apply the binary patch addr 55e9c27981ae trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:33.997708 355572 task_exit.go:204] [ 4503( 695): 4512( 697)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:33.997823 355572 task_exit.go:204] [ 4503( 695): 4512( 697)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.002375 355572 task_exit.go:204] [ 4503( 695): 4513( 698)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.002514 355572 task_exit.go:204] [ 4503( 695): 4513( 698)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.002651 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.003692 355572 task_exit.go:204] [ 4503( 695): 4503( 695)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.004136 355572 usertrap_amd64.go:212] [ 4510(1156): 4510(1156)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.004232 355572 usertrap_amd64.go:122] [ 4510(1156): 4510(1156)] Allocate a new trap: 0xc0002d2420 40 D0318 16:20:34.004323 355572 usertrap_amd64.go:225] [ 4510(1156): 4510(1156)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) 16:20:34 executing program 2: ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) shmat(0x0, &(0x7f0000ffb000/0x1000)=nil, 0x7000) D0318 16:20:34.006266 355572 usertrap_amd64.go:212] [ 4510(1156): 4510(1156)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.006367 355572 usertrap_amd64.go:122] [ 4510(1156): 4510(1156)] Allocate a new trap: 0xc0002d2420 41 D0318 16:20:34.006558 355572 usertrap_amd64.go:225] [ 4510(1156): 4510(1156)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.006926 355572 usertrap_amd64.go:212] [ 4510(1156): 4515(1157)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.007012 355572 usertrap_amd64.go:122] [ 4510(1156): 4515(1157)] Allocate a new trap: 0xc0002d2420 42 D0318 16:20:34.007255 355572 usertrap_amd64.go:225] [ 4510(1156): 4515(1157)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.009875 355572 usertrap_amd64.go:212] [ 4510(1156): 4510(1156)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.009974 355572 usertrap_amd64.go:122] [ 4510(1156): 4510(1156)] Allocate a new trap: 0xc0002d2420 43 D0318 16:20:34.010072 355572 usertrap_amd64.go:225] [ 4510(1156): 4510(1156)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.016746 355572 task_exit.go:204] [ 4510(1156): 4510(1156)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.017419 355572 task_signals.go:204] [ 4510(1156): 4515(1157)] Signal 9, PID: 4510, TID: 4515, fault addr: 0x0: terminating thread group D0318 16:20:34.017523 355572 task_exit.go:204] [ 4510(1156): 4510(1156)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.017653 355572 task_exit.go:204] [ 4510(1156): 4515(1157)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.022575 355572 task_exit.go:204] [ 4510(1156): 4515(1157)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.022669 355572 task_exit.go:204] [ 4510(1156): 4515(1157)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.022807 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.023216 355572 task_exit.go:204] [ 4510(1156): 4510(1156)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:34.031459 355572 usertrap_amd64.go:212] [ 4516(1118): 4516(1118)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.031576 355572 usertrap_amd64.go:122] [ 4516(1118): 4516(1118)] Allocate a new trap: 0xc000976120 37 D0318 16:20:34.031817 355572 usertrap_amd64.go:212] [ 4517( 699): 4517( 699)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:34.031918 355572 usertrap_amd64.go:122] [ 4517( 699): 4517( 699)] Allocate a new trap: 0xc000bce2d0 37 D0318 16:20:34.032307 355572 usertrap_amd64.go:225] [ 4516(1118): 4516(1118)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.032568 355572 usertrap_amd64.go:225] [ 4517( 699): 4517( 699)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:34.035695 355572 usertrap_amd64.go:212] [ 4516(1118): 4516(1118)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.035781 355572 usertrap_amd64.go:122] [ 4516(1118): 4516(1118)] Allocate a new trap: 0xc000976120 38 D0318 16:20:34.035837 355572 usertrap_amd64.go:225] [ 4516(1118): 4516(1118)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.037077 355572 usertrap_amd64.go:212] [ 4517( 699): 4517( 699)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:34.037154 355572 usertrap_amd64.go:122] [ 4517( 699): 4517( 699)] Allocate a new trap: 0xc000bce2d0 38 D0318 16:20:34.037253 355572 usertrap_amd64.go:225] [ 4517( 699): 4517( 699)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:34.048637 355572 usertrap_amd64.go:212] [ 4516(1118): 4516(1118)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.048718 355572 usertrap_amd64.go:122] [ 4516(1118): 4516(1118)] Allocate a new trap: 0xc000976120 39 D0318 16:20:34.048794 355572 usertrap_amd64.go:225] [ 4516(1118): 4516(1118)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.051679 355572 usertrap_amd64.go:212] [ 4518(1158): 4518(1158)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.051788 355572 usertrap_amd64.go:122] [ 4518(1158): 4518(1158)] Allocate a new trap: 0xc0005264e0 37 D0318 16:20:34.052872 355572 usertrap_amd64.go:225] [ 4518(1158): 4518(1158)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.053790 355572 usertrap_amd64.go:212] [ 4517( 699): 4517( 699)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:34.053946 355572 usertrap_amd64.go:122] [ 4517( 699): 4517( 699)] Allocate a new trap: 0xc000bce2d0 39 D0318 16:20:34.054112 355572 usertrap_amd64.go:225] [ 4517( 699): 4517( 699)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:34.057230 355572 usertrap_amd64.go:212] [ 4518(1158): 4518(1158)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.057345 355572 usertrap_amd64.go:122] [ 4518(1158): 4518(1158)] Allocate a new trap: 0xc0005264e0 38 D0318 16:20:34.057422 355572 usertrap_amd64.go:225] [ 4518(1158): 4518(1158)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.059239 355572 usertrap_amd64.go:212] [ 4516(1118): 4516(1118)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.059318 355572 usertrap_amd64.go:122] [ 4516(1118): 4516(1118)] Allocate a new trap: 0xc000976120 40 D0318 16:20:34.059383 355572 usertrap_amd64.go:225] [ 4516(1118): 4516(1118)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.060889 355572 usertrap_amd64.go:212] [ 4516(1118): 4516(1118)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.061004 355572 usertrap_amd64.go:122] [ 4516(1118): 4516(1118)] Allocate a new trap: 0xc000976120 41 D0318 16:20:34.061141 355572 usertrap_amd64.go:225] [ 4516(1118): 4516(1118)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.061446 355572 usertrap_amd64.go:212] [ 4516(1118): 4519(1119)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.061534 355572 usertrap_amd64.go:122] [ 4516(1118): 4519(1119)] Allocate a new trap: 0xc000976120 42 D0318 16:20:34.061614 355572 usertrap_amd64.go:225] [ 4516(1118): 4519(1119)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.062117 355572 usertrap_amd64.go:212] [ 4517( 699): 4517( 699)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:34.062258 355572 usertrap_amd64.go:122] [ 4517( 699): 4517( 699)] Allocate a new trap: 0xc000bce2d0 40 D0318 16:20:34.062441 355572 usertrap_amd64.go:225] [ 4517( 699): 4517( 699)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:34.063216 355572 usertrap_amd64.go:212] [ 4516(1118): 4516(1118)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.063311 355572 usertrap_amd64.go:122] [ 4516(1118): 4516(1118)] Allocate a new trap: 0xc000976120 43 D0318 16:20:34.063406 355572 usertrap_amd64.go:225] [ 4516(1118): 4516(1118)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.064064 355572 usertrap_amd64.go:212] [ 4517( 699): 4517( 699)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:34.064132 355572 usertrap_amd64.go:122] [ 4517( 699): 4517( 699)] Allocate a new trap: 0xc000bce2d0 41 D0318 16:20:34.064425 355572 usertrap_amd64.go:225] [ 4517( 699): 4517( 699)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:34.064719 355572 usertrap_amd64.go:212] [ 4517( 699): 4520( 700)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:34.064802 355572 usertrap_amd64.go:122] [ 4517( 699): 4520( 700)] Allocate a new trap: 0xc000bce2d0 42 D0318 16:20:34.064887 355572 usertrap_amd64.go:225] [ 4517( 699): 4520( 700)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:34.067194 355572 usertrap_amd64.go:212] [ 4517( 699): 4517( 699)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:34.067265 355572 usertrap_amd64.go:122] [ 4517( 699): 4517( 699)] Allocate a new trap: 0xc000bce2d0 43 D0318 16:20:34.067349 355572 usertrap_amd64.go:225] [ 4517( 699): 4517( 699)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:34.068075 355572 task_exit.go:204] [ 4516(1118): 4516(1118)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.068289 355572 task_signals.go:204] [ 4516(1118): 4519(1119)] Signal 9, PID: 4516, TID: 4519, fault addr: 0x0: terminating thread group D0318 16:20:34.068708 355572 task_exit.go:204] [ 4516(1118): 4516(1118)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.068867 355572 task_exit.go:204] [ 4516(1118): 4519(1119)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.070644 355572 task_exit.go:204] [ 4517( 699): 4517( 699)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.070968 355572 task_signals.go:204] [ 4517( 699): 4520( 700)] Signal 9, PID: 4517, TID: 4520, fault addr: 0x0: terminating thread group D0318 16:20:34.071439 355572 task_exit.go:204] [ 4517( 699): 4517( 699)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.071573 355572 task_exit.go:204] [ 4517( 699): 4520( 700)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.073654 355572 task_exit.go:204] [ 4516(1118): 4519(1119)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.073768 355572 task_exit.go:204] [ 4516(1118): 4519(1119)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.073906 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.074259 355572 task_exit.go:204] [ 4516(1118): 4516(1118)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 1: lchown(&(0x7f0000000d40)='./file0\x00', 0x0, 0x0) D0318 16:20:34.076174 355572 task_exit.go:204] [ 4517( 699): 4520( 700)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.076264 355572 task_exit.go:204] [ 4517( 699): 4520( 700)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.076360 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.076494 355572 task_exit.go:204] [ 4517( 699): 4517( 699)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.076939 355572 usertrap_amd64.go:212] [ 4518(1158): 4518(1158)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.077109 355572 usertrap_amd64.go:122] [ 4518(1158): 4518(1158)] Allocate a new trap: 0xc0005264e0 39 D0318 16:20:34.077335 355572 usertrap_amd64.go:225] [ 4518(1158): 4518(1158)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) 16:20:34 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x6}]}) D0318 16:20:34.084979 355572 usertrap_amd64.go:212] [ 4518(1158): 4518(1158)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.085064 355572 usertrap_amd64.go:122] [ 4518(1158): 4518(1158)] Allocate a new trap: 0xc0005264e0 40 D0318 16:20:34.085171 355572 usertrap_amd64.go:225] [ 4518(1158): 4518(1158)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.086567 355572 usertrap_amd64.go:212] [ 4518(1158): 4518(1158)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.086639 355572 usertrap_amd64.go:122] [ 4518(1158): 4518(1158)] Allocate a new trap: 0xc0005264e0 41 D0318 16:20:34.086720 355572 usertrap_amd64.go:225] [ 4518(1158): 4518(1158)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.086958 355572 usertrap_amd64.go:212] [ 4518(1158): 4521(1159)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.087022 355572 usertrap_amd64.go:122] [ 4518(1158): 4521(1159)] Allocate a new trap: 0xc0005264e0 42 D0318 16:20:34.087086 355572 usertrap_amd64.go:225] [ 4518(1158): 4521(1159)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.106620 355572 usertrap_amd64.go:212] [ 4523(1120): 4523(1120)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.106797 355572 usertrap_amd64.go:122] [ 4523(1120): 4523(1120)] Allocate a new trap: 0xc0009761b0 37 D0318 16:20:34.107419 355572 usertrap_amd64.go:225] [ 4523(1120): 4523(1120)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.108457 355572 usertrap_amd64.go:212] [ 4522( 701): 4522( 701)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:34.108579 355572 usertrap_amd64.go:122] [ 4522( 701): 4522( 701)] Allocate a new trap: 0xc000976180 37 D0318 16:20:34.109200 355572 usertrap_amd64.go:225] [ 4522( 701): 4522( 701)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:34.110936 355572 usertrap_amd64.go:212] [ 4523(1120): 4523(1120)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.111050 355572 usertrap_amd64.go:122] [ 4523(1120): 4523(1120)] Allocate a new trap: 0xc0009761b0 38 D0318 16:20:34.111143 355572 usertrap_amd64.go:225] [ 4523(1120): 4523(1120)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.112673 355572 usertrap_amd64.go:212] [ 4522( 701): 4522( 701)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:34.112758 355572 usertrap_amd64.go:122] [ 4522( 701): 4522( 701)] Allocate a new trap: 0xc000976180 38 D0318 16:20:34.112864 355572 usertrap_amd64.go:225] [ 4522( 701): 4522( 701)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:34.122967 355572 usertrap_amd64.go:212] [ 4523(1120): 4523(1120)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.123047 355572 usertrap_amd64.go:122] [ 4523(1120): 4523(1120)] Allocate a new trap: 0xc0009761b0 39 D0318 16:20:34.123111 355572 usertrap_amd64.go:225] [ 4523(1120): 4523(1120)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.126374 355572 usertrap_amd64.go:212] [ 4522( 701): 4522( 701)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:34.126545 355572 usertrap_amd64.go:122] [ 4522( 701): 4522( 701)] Allocate a new trap: 0xc000976180 39 D0318 16:20:34.126640 355572 usertrap_amd64.go:225] [ 4522( 701): 4522( 701)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:34.129639 355572 usertrap_amd64.go:212] [ 4523(1120): 4523(1120)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.129716 355572 usertrap_amd64.go:122] [ 4523(1120): 4523(1120)] Allocate a new trap: 0xc0009761b0 40 D0318 16:20:34.129793 355572 usertrap_amd64.go:225] [ 4523(1120): 4523(1120)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.131702 355572 usertrap_amd64.go:212] [ 4523(1120): 4523(1120)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.131823 355572 usertrap_amd64.go:122] [ 4523(1120): 4523(1120)] Allocate a new trap: 0xc0009761b0 41 D0318 16:20:34.131937 355572 usertrap_amd64.go:225] [ 4523(1120): 4523(1120)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.132189 355572 usertrap_amd64.go:212] [ 4523(1120): 4524(1121)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.132270 355572 usertrap_amd64.go:122] [ 4523(1120): 4524(1121)] Allocate a new trap: 0xc0009761b0 42 D0318 16:20:34.132403 355572 usertrap_amd64.go:225] [ 4523(1120): 4524(1121)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.133976 355572 usertrap_amd64.go:212] [ 4523(1120): 4523(1120)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.134089 355572 usertrap_amd64.go:122] [ 4523(1120): 4523(1120)] Allocate a new trap: 0xc0009761b0 43 D0318 16:20:34.134172 355572 usertrap_amd64.go:225] [ 4523(1120): 4523(1120)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.135862 355572 usertrap_amd64.go:212] [ 4522( 701): 4522( 701)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:34.135951 355572 usertrap_amd64.go:122] [ 4522( 701): 4522( 701)] Allocate a new trap: 0xc000976180 40 D0318 16:20:34.136025 355572 usertrap_amd64.go:225] [ 4522( 701): 4522( 701)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:34.137406 355572 usertrap_amd64.go:212] [ 4522( 701): 4522( 701)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:34.137466 355572 usertrap_amd64.go:122] [ 4522( 701): 4522( 701)] Allocate a new trap: 0xc000976180 41 D0318 16:20:34.137550 355572 usertrap_amd64.go:225] [ 4522( 701): 4522( 701)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:34.137888 355572 usertrap_amd64.go:212] [ 4522( 701): 4525( 702)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:34.137969 355572 usertrap_amd64.go:122] [ 4522( 701): 4525( 702)] Allocate a new trap: 0xc000976180 42 D0318 16:20:34.138059 355572 usertrap_amd64.go:225] [ 4522( 701): 4525( 702)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:34.138419 355572 task_exit.go:204] [ 4523(1120): 4523(1120)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.138994 355572 task_signals.go:204] [ 4523(1120): 4524(1121)] Signal 9, PID: 4523, TID: 4524, fault addr: 0x0: terminating thread group D0318 16:20:34.139040 355572 task_exit.go:204] [ 4523(1120): 4523(1120)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.139204 355572 task_exit.go:204] [ 4523(1120): 4524(1121)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.141898 355572 task_signals.go:309] [ 4518(1158): 4526(1160)] failed to restore from a signal frame: bad address D0318 16:20:34.142039 355572 task_signals.go:470] [ 4518(1158): 4526(1160)] Notified of signal 11 D0318 16:20:34.142156 355572 task_signals.go:220] [ 4518(1158): 4526(1160)] Signal 11: delivering to handler D0318 16:20:34.145529 355572 task_exit.go:204] [ 4523(1120): 4524(1121)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.145623 355572 task_exit.go:204] [ 4523(1120): 4524(1121)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.145731 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.145951 355572 task_exit.go:204] [ 4523(1120): 4523(1120)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.146552 355572 task_syscall.go:246] [ 4522( 701): 4525( 702)] Syscall 202: killed by seccomp D0318 16:20:34.146737 355572 task_exit.go:204] [ 4522( 701): 4525( 702)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.146960 355572 usertrap_amd64.go:212] [ 4518(1158): 4518(1158)] Found the pattern at ip 55ec958df1ae:sysno 230 D0318 16:20:34.147059 355572 usertrap_amd64.go:122] [ 4518(1158): 4518(1158)] Allocate a new trap: 0xc0005264e0 43 D0318 16:20:34.147135 355572 usertrap_amd64.go:225] [ 4518(1158): 4518(1158)] Apply the binary patch addr 55ec958df1ae trap addr 66d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 109 6 0]) 16:20:34 executing program 1: syz_clone3(&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x1}, 0x87) D0318 16:20:34.147575 355572 task_exit.go:204] [ 4522( 701): 4525( 702)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.147664 355572 task_exit.go:204] [ 4522( 701): 4525( 702)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.151762 355572 usertrap_amd64.go:212] [ 4518(1158): 4521(1159)] Found the pattern at ip 55ec958b2ae8:sysno 1 D0318 16:20:34.151825 355572 usertrap_amd64.go:122] [ 4518(1158): 4521(1159)] Allocate a new trap: 0xc0005264e0 44 D0318 16:20:34.151909 355572 usertrap_amd64.go:225] [ 4518(1158): 4521(1159)] Apply the binary patch addr 55ec958b2ae8 trap addr 66dc0 ([184 1 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:34.156759 355572 task_exit.go:204] [ 4518(1158): 4521(1159)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.156934 355572 task_signals.go:204] [ 4518(1158): 4518(1158)] Signal 9, PID: 4518, TID: 4518, fault addr: 0x0: terminating thread group D0318 16:20:34.157071 355572 task_signals.go:204] [ 4518(1158): 4526(1160)] Signal 9, PID: 4518, TID: 4526, fault addr: 0x0: terminating thread group D0318 16:20:34.156915 355572 task_signals.go:204] [ 4518(1158): 4527(1161)] Signal 9, PID: 4518, TID: 4527, fault addr: 0x0: terminating thread group D0318 16:20:34.157187 355572 task_exit.go:204] [ 4518(1158): 4518(1158)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.157381 355572 task_exit.go:204] [ 4518(1158): 4526(1160)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.158183 355572 task_exit.go:204] [ 4518(1158): 4518(1158)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.158445 355572 task_exit.go:204] [ 4518(1158): 4527(1161)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.159307 355572 task_exit.go:204] [ 4518(1158): 4526(1160)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.159440 355572 task_exit.go:204] [ 4518(1158): 4526(1160)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.160205 355572 task_exit.go:204] [ 4518(1158): 4521(1159)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.160360 355572 task_exit.go:204] [ 4518(1158): 4521(1159)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.164705 355572 task_exit.go:204] [ 4518(1158): 4527(1161)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.164773 355572 task_exit.go:204] [ 4518(1158): 4527(1161)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.164873 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.166294 355572 task_exit.go:204] [ 4518(1158): 4518(1158)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 3: prctl$PR_GET_TID_ADDRESS(0x59616d61, &(0x7f0000008640)) D0318 16:20:34.172804 355572 usertrap_amd64.go:212] [ 4528(1122): 4528(1122)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.172944 355572 usertrap_amd64.go:122] [ 4528(1122): 4528(1122)] Allocate a new trap: 0xc000976210 37 D0318 16:20:34.173593 355572 usertrap_amd64.go:225] [ 4528(1122): 4528(1122)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.177094 355572 usertrap_amd64.go:212] [ 4528(1122): 4528(1122)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.177168 355572 usertrap_amd64.go:122] [ 4528(1122): 4528(1122)] Allocate a new trap: 0xc000976210 38 D0318 16:20:34.177287 355572 usertrap_amd64.go:225] [ 4528(1122): 4528(1122)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.193821 355572 usertrap_amd64.go:212] [ 4529(1162): 4529(1162)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.193962 355572 usertrap_amd64.go:122] [ 4529(1162): 4529(1162)] Allocate a new trap: 0xc0002d27e0 37 D0318 16:20:34.194650 355572 usertrap_amd64.go:225] [ 4529(1162): 4529(1162)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.197581 355572 usertrap_amd64.go:212] [ 4529(1162): 4529(1162)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.197662 355572 usertrap_amd64.go:122] [ 4529(1162): 4529(1162)] Allocate a new trap: 0xc0002d27e0 38 D0318 16:20:34.197759 355572 usertrap_amd64.go:225] [ 4529(1162): 4529(1162)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.201899 355572 usertrap_amd64.go:212] [ 4522( 701): 4522( 701)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:34.202026 355572 usertrap_amd64.go:122] [ 4522( 701): 4522( 701)] Allocate a new trap: 0xc000976180 43 D0318 16:20:34.202122 355572 usertrap_amd64.go:225] [ 4522( 701): 4522( 701)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:34.206648 355572 usertrap_amd64.go:212] [ 4528(1122): 4528(1122)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.206812 355572 usertrap_amd64.go:122] [ 4528(1122): 4528(1122)] Allocate a new trap: 0xc000976210 39 D0318 16:20:34.206963 355572 usertrap_amd64.go:225] [ 4528(1122): 4528(1122)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.207022 355572 task_exit.go:204] [ 4522( 701): 4522( 701)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.208678 355572 usertrap_amd64.go:212] [ 4529(1162): 4529(1162)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.208742 355572 usertrap_amd64.go:122] [ 4529(1162): 4529(1162)] Allocate a new trap: 0xc0002d27e0 39 D0318 16:20:34.208838 355572 usertrap_amd64.go:225] [ 4529(1162): 4529(1162)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.213318 355572 task_exit.go:204] [ 4522( 701): 4522( 701)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.213500 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.215101 355572 task_exit.go:204] [ 4522( 701): 4522( 701)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:34.217055 355572 usertrap_amd64.go:212] [ 4528(1122): 4528(1122)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.217193 355572 usertrap_amd64.go:122] [ 4528(1122): 4528(1122)] Allocate a new trap: 0xc000976210 40 D0318 16:20:34.217342 355572 usertrap_amd64.go:225] [ 4528(1122): 4528(1122)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.219112 355572 usertrap_amd64.go:212] [ 4529(1162): 4529(1162)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.219188 355572 usertrap_amd64.go:122] [ 4529(1162): 4529(1162)] Allocate a new trap: 0xc0002d27e0 40 D0318 16:20:34.219266 355572 usertrap_amd64.go:225] [ 4529(1162): 4529(1162)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.219353 355572 usertrap_amd64.go:212] [ 4528(1122): 4528(1122)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.219438 355572 usertrap_amd64.go:122] [ 4528(1122): 4528(1122)] Allocate a new trap: 0xc000976210 41 D0318 16:20:34.219673 355572 usertrap_amd64.go:225] [ 4528(1122): 4528(1122)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.219865 355572 usertrap_amd64.go:212] [ 4528(1122): 4530(1123)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.219955 355572 usertrap_amd64.go:122] [ 4528(1122): 4530(1123)] Allocate a new trap: 0xc000976210 42 D0318 16:20:34.220072 355572 usertrap_amd64.go:225] [ 4528(1122): 4530(1123)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.222264 355572 usertrap_amd64.go:212] [ 4528(1122): 4528(1122)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.222354 355572 usertrap_amd64.go:122] [ 4528(1122): 4528(1122)] Allocate a new trap: 0xc000976210 43 D0318 16:20:34.222456 355572 usertrap_amd64.go:225] [ 4528(1122): 4528(1122)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.222534 355572 usertrap_amd64.go:212] [ 4529(1162): 4529(1162)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.222629 355572 usertrap_amd64.go:122] [ 4529(1162): 4529(1162)] Allocate a new trap: 0xc0002d27e0 41 D0318 16:20:34.222751 355572 usertrap_amd64.go:225] [ 4529(1162): 4529(1162)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.223183 355572 usertrap_amd64.go:212] [ 4529(1162): 4531(1163)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.223278 355572 usertrap_amd64.go:122] [ 4529(1162): 4531(1163)] Allocate a new trap: 0xc0002d27e0 42 D0318 16:20:34.223369 355572 usertrap_amd64.go:225] [ 4529(1162): 4531(1163)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.225184 355572 usertrap_amd64.go:212] [ 4529(1162): 4529(1162)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.225247 355572 usertrap_amd64.go:122] [ 4529(1162): 4529(1162)] Allocate a new trap: 0xc0002d27e0 43 D0318 16:20:34.225351 355572 usertrap_amd64.go:225] [ 4529(1162): 4529(1162)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.229554 355572 task_exit.go:204] [ 4528(1122): 4528(1122)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.229734 355572 task_signals.go:204] [ 4528(1122): 4530(1123)] Signal 9, PID: 4528, TID: 4530, fault addr: 0x0: terminating thread group D0318 16:20:34.230276 355572 task_exit.go:204] [ 4528(1122): 4530(1123)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.230817 355572 task_exit.go:204] [ 4528(1122): 4528(1122)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.233966 355572 task_exit.go:204] [ 4529(1162): 4529(1162)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.234657 355572 task_signals.go:204] [ 4529(1162): 4531(1163)] Signal 9, PID: 4529, TID: 4531, fault addr: 0x0: terminating thread group D0318 16:20:34.234771 355572 task_exit.go:204] [ 4529(1162): 4529(1162)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.236151 355572 task_exit.go:204] [ 4529(1162): 4531(1163)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.237161 355572 task_exit.go:204] [ 4528(1122): 4530(1123)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.237229 355572 task_exit.go:204] [ 4528(1122): 4530(1123)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.237371 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.238347 355572 task_exit.go:204] [ 4528(1122): 4528(1122)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 1: lsetxattr$security_evm(0x0, 0x0, &(0x7f0000000080)=@ng, 0x2, 0x0) pipe2$9p(&(0x7f0000000a40), 0x0) D0318 16:20:34.241091 355572 task_exit.go:204] [ 4529(1162): 4531(1163)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.241199 355572 task_exit.go:204] [ 4529(1162): 4531(1163)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.241375 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.243236 355572 task_exit.go:204] [ 4529(1162): 4529(1162)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000002280), &(0x7f00000022c0)='./file0\x00', 0x0, &(0x7f0000004340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x7000}}, 0x0, 0x0, 0x0) D0318 16:20:34.246932 355572 usertrap_amd64.go:212] [ 4532( 703): 4532( 703)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:34.247038 355572 usertrap_amd64.go:122] [ 4532( 703): 4532( 703)] Allocate a new trap: 0xc000526570 37 D0318 16:20:34.247675 355572 usertrap_amd64.go:225] [ 4532( 703): 4532( 703)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:34.250190 355572 usertrap_amd64.go:212] [ 4532( 703): 4532( 703)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:34.250250 355572 usertrap_amd64.go:122] [ 4532( 703): 4532( 703)] Allocate a new trap: 0xc000526570 38 D0318 16:20:34.250344 355572 usertrap_amd64.go:225] [ 4532( 703): 4532( 703)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:34.263638 355572 usertrap_amd64.go:212] [ 4532( 703): 4532( 703)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:34.263724 355572 usertrap_amd64.go:122] [ 4532( 703): 4532( 703)] Allocate a new trap: 0xc000526570 39 D0318 16:20:34.263797 355572 usertrap_amd64.go:225] [ 4532( 703): 4532( 703)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:34.268885 355572 usertrap_amd64.go:212] [ 4533(1124): 4533(1124)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.268992 355572 usertrap_amd64.go:122] [ 4533(1124): 4533(1124)] Allocate a new trap: 0xc000e1c480 37 D0318 16:20:34.269667 355572 usertrap_amd64.go:225] [ 4533(1124): 4533(1124)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.271378 355572 usertrap_amd64.go:212] [ 4532( 703): 4532( 703)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:34.271584 355572 usertrap_amd64.go:122] [ 4532( 703): 4532( 703)] Allocate a new trap: 0xc000526570 40 D0318 16:20:34.271880 355572 usertrap_amd64.go:225] [ 4532( 703): 4532( 703)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:34.272615 355572 usertrap_amd64.go:212] [ 4534(1164): 4534(1164)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.272709 355572 usertrap_amd64.go:122] [ 4534(1164): 4534(1164)] Allocate a new trap: 0xc00637c1b0 37 D0318 16:20:34.273418 355572 usertrap_amd64.go:225] [ 4534(1164): 4534(1164)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.273552 355572 usertrap_amd64.go:212] [ 4532( 703): 4532( 703)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:34.273676 355572 usertrap_amd64.go:122] [ 4532( 703): 4532( 703)] Allocate a new trap: 0xc000526570 41 D0318 16:20:34.273903 355572 usertrap_amd64.go:225] [ 4532( 703): 4532( 703)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:34.274358 355572 usertrap_amd64.go:212] [ 4532( 703): 4535( 704)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:34.274428 355572 usertrap_amd64.go:122] [ 4532( 703): 4535( 704)] Allocate a new trap: 0xc000526570 42 D0318 16:20:34.274532 355572 usertrap_amd64.go:225] [ 4532( 703): 4535( 704)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:34.275034 355572 usertrap_amd64.go:212] [ 4533(1124): 4533(1124)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.275152 355572 usertrap_amd64.go:122] [ 4533(1124): 4533(1124)] Allocate a new trap: 0xc000e1c480 38 D0318 16:20:34.275242 355572 usertrap_amd64.go:225] [ 4533(1124): 4533(1124)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.277598 355572 usertrap_amd64.go:212] [ 4534(1164): 4534(1164)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.277655 355572 usertrap_amd64.go:122] [ 4534(1164): 4534(1164)] Allocate a new trap: 0xc00637c1b0 38 D0318 16:20:34.277730 355572 usertrap_amd64.go:225] [ 4534(1164): 4534(1164)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.289281 355572 usertrap_amd64.go:212] [ 4533(1124): 4533(1124)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.289375 355572 usertrap_amd64.go:122] [ 4533(1124): 4533(1124)] Allocate a new trap: 0xc000e1c480 39 D0318 16:20:34.289483 355572 usertrap_amd64.go:225] [ 4533(1124): 4533(1124)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.291956 355572 usertrap_amd64.go:212] [ 4534(1164): 4534(1164)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.292018 355572 usertrap_amd64.go:122] [ 4534(1164): 4534(1164)] Allocate a new trap: 0xc00637c1b0 39 D0318 16:20:34.292105 355572 usertrap_amd64.go:225] [ 4534(1164): 4534(1164)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.297671 355572 usertrap_amd64.go:212] [ 4533(1124): 4533(1124)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.297841 355572 usertrap_amd64.go:122] [ 4533(1124): 4533(1124)] Allocate a new trap: 0xc000e1c480 40 D0318 16:20:34.297988 355572 usertrap_amd64.go:225] [ 4533(1124): 4533(1124)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.299588 355572 usertrap_amd64.go:212] [ 4533(1124): 4533(1124)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.299774 355572 usertrap_amd64.go:122] [ 4533(1124): 4533(1124)] Allocate a new trap: 0xc000e1c480 41 D0318 16:20:34.299871 355572 usertrap_amd64.go:225] [ 4533(1124): 4533(1124)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.300136 355572 usertrap_amd64.go:212] [ 4533(1124): 4536(1125)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.300228 355572 usertrap_amd64.go:122] [ 4533(1124): 4536(1125)] Allocate a new trap: 0xc000e1c480 42 D0318 16:20:34.300308 355572 usertrap_amd64.go:225] [ 4533(1124): 4536(1125)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.302063 355572 usertrap_amd64.go:212] [ 4534(1164): 4534(1164)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.302131 355572 usertrap_amd64.go:212] [ 4533(1124): 4533(1124)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.302155 355572 usertrap_amd64.go:122] [ 4534(1164): 4534(1164)] Allocate a new trap: 0xc00637c1b0 40 D0318 16:20:34.302204 355572 usertrap_amd64.go:122] [ 4533(1124): 4533(1124)] Allocate a new trap: 0xc000e1c480 43 D0318 16:20:34.302264 355572 usertrap_amd64.go:225] [ 4534(1164): 4534(1164)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.302297 355572 usertrap_amd64.go:225] [ 4533(1124): 4533(1124)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.303681 355572 usertrap_amd64.go:212] [ 4534(1164): 4534(1164)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.303761 355572 usertrap_amd64.go:122] [ 4534(1164): 4534(1164)] Allocate a new trap: 0xc00637c1b0 41 D0318 16:20:34.303922 355572 usertrap_amd64.go:225] [ 4534(1164): 4534(1164)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.304157 355572 usertrap_amd64.go:212] [ 4534(1164): 4537(1165)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.304251 355572 usertrap_amd64.go:122] [ 4534(1164): 4537(1165)] Allocate a new trap: 0xc00637c1b0 42 D0318 16:20:34.304330 355572 usertrap_amd64.go:225] [ 4534(1164): 4537(1165)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.306415 355572 task_exit.go:204] [ 4533(1124): 4533(1124)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.307387 355572 task_signals.go:204] [ 4533(1124): 4536(1125)] Signal 9, PID: 4533, TID: 4536, fault addr: 0x0: terminating thread group D0318 16:20:34.307525 355572 task_exit.go:204] [ 4533(1124): 4536(1125)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.307784 355572 usertrap_amd64.go:212] [ 4534(1164): 4534(1164)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.307863 355572 usertrap_amd64.go:122] [ 4534(1164): 4534(1164)] Allocate a new trap: 0xc00637c1b0 43 D0318 16:20:34.307883 355572 task_exit.go:204] [ 4533(1124): 4533(1124)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.307957 355572 usertrap_amd64.go:225] [ 4534(1164): 4534(1164)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.313399 355572 task_exit.go:204] [ 4533(1124): 4536(1125)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.313503 355572 task_exit.go:204] [ 4533(1124): 4536(1125)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.313596 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.314034 355572 task_exit.go:204] [ 4534(1164): 4534(1164)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.314225 355572 task_signals.go:204] [ 4534(1164): 4537(1165)] Signal 9, PID: 4534, TID: 4537, fault addr: 0x0: terminating thread group D0318 16:20:34.314679 355572 task_exit.go:204] [ 4533(1124): 4533(1124)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.315004 355572 task_exit.go:204] [ 4534(1164): 4537(1165)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.315204 355572 task_exit.go:204] [ 4534(1164): 4534(1164)] Transitioning from exit state TaskExitInitiated to TaskExitZombie 16:20:34 executing program 1: modify_ldt$write(0x1, &(0x7f0000000000), 0x10) modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) D0318 16:20:34.319597 355572 task_exit.go:204] [ 4534(1164): 4537(1165)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.319709 355572 task_exit.go:204] [ 4534(1164): 4537(1165)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.319785 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.320229 355572 task_exit.go:204] [ 4534(1164): 4534(1164)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 3: mknodat$loop(0xffffffffffffffff, 0x0, 0x79b2487051cdaa24, 0x0) D0318 16:20:34.330150 355572 task_signals.go:309] [ 4532( 703): 4538( 705)] failed to restore from a signal frame: bad address D0318 16:20:34.330292 355572 task_signals.go:470] [ 4532( 703): 4538( 705)] Notified of signal 11 D0318 16:20:34.330397 355572 task_signals.go:220] [ 4532( 703): 4538( 705)] Signal 11: delivering to handler D0318 16:20:34.335574 355572 usertrap_amd64.go:212] [ 4532( 703): 4532( 703)] Found the pattern at ip 55ca2d9111ae:sysno 230 D0318 16:20:34.335719 355572 usertrap_amd64.go:122] [ 4532( 703): 4532( 703)] Allocate a new trap: 0xc000526570 43 D0318 16:20:34.335821 355572 usertrap_amd64.go:225] [ 4532( 703): 4532( 703)] Apply the binary patch addr 55ca2d9111ae trap addr 6ad70 ([184 230 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:34.339840 355572 usertrap_amd64.go:212] [ 4532( 703): 4535( 704)] Found the pattern at ip 55ca2d8e4ae8:sysno 1 D0318 16:20:34.339943 355572 usertrap_amd64.go:122] [ 4532( 703): 4535( 704)] Allocate a new trap: 0xc000526570 44 D0318 16:20:34.340041 355572 usertrap_amd64.go:225] [ 4532( 703): 4535( 704)] Apply the binary patch addr 55ca2d8e4ae8 trap addr 6adc0 ([184 1 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0318 16:20:34.346221 355572 task_exit.go:204] [ 4532( 703): 4535( 704)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.346451 355572 usertrap_amd64.go:212] [ 4539(1126): 4539(1126)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.346637 355572 usertrap_amd64.go:122] [ 4539(1126): 4539(1126)] Allocate a new trap: 0xc000bce480 37 D0318 16:20:34.346996 355572 task_signals.go:204] [ 4532( 703): 4538( 705)] Signal 9, PID: 4532, TID: 4538, fault addr: 0x0: terminating thread group D0318 16:20:34.346999 355572 task_signals.go:204] [ 4532( 703): 4532( 703)] Signal 9, PID: 4532, TID: 4532, fault addr: 0x0: terminating thread group D0318 16:20:34.347062 355572 task_signals.go:204] [ 4532( 703): 4540( 706)] Signal 9, PID: 4532, TID: 4540, fault addr: 0x0: terminating thread group D0318 16:20:34.347178 355572 task_exit.go:204] [ 4532( 703): 4540( 706)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.347457 355572 usertrap_amd64.go:225] [ 4539(1126): 4539(1126)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.347762 355572 task_exit.go:204] [ 4532( 703): 4540( 706)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.347837 355572 task_exit.go:204] [ 4532( 703): 4540( 706)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.347949 355572 task_exit.go:204] [ 4532( 703): 4535( 704)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.348015 355572 task_exit.go:204] [ 4532( 703): 4535( 704)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.348157 355572 task_exit.go:204] [ 4532( 703): 4538( 705)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.348381 355572 task_exit.go:204] [ 4532( 703): 4532( 703)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.349249 355572 task_exit.go:204] [ 4532( 703): 4538( 705)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.349356 355572 task_exit.go:204] [ 4532( 703): 4538( 705)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.352272 355572 usertrap_amd64.go:212] [ 4539(1126): 4539(1126)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.352360 355572 usertrap_amd64.go:122] [ 4539(1126): 4539(1126)] Allocate a new trap: 0xc000bce480 38 D0318 16:20:34.352447 355572 usertrap_amd64.go:225] [ 4539(1126): 4539(1126)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.352890 355572 usertrap_amd64.go:212] [ 4541(1166): 4541(1166)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.353002 355572 usertrap_amd64.go:122] [ 4541(1166): 4541(1166)] Allocate a new trap: 0xc000526660 37 D0318 16:20:34.353986 355572 task_exit.go:204] [ 4532( 703): 4532( 703)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.354104 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.354262 355572 usertrap_amd64.go:225] [ 4541(1166): 4541(1166)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.354859 355572 task_exit.go:204] [ 4532( 703): 4532( 703)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='user.incfs.metadata\x00', &(0x7f00000003c0)='\x00\x00o;\xc8\xdd1\xa4lB&\xa9\xb6\x06\x06\x99\t\xf5\x10\x17\'\xcaV\xab\\rw9+\xba\tl|\xde\x93\xea\x95A}\x89\x82\x8c\nN\x97\xbf\xab\xa4_\xc2\x17\xe7+\xc5\xfe\x16-\xdd\xa7\x00\xfe\xa0\xa2\xbdUw\x01\x80\x92\xea\x15\xc2opg\xee\xbd\t\xba\x9d\x98\x983\xfd\v\xc1\xbd\x1e\xd5r\xb17\x83\xaf\xfa\x90\x8bh\xc3@\xda\xee\x97\xd5~\xee\xd6$\xc6\x8c\x01l\x1e\xd3\x1f\xe4<\xee\b\xe4\x16\xc3Ku\x84\xa3\xfa\xe9\t\x87\x01>\xcc\xcb~X\x16d\xf65\x15\xcd\x89\xb8\x1bF\xcd\r\xbc\xc0\xbb\xf5Q\x06\xb71>\xcd\xdb\x0f\x8c\x14\xc5\t\x92m/u,^\xe6\xc7V\xca|;j\xc1\xf4$\xe1A\x17\xeb\xf1M\x8c\x82\\\x89\x89\x00\x98\xadr\xd4\x86;\xed+\x899\x8a\xe9\x18\xb4]a\xd2\x15\x93\x84\x8b\x85\xae\'\xf4\xc9\xcb\x8c\'\x88\xff\x02\b\xaf\xe9vc\x9au\xba\xce]\x85\x98>\xa6\xe1\xc0)\xff`}\xbd;\xbc5\xda^\xfb\x91\xe6\xc6\n4!\xfa\x87*c\x8e\x9b\x95\x89D\xc0/\x17U\xd6\xc8\x8f\"<\x95O\xaf\xf0y\x11\xceL\x1bE\x9d\x03\xaf\x0f,\xd9O\x9aa\x94\xe4\x11l\x17\x8c\x7f[\xcb%Wg\xf1\t\x820\x11\xae+\x8e\xd0%|\xb7\xd9\xc0\x9e\xc1\xd1\xdc\xb7O\xd3\xce\xeb2\x18\x96\x03\xfc\n\xe4\x15d\a\xe7\x7f\x8b\x05\x880\xaa\x11\xcf\x85\xe3c\x88{\xb1E\xae\xfa\xbf\aj\x05P\x96fj5]\x16\r,\x15\xdd\f\x942\x05\xb10I\xe7\xfe\xdb\xaasT\x90\xf7O\xb4\xb1\xc1\x1de|\xf11\xd1\xc1x\xce\x11u\x16~6\xa3\xf7', 0x1a0, 0x0) write$9p(r0, &(0x7f0000000000)='9', 0x1) D0318 16:20:34.359771 355572 usertrap_amd64.go:212] [ 4541(1166): 4541(1166)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.359837 355572 usertrap_amd64.go:122] [ 4541(1166): 4541(1166)] Allocate a new trap: 0xc000526660 38 D0318 16:20:34.359904 355572 usertrap_amd64.go:225] [ 4541(1166): 4541(1166)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.363183 355572 usertrap_amd64.go:212] [ 4539(1126): 4539(1126)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.363345 355572 usertrap_amd64.go:122] [ 4539(1126): 4539(1126)] Allocate a new trap: 0xc000bce480 39 D0318 16:20:34.363451 355572 usertrap_amd64.go:225] [ 4539(1126): 4539(1126)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.370168 355572 usertrap_amd64.go:212] [ 4539(1126): 4539(1126)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.370224 355572 usertrap_amd64.go:122] [ 4539(1126): 4539(1126)] Allocate a new trap: 0xc000bce480 40 D0318 16:20:34.370275 355572 usertrap_amd64.go:225] [ 4539(1126): 4539(1126)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.372022 355572 usertrap_amd64.go:212] [ 4539(1126): 4539(1126)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.372105 355572 usertrap_amd64.go:122] [ 4539(1126): 4539(1126)] Allocate a new trap: 0xc000bce480 41 D0318 16:20:34.372173 355572 usertrap_amd64.go:212] [ 4541(1166): 4541(1166)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.372253 355572 usertrap_amd64.go:122] [ 4541(1166): 4541(1166)] Allocate a new trap: 0xc000526660 39 D0318 16:20:34.372278 355572 usertrap_amd64.go:225] [ 4539(1126): 4539(1126)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.372329 355572 usertrap_amd64.go:225] [ 4541(1166): 4541(1166)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.372423 355572 usertrap_amd64.go:212] [ 4539(1126): 4542(1127)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.372512 355572 usertrap_amd64.go:122] [ 4539(1126): 4542(1127)] Allocate a new trap: 0xc000bce480 42 D0318 16:20:34.372594 355572 usertrap_amd64.go:225] [ 4539(1126): 4542(1127)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.374221 355572 usertrap_amd64.go:212] [ 4539(1126): 4539(1126)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.374313 355572 usertrap_amd64.go:122] [ 4539(1126): 4539(1126)] Allocate a new trap: 0xc000bce480 43 D0318 16:20:34.374372 355572 usertrap_amd64.go:225] [ 4539(1126): 4539(1126)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.379661 355572 usertrap_amd64.go:212] [ 4541(1166): 4541(1166)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.379733 355572 usertrap_amd64.go:122] [ 4541(1166): 4541(1166)] Allocate a new trap: 0xc000526660 40 D0318 16:20:34.379846 355572 usertrap_amd64.go:225] [ 4541(1166): 4541(1166)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.381016 355572 task_signals.go:204] [ 4539(1126): 4542(1127)] Signal 9, PID: 4539, TID: 4542, fault addr: 0x0: terminating thread group D0318 16:20:34.381065 355572 task_exit.go:204] [ 4539(1126): 4539(1126)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.381182 355572 usertrap_amd64.go:212] [ 4541(1166): 4541(1166)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.381256 355572 usertrap_amd64.go:122] [ 4541(1166): 4541(1166)] Allocate a new trap: 0xc000526660 41 D0318 16:20:34.381331 355572 usertrap_amd64.go:225] [ 4541(1166): 4541(1166)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.381630 355572 usertrap_amd64.go:212] [ 4541(1166): 4544(1167)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.381726 355572 usertrap_amd64.go:122] [ 4541(1166): 4544(1167)] Allocate a new trap: 0xc000526660 42 D0318 16:20:34.381832 355572 task_exit.go:204] [ 4539(1126): 4539(1126)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.381983 355572 task_exit.go:204] [ 4539(1126): 4542(1127)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.381901 355572 usertrap_amd64.go:225] [ 4541(1166): 4544(1167)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.382985 355572 usertrap_amd64.go:212] [ 4543( 707): 4543( 707)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:34.383080 355572 usertrap_amd64.go:122] [ 4543( 707): 4543( 707)] Allocate a new trap: 0xc00637c330 37 D0318 16:20:34.383881 355572 usertrap_amd64.go:212] [ 4541(1166): 4541(1166)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.383975 355572 usertrap_amd64.go:122] [ 4541(1166): 4541(1166)] Allocate a new trap: 0xc000526660 43 D0318 16:20:34.383879 355572 usertrap_amd64.go:225] [ 4543( 707): 4543( 707)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:34.384087 355572 usertrap_amd64.go:225] [ 4541(1166): 4541(1166)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.387294 355572 task_exit.go:204] [ 4539(1126): 4542(1127)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.387365 355572 task_exit.go:204] [ 4539(1126): 4542(1127)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.387479 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.387816 355572 task_exit.go:204] [ 4539(1126): 4539(1126)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.388901 355572 usertrap_amd64.go:212] [ 4543( 707): 4543( 707)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:34.388994 355572 usertrap_amd64.go:122] [ 4543( 707): 4543( 707)] Allocate a new trap: 0xc00637c330 38 D0318 16:20:34.389076 355572 usertrap_amd64.go:225] [ 4543( 707): 4543( 707)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) 16:20:34 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:34.392780 355572 task_exit.go:204] [ 4541(1166): 4541(1166)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.393450 355572 task_exit.go:204] [ 4541(1166): 4541(1166)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.393402 355572 task_signals.go:204] [ 4541(1166): 4544(1167)] Signal 9, PID: 4541, TID: 4544, fault addr: 0x0: terminating thread group D0318 16:20:34.393816 355572 task_exit.go:204] [ 4541(1166): 4544(1167)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.398968 355572 task_exit.go:204] [ 4541(1166): 4544(1167)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.399073 355572 task_exit.go:204] [ 4541(1166): 4544(1167)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.399184 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.399337 355572 task_exit.go:204] [ 4541(1166): 4541(1166)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched_retired(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) D0318 16:20:34.407130 355572 usertrap_amd64.go:212] [ 4543( 707): 4543( 707)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:34.407225 355572 usertrap_amd64.go:122] [ 4543( 707): 4543( 707)] Allocate a new trap: 0xc00637c330 39 D0318 16:20:34.407330 355572 usertrap_amd64.go:225] [ 4543( 707): 4543( 707)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:34.416844 355572 usertrap_amd64.go:212] [ 4543( 707): 4543( 707)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:34.416948 355572 usertrap_amd64.go:122] [ 4543( 707): 4543( 707)] Allocate a new trap: 0xc00637c330 40 D0318 16:20:34.417027 355572 usertrap_amd64.go:225] [ 4543( 707): 4543( 707)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:34.417201 355572 usertrap_amd64.go:212] [ 4545(1128): 4545(1128)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.417323 355572 usertrap_amd64.go:122] [ 4545(1128): 4545(1128)] Allocate a new trap: 0xc000dc6a80 37 D0318 16:20:34.418074 355572 usertrap_amd64.go:225] [ 4545(1128): 4545(1128)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.419342 355572 usertrap_amd64.go:212] [ 4543( 707): 4543( 707)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:34.419399 355572 usertrap_amd64.go:122] [ 4543( 707): 4543( 707)] Allocate a new trap: 0xc00637c330 41 D0318 16:20:34.419477 355572 usertrap_amd64.go:225] [ 4543( 707): 4543( 707)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:34.420254 355572 usertrap_amd64.go:212] [ 4543( 707): 4547( 708)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:34.420412 355572 usertrap_amd64.go:122] [ 4543( 707): 4547( 708)] Allocate a new trap: 0xc00637c330 42 D0318 16:20:34.420588 355572 usertrap_amd64.go:225] [ 4543( 707): 4547( 708)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:34.422350 355572 usertrap_amd64.go:212] [ 4545(1128): 4545(1128)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.422414 355572 usertrap_amd64.go:122] [ 4545(1128): 4545(1128)] Allocate a new trap: 0xc000dc6a80 38 D0318 16:20:34.422495 355572 usertrap_amd64.go:225] [ 4545(1128): 4545(1128)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.424820 355572 usertrap_amd64.go:212] [ 4543( 707): 4543( 707)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:34.424882 355572 usertrap_amd64.go:122] [ 4543( 707): 4543( 707)] Allocate a new trap: 0xc00637c330 43 D0318 16:20:34.424979 355572 usertrap_amd64.go:225] [ 4543( 707): 4543( 707)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:34.427363 355572 usertrap_amd64.go:212] [ 4546(1168): 4546(1168)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.427470 355572 usertrap_amd64.go:122] [ 4546(1168): 4546(1168)] Allocate a new trap: 0xc000e1c510 37 D0318 16:20:34.428217 355572 usertrap_amd64.go:225] [ 4546(1168): 4546(1168)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.431209 355572 usertrap_amd64.go:212] [ 4546(1168): 4546(1168)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.431279 355572 usertrap_amd64.go:122] [ 4546(1168): 4546(1168)] Allocate a new trap: 0xc000e1c510 38 D0318 16:20:34.431335 355572 usertrap_amd64.go:225] [ 4546(1168): 4546(1168)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.434386 355572 task_exit.go:204] [ 4543( 707): 4543( 707)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.434535 355572 task_signals.go:204] [ 4543( 707): 4547( 708)] Signal 9, PID: 4543, TID: 4547, fault addr: 0x0: terminating thread group D0318 16:20:34.434659 355572 task_exit.go:204] [ 4543( 707): 4547( 708)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.435221 355572 task_exit.go:204] [ 4543( 707): 4547( 708)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.435290 355572 task_exit.go:204] [ 4543( 707): 4547( 708)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.435512 355572 usertrap_amd64.go:212] [ 4545(1128): 4545(1128)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.435634 355572 usertrap_amd64.go:122] [ 4545(1128): 4545(1128)] Allocate a new trap: 0xc000dc6a80 39 D0318 16:20:34.435731 355572 usertrap_amd64.go:225] [ 4545(1128): 4545(1128)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.440406 355572 task_exit.go:204] [ 4543( 707): 4543( 707)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.440487 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.440750 355572 task_exit.go:204] [ 4543( 707): 4543( 707)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8919, &(0x7f00000008c0)={'batadv_slave_1\x00'}) D0318 16:20:34.443981 355572 usertrap_amd64.go:212] [ 4545(1128): 4545(1128)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.444079 355572 usertrap_amd64.go:212] [ 4546(1168): 4546(1168)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.444102 355572 usertrap_amd64.go:122] [ 4545(1128): 4545(1128)] Allocate a new trap: 0xc000dc6a80 40 D0318 16:20:34.444152 355572 usertrap_amd64.go:122] [ 4546(1168): 4546(1168)] Allocate a new trap: 0xc000e1c510 39 D0318 16:20:34.444229 355572 usertrap_amd64.go:225] [ 4545(1128): 4545(1128)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.444266 355572 usertrap_amd64.go:225] [ 4546(1168): 4546(1168)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.445779 355572 usertrap_amd64.go:212] [ 4545(1128): 4545(1128)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.445860 355572 usertrap_amd64.go:122] [ 4545(1128): 4545(1128)] Allocate a new trap: 0xc000dc6a80 41 D0318 16:20:34.445916 355572 usertrap_amd64.go:225] [ 4545(1128): 4545(1128)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.446425 355572 usertrap_amd64.go:212] [ 4545(1128): 4548(1129)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.446493 355572 usertrap_amd64.go:122] [ 4545(1128): 4548(1129)] Allocate a new trap: 0xc000dc6a80 42 D0318 16:20:34.446580 355572 usertrap_amd64.go:225] [ 4545(1128): 4548(1129)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.450710 355572 usertrap_amd64.go:212] [ 4546(1168): 4546(1168)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.450785 355572 usertrap_amd64.go:122] [ 4546(1168): 4546(1168)] Allocate a new trap: 0xc000e1c510 40 D0318 16:20:34.450874 355572 usertrap_amd64.go:225] [ 4546(1168): 4546(1168)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.452495 355572 usertrap_amd64.go:212] [ 4546(1168): 4546(1168)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.452592 355572 usertrap_amd64.go:122] [ 4546(1168): 4546(1168)] Allocate a new trap: 0xc000e1c510 41 D0318 16:20:34.452710 355572 usertrap_amd64.go:225] [ 4546(1168): 4546(1168)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.452987 355572 usertrap_amd64.go:212] [ 4546(1168): 4549(1169)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.453028 355572 usertrap_amd64.go:122] [ 4546(1168): 4549(1169)] Allocate a new trap: 0xc000e1c510 42 D0318 16:20:34.453199 355572 usertrap_amd64.go:225] [ 4546(1168): 4549(1169)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.455392 355572 usertrap_amd64.go:212] [ 4546(1168): 4546(1168)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.455455 355572 usertrap_amd64.go:122] [ 4546(1168): 4546(1168)] Allocate a new trap: 0xc000e1c510 43 D0318 16:20:34.455513 355572 usertrap_amd64.go:225] [ 4546(1168): 4546(1168)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.459409 355572 task_exit.go:204] [ 4546(1168): 4546(1168)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.459653 355572 task_signals.go:204] [ 4546(1168): 4549(1169)] Signal 9, PID: 4546, TID: 4549, fault addr: 0x0: terminating thread group D0318 16:20:34.460231 355572 task_exit.go:204] [ 4546(1168): 4546(1168)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.460587 355572 task_exit.go:204] [ 4546(1168): 4549(1169)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.465996 355572 task_exit.go:204] [ 4546(1168): 4549(1169)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.466097 355572 task_exit.go:204] [ 4546(1168): 4549(1169)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.466174 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.466742 355572 usertrap_amd64.go:212] [ 4550( 709): 4550( 709)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:34.466875 355572 usertrap_amd64.go:122] [ 4550( 709): 4550( 709)] Allocate a new trap: 0xc000dc6bd0 37 D0318 16:20:34.467146 355572 task_exit.go:204] [ 4546(1168): 4546(1168)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.467690 355572 usertrap_amd64.go:225] [ 4550( 709): 4550( 709)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) 16:20:34 executing program 3: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000006600)='.pending_reads\x00', 0x4841, 0x0) read$FUSE(r0, 0x0, 0x0) D0318 16:20:34.470957 355572 usertrap_amd64.go:212] [ 4550( 709): 4550( 709)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:34.471026 355572 usertrap_amd64.go:122] [ 4550( 709): 4550( 709)] Allocate a new trap: 0xc000dc6bd0 38 D0318 16:20:34.471124 355572 usertrap_amd64.go:225] [ 4550( 709): 4550( 709)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:34.486557 355572 usertrap_amd64.go:212] [ 4550( 709): 4550( 709)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:34.486646 355572 usertrap_amd64.go:122] [ 4550( 709): 4550( 709)] Allocate a new trap: 0xc000dc6bd0 39 D0318 16:20:34.486711 355572 usertrap_amd64.go:225] [ 4550( 709): 4550( 709)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:34.491509 355572 usertrap_amd64.go:212] [ 4551(1170): 4551(1170)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.491644 355572 usertrap_amd64.go:122] [ 4551(1170): 4551(1170)] Allocate a new trap: 0xc000976360 37 D0318 16:20:34.498583 355572 usertrap_amd64.go:212] [ 4550( 709): 4550( 709)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:34.498652 355572 usertrap_amd64.go:122] [ 4550( 709): 4550( 709)] Allocate a new trap: 0xc000dc6bd0 40 D0318 16:20:34.498722 355572 usertrap_amd64.go:225] [ 4550( 709): 4550( 709)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:34.499444 355572 usertrap_amd64.go:225] [ 4551(1170): 4551(1170)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.500390 355572 usertrap_amd64.go:212] [ 4550( 709): 4550( 709)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:34.500475 355572 usertrap_amd64.go:122] [ 4550( 709): 4550( 709)] Allocate a new trap: 0xc000dc6bd0 41 D0318 16:20:34.500547 355572 usertrap_amd64.go:225] [ 4550( 709): 4550( 709)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:34.500959 355572 usertrap_amd64.go:212] [ 4550( 709): 4552( 710)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:34.501052 355572 usertrap_amd64.go:122] [ 4550( 709): 4552( 710)] Allocate a new trap: 0xc000dc6bd0 42 D0318 16:20:34.501272 355572 usertrap_amd64.go:225] [ 4550( 709): 4552( 710)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:34.502066 355572 task_signals.go:309] [ 4545(1128): 4553(1130)] failed to restore from a signal frame: bad address D0318 16:20:34.502205 355572 task_signals.go:470] [ 4545(1128): 4553(1130)] Notified of signal 11 D0318 16:20:34.502359 355572 task_signals.go:220] [ 4545(1128): 4553(1130)] Signal 11: delivering to handler D0318 16:20:34.503800 355572 usertrap_amd64.go:212] [ 4551(1170): 4551(1170)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.503861 355572 usertrap_amd64.go:122] [ 4551(1170): 4551(1170)] Allocate a new trap: 0xc000976360 38 D0318 16:20:34.503928 355572 usertrap_amd64.go:225] [ 4551(1170): 4551(1170)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.505475 355572 usertrap_amd64.go:212] [ 4550( 709): 4550( 709)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:34.505602 355572 usertrap_amd64.go:212] [ 4545(1128): 4545(1128)] Found the pattern at ip 562e85d221ae:sysno 230 D0318 16:20:34.505618 355572 usertrap_amd64.go:122] [ 4550( 709): 4550( 709)] Allocate a new trap: 0xc000dc6bd0 43 D0318 16:20:34.505655 355572 usertrap_amd64.go:122] [ 4545(1128): 4545(1128)] Allocate a new trap: 0xc000dc6a80 43 D0318 16:20:34.505711 355572 usertrap_amd64.go:225] [ 4545(1128): 4545(1128)] Apply the binary patch addr 562e85d221ae trap addr 66d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.505705 355572 usertrap_amd64.go:225] [ 4550( 709): 4550( 709)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:34.505867 355572 usertrap_amd64.go:212] [ 4545(1128): 4548(1129)] Found the pattern at ip 562e85cf5ae8:sysno 1 D0318 16:20:34.505927 355572 usertrap_amd64.go:122] [ 4545(1128): 4548(1129)] Allocate a new trap: 0xc000dc6a80 44 D0318 16:20:34.505991 355572 usertrap_amd64.go:225] [ 4545(1128): 4548(1129)] Apply the binary patch addr 562e85cf5ae8 trap addr 66dc0 ([184 1 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:34.509929 355572 task_exit.go:204] [ 4545(1128): 4548(1129)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.510119 355572 task_signals.go:204] [ 4545(1128): 4553(1130)] Signal 9, PID: 4545, TID: 4553, fault addr: 0x0: terminating thread group D0318 16:20:34.510259 355572 task_signals.go:204] [ 4545(1128): 4545(1128)] Signal 9, PID: 4545, TID: 4545, fault addr: 0x0: terminating thread group D0318 16:20:34.510296 355572 task_exit.go:204] [ 4545(1128): 4553(1130)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.510376 355572 task_signals.go:204] [ 4545(1128): 4554(1131)] Signal 9, PID: 4545, TID: 4554, fault addr: 0x0: terminating thread group D0318 16:20:34.510388 355572 task_exit.go:204] [ 4545(1128): 4545(1128)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.511027 355572 task_exit.go:204] [ 4545(1128): 4548(1129)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.511118 355572 task_exit.go:204] [ 4545(1128): 4548(1129)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.511416 355572 task_exit.go:204] [ 4545(1128): 4554(1131)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.511995 355572 task_signals.go:204] [ 4550( 709): 4552( 710)] Signal 9, PID: 4550, TID: 4552, fault addr: 0x0: terminating thread group D0318 16:20:34.512116 355572 task_exit.go:204] [ 4550( 709): 4550( 709)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.512734 355572 task_exit.go:204] [ 4550( 709): 4552( 710)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.512934 355572 task_exit.go:204] [ 4545(1128): 4545(1128)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.513692 355572 task_exit.go:204] [ 4550( 709): 4550( 709)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.513841 355572 task_exit.go:204] [ 4545(1128): 4553(1130)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.513916 355572 task_exit.go:204] [ 4545(1128): 4553(1130)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.516898 355572 task_exit.go:204] [ 4545(1128): 4554(1131)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.516958 355572 task_exit.go:204] [ 4545(1128): 4554(1131)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.517068 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.517196 355572 task_exit.go:204] [ 4545(1128): 4545(1128)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 1: add_key$user(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="bd", 0x1, 0xffffffffffffffff) D0318 16:20:34.518881 355572 task_exit.go:204] [ 4550( 709): 4552( 710)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.519011 355572 task_exit.go:204] [ 4550( 709): 4552( 710)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.519186 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.519589 355572 usertrap_amd64.go:212] [ 4551(1170): 4551(1170)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.519724 355572 usertrap_amd64.go:122] [ 4551(1170): 4551(1170)] Allocate a new trap: 0xc000976360 39 D0318 16:20:34.519825 355572 usertrap_amd64.go:225] [ 4551(1170): 4551(1170)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.520809 355572 task_exit.go:204] [ 4550( 709): 4550( 709)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:34.527222 355572 usertrap_amd64.go:212] [ 4551(1170): 4551(1170)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.527327 355572 usertrap_amd64.go:122] [ 4551(1170): 4551(1170)] Allocate a new trap: 0xc000976360 40 D0318 16:20:34.527403 355572 usertrap_amd64.go:225] [ 4551(1170): 4551(1170)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.529011 355572 usertrap_amd64.go:212] [ 4551(1170): 4551(1170)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.529075 355572 usertrap_amd64.go:122] [ 4551(1170): 4551(1170)] Allocate a new trap: 0xc000976360 41 D0318 16:20:34.529192 355572 usertrap_amd64.go:225] [ 4551(1170): 4551(1170)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.529489 355572 usertrap_amd64.go:212] [ 4551(1170): 4555(1171)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.529575 355572 usertrap_amd64.go:122] [ 4551(1170): 4555(1171)] Allocate a new trap: 0xc000976360 42 D0318 16:20:34.529790 355572 usertrap_amd64.go:225] [ 4551(1170): 4555(1171)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.531911 355572 usertrap_amd64.go:212] [ 4551(1170): 4551(1170)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.531987 355572 usertrap_amd64.go:122] [ 4551(1170): 4551(1170)] Allocate a new trap: 0xc000976360 43 D0318 16:20:34.532127 355572 usertrap_amd64.go:225] [ 4551(1170): 4551(1170)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.536430 355572 task_exit.go:204] [ 4551(1170): 4551(1170)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.536607 355572 task_signals.go:204] [ 4551(1170): 4555(1171)] Signal 9, PID: 4551, TID: 4555, fault addr: 0x0: terminating thread group D0318 16:20:34.537084 355572 task_exit.go:204] [ 4551(1170): 4551(1170)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.537192 355572 task_exit.go:204] [ 4551(1170): 4555(1171)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.543860 355572 task_exit.go:204] [ 4551(1170): 4555(1171)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.543975 355572 task_exit.go:204] [ 4551(1170): 4555(1171)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.544103 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.544391 355572 task_exit.go:204] [ 4551(1170): 4551(1170)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f000000a940), 0x2, 0x0) syz_mount_image$fuse(&(0x7f000000a8c0), &(0x7f000000a900)='./file0\x00', 0x0, &(0x7f000000a980)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000600)={0x22, 0x3, 0x0, {0x0, 0x1, 0x0, '#'}}, 0x22) D0318 16:20:34.545821 355572 usertrap_amd64.go:212] [ 4556(1132): 4556(1132)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.545942 355572 usertrap_amd64.go:122] [ 4556(1132): 4556(1132)] Allocate a new trap: 0xc005e16300 37 D0318 16:20:34.546787 355572 usertrap_amd64.go:225] [ 4556(1132): 4556(1132)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.549622 355572 usertrap_amd64.go:212] [ 4557( 711): 4557( 711)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:34.549735 355572 usertrap_amd64.go:122] [ 4557( 711): 4557( 711)] Allocate a new trap: 0xc00637c3c0 37 D0318 16:20:34.550417 355572 usertrap_amd64.go:225] [ 4557( 711): 4557( 711)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:34.550463 355572 usertrap_amd64.go:212] [ 4556(1132): 4556(1132)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.550793 355572 usertrap_amd64.go:122] [ 4556(1132): 4556(1132)] Allocate a new trap: 0xc005e16300 38 D0318 16:20:34.550951 355572 usertrap_amd64.go:225] [ 4556(1132): 4556(1132)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.559823 355572 usertrap_amd64.go:212] [ 4557( 711): 4557( 711)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:34.559937 355572 usertrap_amd64.go:122] [ 4557( 711): 4557( 711)] Allocate a new trap: 0xc00637c3c0 38 D0318 16:20:34.560035 355572 usertrap_amd64.go:225] [ 4557( 711): 4557( 711)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:34.571355 355572 usertrap_amd64.go:212] [ 4556(1132): 4556(1132)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.571577 355572 usertrap_amd64.go:122] [ 4556(1132): 4556(1132)] Allocate a new trap: 0xc005e16300 39 D0318 16:20:34.571705 355572 usertrap_amd64.go:225] [ 4556(1132): 4556(1132)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.576758 355572 usertrap_amd64.go:212] [ 4558(1172): 4558(1172)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.576865 355572 usertrap_amd64.go:122] [ 4558(1172): 4558(1172)] Allocate a new trap: 0xc005728510 37 D0318 16:20:34.577597 355572 usertrap_amd64.go:225] [ 4558(1172): 4558(1172)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.578583 355572 usertrap_amd64.go:212] [ 4557( 711): 4557( 711)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:34.578672 355572 usertrap_amd64.go:122] [ 4557( 711): 4557( 711)] Allocate a new trap: 0xc00637c3c0 39 D0318 16:20:34.578808 355572 usertrap_amd64.go:225] [ 4557( 711): 4557( 711)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:34.581057 355572 usertrap_amd64.go:212] [ 4556(1132): 4556(1132)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.581148 355572 usertrap_amd64.go:122] [ 4556(1132): 4556(1132)] Allocate a new trap: 0xc005e16300 40 D0318 16:20:34.581150 355572 usertrap_amd64.go:212] [ 4558(1172): 4558(1172)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.581211 355572 usertrap_amd64.go:122] [ 4558(1172): 4558(1172)] Allocate a new trap: 0xc005728510 38 D0318 16:20:34.581226 355572 usertrap_amd64.go:225] [ 4556(1132): 4556(1132)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.581318 355572 usertrap_amd64.go:225] [ 4558(1172): 4558(1172)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.582813 355572 usertrap_amd64.go:212] [ 4556(1132): 4556(1132)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.582918 355572 usertrap_amd64.go:122] [ 4556(1132): 4556(1132)] Allocate a new trap: 0xc005e16300 41 D0318 16:20:34.583019 355572 usertrap_amd64.go:225] [ 4556(1132): 4556(1132)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.583179 355572 usertrap_amd64.go:212] [ 4556(1132): 4559(1133)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.583235 355572 usertrap_amd64.go:122] [ 4556(1132): 4559(1133)] Allocate a new trap: 0xc005e16300 42 D0318 16:20:34.583291 355572 usertrap_amd64.go:225] [ 4556(1132): 4559(1133)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.584952 355572 usertrap_amd64.go:212] [ 4556(1132): 4556(1132)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.585044 355572 usertrap_amd64.go:122] [ 4556(1132): 4556(1132)] Allocate a new trap: 0xc005e16300 43 D0318 16:20:34.585111 355572 usertrap_amd64.go:225] [ 4556(1132): 4556(1132)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.588948 355572 usertrap_amd64.go:212] [ 4557( 711): 4557( 711)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:34.589014 355572 usertrap_amd64.go:122] [ 4557( 711): 4557( 711)] Allocate a new trap: 0xc00637c3c0 40 D0318 16:20:34.589101 355572 usertrap_amd64.go:225] [ 4557( 711): 4557( 711)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:34.589344 355572 task_exit.go:204] [ 4556(1132): 4556(1132)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.590607 355572 usertrap_amd64.go:212] [ 4557( 711): 4557( 711)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:34.590587 355572 task_signals.go:204] [ 4556(1132): 4559(1133)] Signal 9, PID: 4556, TID: 4559, fault addr: 0x0: terminating thread group D0318 16:20:34.590762 355572 usertrap_amd64.go:122] [ 4557( 711): 4557( 711)] Allocate a new trap: 0xc00637c3c0 41 D0318 16:20:34.590913 355572 usertrap_amd64.go:225] [ 4557( 711): 4557( 711)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:34.591135 355572 usertrap_amd64.go:212] [ 4557( 711): 4560( 712)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:34.591194 355572 usertrap_amd64.go:122] [ 4557( 711): 4560( 712)] Allocate a new trap: 0xc00637c3c0 42 D0318 16:20:34.591259 355572 usertrap_amd64.go:225] [ 4557( 711): 4560( 712)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:34.591356 355572 task_exit.go:204] [ 4556(1132): 4559(1133)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.591563 355572 task_exit.go:204] [ 4556(1132): 4556(1132)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.593568 355572 usertrap_amd64.go:212] [ 4558(1172): 4558(1172)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.593669 355572 usertrap_amd64.go:122] [ 4558(1172): 4558(1172)] Allocate a new trap: 0xc005728510 39 D0318 16:20:34.593757 355572 usertrap_amd64.go:225] [ 4558(1172): 4558(1172)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.596173 355572 task_exit.go:204] [ 4556(1132): 4559(1133)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.596243 355572 task_exit.go:204] [ 4556(1132): 4559(1133)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.596364 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.596532 355572 task_exit.go:204] [ 4556(1132): 4556(1132)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 1: unlinkat$binderfs_device(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder1\x00') D0318 16:20:34.600830 355572 usertrap_amd64.go:212] [ 4558(1172): 4558(1172)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.600918 355572 usertrap_amd64.go:122] [ 4558(1172): 4558(1172)] Allocate a new trap: 0xc005728510 40 D0318 16:20:34.601011 355572 usertrap_amd64.go:225] [ 4558(1172): 4558(1172)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.605138 355572 usertrap_amd64.go:212] [ 4558(1172): 4558(1172)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.605282 355572 usertrap_amd64.go:122] [ 4558(1172): 4558(1172)] Allocate a new trap: 0xc005728510 41 D0318 16:20:34.605399 355572 usertrap_amd64.go:225] [ 4558(1172): 4558(1172)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.605643 355572 usertrap_amd64.go:212] [ 4558(1172): 4561(1173)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.605729 355572 usertrap_amd64.go:122] [ 4558(1172): 4561(1173)] Allocate a new trap: 0xc005728510 42 D0318 16:20:34.605836 355572 usertrap_amd64.go:225] [ 4558(1172): 4561(1173)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.608894 355572 usertrap_amd64.go:212] [ 4558(1172): 4558(1172)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.609036 355572 usertrap_amd64.go:122] [ 4558(1172): 4558(1172)] Allocate a new trap: 0xc005728510 43 D0318 16:20:34.609216 355572 usertrap_amd64.go:225] [ 4558(1172): 4558(1172)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.613612 355572 task_exit.go:204] [ 4558(1172): 4558(1172)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.614322 355572 task_signals.go:204] [ 4558(1172): 4561(1173)] Signal 9, PID: 4558, TID: 4561, fault addr: 0x0: terminating thread group D0318 16:20:34.614460 355572 task_exit.go:204] [ 4558(1172): 4561(1173)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.614778 355572 task_exit.go:204] [ 4558(1172): 4558(1172)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.624065 355572 task_exit.go:204] [ 4558(1172): 4561(1173)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.624173 355572 task_exit.go:204] [ 4558(1172): 4561(1173)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.624304 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.624640 355572 task_exit.go:204] [ 4558(1172): 4558(1172)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.624807 355572 usertrap_amd64.go:212] [ 4562(1134): 4562(1134)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.624935 355572 usertrap_amd64.go:122] [ 4562(1134): 4562(1134)] Allocate a new trap: 0xc000bce510 37 D0318 16:20:34.625634 355572 usertrap_amd64.go:225] [ 4562(1134): 4562(1134)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) 16:20:34 executing program 3: syz_mount_image$fuse(&(0x7f0000000c80), &(0x7f0000000cc0)='./file0\x00', 0x1020, &(0x7f0000000d00)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) D0318 16:20:34.629214 355572 usertrap_amd64.go:212] [ 4562(1134): 4562(1134)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.629285 355572 usertrap_amd64.go:122] [ 4562(1134): 4562(1134)] Allocate a new trap: 0xc000bce510 38 D0318 16:20:34.629336 355572 usertrap_amd64.go:225] [ 4562(1134): 4562(1134)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.640907 355572 usertrap_amd64.go:212] [ 4562(1134): 4562(1134)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.640997 355572 usertrap_amd64.go:122] [ 4562(1134): 4562(1134)] Allocate a new trap: 0xc000bce510 39 D0318 16:20:34.641074 355572 usertrap_amd64.go:225] [ 4562(1134): 4562(1134)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.648466 355572 usertrap_amd64.go:212] [ 4562(1134): 4562(1134)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.648561 355572 usertrap_amd64.go:122] [ 4562(1134): 4562(1134)] Allocate a new trap: 0xc000bce510 40 D0318 16:20:34.648659 355572 usertrap_amd64.go:225] [ 4562(1134): 4562(1134)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.650195 355572 usertrap_amd64.go:212] [ 4562(1134): 4562(1134)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.650254 355572 usertrap_amd64.go:122] [ 4562(1134): 4562(1134)] Allocate a new trap: 0xc000bce510 41 D0318 16:20:34.650341 355572 usertrap_amd64.go:225] [ 4562(1134): 4562(1134)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.650904 355572 usertrap_amd64.go:212] [ 4562(1134): 4564(1135)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.650967 355572 usertrap_amd64.go:122] [ 4562(1134): 4564(1135)] Allocate a new trap: 0xc000bce510 42 D0318 16:20:34.651025 355572 usertrap_amd64.go:225] [ 4562(1134): 4564(1135)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.651566 355572 usertrap_amd64.go:212] [ 4563(1174): 4563(1174)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.651772 355572 usertrap_amd64.go:122] [ 4563(1174): 4563(1174)] Allocate a new trap: 0xc005e16330 37 D0318 16:20:34.652580 355572 usertrap_amd64.go:225] [ 4563(1174): 4563(1174)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.652757 355572 usertrap_amd64.go:212] [ 4562(1134): 4562(1134)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.652825 355572 usertrap_amd64.go:122] [ 4562(1134): 4562(1134)] Allocate a new trap: 0xc000bce510 43 D0318 16:20:34.652933 355572 usertrap_amd64.go:225] [ 4562(1134): 4562(1134)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.653039 355572 usertrap_amd64.go:212] [ 4557( 711): 4557( 711)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:34.653120 355572 usertrap_amd64.go:122] [ 4557( 711): 4557( 711)] Allocate a new trap: 0xc00637c3c0 43 D0318 16:20:34.653200 355572 usertrap_amd64.go:225] [ 4557( 711): 4557( 711)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:34.656189 355572 usertrap_amd64.go:212] [ 4563(1174): 4563(1174)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.656285 355572 usertrap_amd64.go:122] [ 4563(1174): 4563(1174)] Allocate a new trap: 0xc005e16330 38 D0318 16:20:34.656371 355572 usertrap_amd64.go:225] [ 4563(1174): 4563(1174)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.658872 355572 task_exit.go:204] [ 4557( 711): 4557( 711)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.659513 355572 task_signals.go:204] [ 4557( 711): 4560( 712)] Signal 9, PID: 4557, TID: 4560, fault addr: 0x0: terminating thread group D0318 16:20:34.659496 355572 task_signals.go:204] [ 4557( 711): 4565( 713)] Signal 9, PID: 4557, TID: 4565, fault addr: 0x0: terminating thread group D0318 16:20:34.659643 355572 task_exit.go:204] [ 4557( 711): 4557( 711)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.659795 355572 task_exit.go:204] [ 4557( 711): 4565( 713)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.659925 355572 task_exit.go:204] [ 4557( 711): 4560( 712)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.660649 355572 task_exit.go:204] [ 4557( 711): 4565( 713)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.660737 355572 task_exit.go:204] [ 4557( 711): 4565( 713)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.661774 355572 task_exit.go:204] [ 4562(1134): 4562(1134)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.662575 355572 task_signals.go:204] [ 4562(1134): 4564(1135)] Signal 9, PID: 4562, TID: 4564, fault addr: 0x0: terminating thread group D0318 16:20:34.662726 355572 task_exit.go:204] [ 4562(1134): 4564(1135)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.663145 355572 task_exit.go:204] [ 4562(1134): 4562(1134)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.666142 355572 task_exit.go:204] [ 4557( 711): 4560( 712)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.666238 355572 task_exit.go:204] [ 4557( 711): 4560( 712)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.666359 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.667747 355572 task_exit.go:204] [ 4557( 711): 4557( 711)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.668865 355572 task_exit.go:204] [ 4562(1134): 4564(1135)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.669041 355572 task_exit.go:204] [ 4562(1134): 4564(1135)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.669149 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 16:20:34 executing program 2: listxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) D0318 16:20:34.669383 355572 task_exit.go:204] [ 4562(1134): 4562(1134)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:34.675855 355572 usertrap_amd64.go:212] [ 4563(1174): 4563(1174)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.675954 355572 usertrap_amd64.go:122] [ 4563(1174): 4563(1174)] Allocate a new trap: 0xc005e16330 39 D0318 16:20:34.676089 355572 usertrap_amd64.go:225] [ 4563(1174): 4563(1174)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.687702 355572 usertrap_amd64.go:212] [ 4563(1174): 4563(1174)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.687798 355572 usertrap_amd64.go:122] [ 4563(1174): 4563(1174)] Allocate a new trap: 0xc005e16330 40 D0318 16:20:34.687889 355572 usertrap_amd64.go:225] [ 4563(1174): 4563(1174)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.689506 355572 usertrap_amd64.go:212] [ 4563(1174): 4563(1174)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.689587 355572 usertrap_amd64.go:122] [ 4563(1174): 4563(1174)] Allocate a new trap: 0xc005e16330 41 D0318 16:20:34.689655 355572 usertrap_amd64.go:225] [ 4563(1174): 4563(1174)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.690261 355572 usertrap_amd64.go:212] [ 4563(1174): 4566(1175)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.690323 355572 usertrap_amd64.go:122] [ 4563(1174): 4566(1175)] Allocate a new trap: 0xc005e16330 42 D0318 16:20:34.690387 355572 usertrap_amd64.go:225] [ 4563(1174): 4566(1175)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.692571 355572 usertrap_amd64.go:212] [ 4563(1174): 4563(1174)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.692635 355572 usertrap_amd64.go:122] [ 4563(1174): 4563(1174)] Allocate a new trap: 0xc005e16330 43 D0318 16:20:34.692733 355572 usertrap_amd64.go:225] [ 4563(1174): 4563(1174)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.699856 355572 task_exit.go:204] [ 4563(1174): 4563(1174)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.700138 355572 task_signals.go:204] [ 4563(1174): 4566(1175)] Signal 9, PID: 4563, TID: 4566, fault addr: 0x0: terminating thread group D0318 16:20:34.700870 355572 task_exit.go:204] [ 4563(1174): 4563(1174)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.701014 355572 task_exit.go:204] [ 4563(1174): 4566(1175)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.707174 355572 usertrap_amd64.go:212] [ 4568( 714): 4568( 714)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:34.707319 355572 usertrap_amd64.go:122] [ 4568( 714): 4568( 714)] Allocate a new trap: 0xc005d56450 37 D0318 16:20:34.707491 355572 task_exit.go:204] [ 4563(1174): 4566(1175)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.707576 355572 task_exit.go:204] [ 4563(1174): 4566(1175)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.707701 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.708287 355572 usertrap_amd64.go:225] [ 4568( 714): 4568( 714)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:34.708448 355572 task_exit.go:204] [ 4563(1174): 4563(1174)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='attr/current\x00') write$tcp_mem(r0, &(0x7f0000000080), 0x48) D0318 16:20:34.710051 355572 usertrap_amd64.go:212] [ 4500( 48): 4500( 48)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:34.710110 355572 usertrap_amd64.go:122] [ 4500( 48): 4500( 48)] Allocate a new trap: 0xc0002d2330 43 D0318 16:20:34.710194 355572 usertrap_amd64.go:225] [ 4500( 48): 4500( 48)] Apply the binary patch addr 55e9c276bc93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 16:20:34.712028 355572 usertrap_amd64.go:212] [ 4567(1136): 4567(1136)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.712132 355572 usertrap_amd64.go:122] [ 4567(1136): 4567(1136)] Allocate a new trap: 0xc00637c4b0 37 D0318 16:20:34.712680 355572 usertrap_amd64.go:212] [ 4568( 714): 4568( 714)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:34.712758 355572 usertrap_amd64.go:122] [ 4568( 714): 4568( 714)] Allocate a new trap: 0xc005d56450 38 D0318 16:20:34.712731 355572 usertrap_amd64.go:225] [ 4567(1136): 4567(1136)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.712841 355572 usertrap_amd64.go:225] [ 4568( 714): 4568( 714)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:34.715514 355572 task_exit.go:204] [ 4500( 48): 4500( 48)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.715692 355572 task_signals.go:204] [ 4500( 48): 4514( 50)] Signal 9, PID: 4500, TID: 4514, fault addr: 0x0: terminating thread group D0318 16:20:34.715873 355572 task_exit.go:204] [ 4500( 48): 4514( 50)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.716328 355572 usertrap_amd64.go:212] [ 4567(1136): 4567(1136)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.716413 355572 usertrap_amd64.go:122] [ 4567(1136): 4567(1136)] Allocate a new trap: 0xc00637c4b0 38 D0318 16:20:34.716489 355572 usertrap_amd64.go:225] [ 4567(1136): 4567(1136)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.716627 355572 task_exit.go:204] [ 4500( 48): 4514( 50)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.716690 355572 task_exit.go:204] [ 4500( 48): 4514( 50)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.722509 355572 task_exit.go:204] [ 4500( 48): 4500( 48)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.722648 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:34.723342 355572 task_exit.go:204] [ 4500( 48): 4500( 48)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8917, &(0x7f00000008c0)={'batadv_slave_1\x00'}) D0318 16:20:34.727663 355572 usertrap_amd64.go:212] [ 4567(1136): 4567(1136)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.727741 355572 usertrap_amd64.go:122] [ 4567(1136): 4567(1136)] Allocate a new trap: 0xc00637c4b0 39 D0318 16:20:34.727795 355572 usertrap_amd64.go:225] [ 4567(1136): 4567(1136)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.734026 355572 usertrap_amd64.go:212] [ 4567(1136): 4567(1136)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.734104 355572 usertrap_amd64.go:122] [ 4567(1136): 4567(1136)] Allocate a new trap: 0xc00637c4b0 40 D0318 16:20:34.734190 355572 usertrap_amd64.go:225] [ 4567(1136): 4567(1136)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.735698 355572 usertrap_amd64.go:212] [ 4567(1136): 4567(1136)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.735824 355572 usertrap_amd64.go:122] [ 4567(1136): 4567(1136)] Allocate a new trap: 0xc00637c4b0 41 D0318 16:20:34.735932 355572 usertrap_amd64.go:225] [ 4567(1136): 4567(1136)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.736359 355572 usertrap_amd64.go:212] [ 4567(1136): 4570(1137)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.736476 355572 usertrap_amd64.go:122] [ 4567(1136): 4570(1137)] Allocate a new trap: 0xc00637c4b0 42 D0318 16:20:34.736584 355572 usertrap_amd64.go:225] [ 4567(1136): 4570(1137)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.737091 355572 usertrap_amd64.go:212] [ 4568( 714): 4568( 714)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:34.737192 355572 usertrap_amd64.go:122] [ 4568( 714): 4568( 714)] Allocate a new trap: 0xc005d56450 39 D0318 16:20:34.737292 355572 usertrap_amd64.go:225] [ 4568( 714): 4568( 714)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:34.739116 355572 usertrap_amd64.go:212] [ 4569(1176): 4569(1176)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.739197 355572 usertrap_amd64.go:122] [ 4569(1176): 4569(1176)] Allocate a new trap: 0xc0008f2180 37 D0318 16:20:34.739802 355572 usertrap_amd64.go:225] [ 4569(1176): 4569(1176)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.742454 355572 usertrap_amd64.go:212] [ 4569(1176): 4569(1176)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.742514 355572 usertrap_amd64.go:122] [ 4569(1176): 4569(1176)] Allocate a new trap: 0xc0008f2180 38 D0318 16:20:34.742587 355572 usertrap_amd64.go:225] [ 4569(1176): 4569(1176)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.745902 355572 usertrap_amd64.go:212] [ 4568( 714): 4568( 714)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:34.746002 355572 usertrap_amd64.go:122] [ 4568( 714): 4568( 714)] Allocate a new trap: 0xc005d56450 40 D0318 16:20:34.746098 355572 usertrap_amd64.go:225] [ 4568( 714): 4568( 714)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:34.747561 355572 usertrap_amd64.go:212] [ 4568( 714): 4568( 714)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:34.747710 355572 usertrap_amd64.go:122] [ 4568( 714): 4568( 714)] Allocate a new trap: 0xc005d56450 41 D0318 16:20:34.747788 355572 usertrap_amd64.go:225] [ 4568( 714): 4568( 714)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:34.748317 355572 usertrap_amd64.go:212] [ 4568( 714): 4572( 715)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:34.748457 355572 usertrap_amd64.go:122] [ 4568( 714): 4572( 715)] Allocate a new trap: 0xc005d56450 42 D0318 16:20:34.748549 355572 usertrap_amd64.go:225] [ 4568( 714): 4572( 715)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:34.752737 355572 usertrap_amd64.go:212] [ 4571( 51): 4571( 51)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:34.752843 355572 usertrap_amd64.go:122] [ 4571( 51): 4571( 51)] Allocate a new trap: 0xc00637c4e0 36 D0318 16:20:34.753138 355572 usertrap_amd64.go:212] [ 4568( 714): 4568( 714)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:34.753273 355572 usertrap_amd64.go:122] [ 4568( 714): 4568( 714)] Allocate a new trap: 0xc005d56450 43 D0318 16:20:34.753347 355572 usertrap_amd64.go:225] [ 4568( 714): 4568( 714)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:34.753418 355572 usertrap_amd64.go:225] [ 4571( 51): 4571( 51)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:34.755376 355572 usertrap_amd64.go:212] [ 4569(1176): 4569(1176)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.755482 355572 usertrap_amd64.go:122] [ 4569(1176): 4569(1176)] Allocate a new trap: 0xc0008f2180 39 D0318 16:20:34.755655 355572 usertrap_amd64.go:225] [ 4569(1176): 4569(1176)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.756536 355572 usertrap_amd64.go:212] [ 4571( 51): 4571( 51)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:34.756623 355572 usertrap_amd64.go:122] [ 4571( 51): 4571( 51)] Allocate a new trap: 0xc00637c4e0 37 D0318 16:20:34.756696 355572 usertrap_amd64.go:225] [ 4571( 51): 4571( 51)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:34.760219 355572 task_exit.go:204] [ 4568( 714): 4568( 714)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.760415 355572 task_signals.go:204] [ 4568( 714): 4572( 715)] Signal 9, PID: 4568, TID: 4572, fault addr: 0x0: terminating thread group D0318 16:20:34.760556 355572 task_exit.go:204] [ 4568( 714): 4572( 715)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.761303 355572 task_exit.go:204] [ 4568( 714): 4568( 714)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.763798 355572 usertrap_amd64.go:212] [ 4569(1176): 4569(1176)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.763901 355572 usertrap_amd64.go:122] [ 4569(1176): 4569(1176)] Allocate a new trap: 0xc0008f2180 40 D0318 16:20:34.763981 355572 usertrap_amd64.go:225] [ 4569(1176): 4569(1176)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.765517 355572 usertrap_amd64.go:212] [ 4569(1176): 4569(1176)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.765588 355572 usertrap_amd64.go:122] [ 4569(1176): 4569(1176)] Allocate a new trap: 0xc0008f2180 41 D0318 16:20:34.765646 355572 usertrap_amd64.go:225] [ 4569(1176): 4569(1176)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.765898 355572 usertrap_amd64.go:212] [ 4569(1176): 4573(1177)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.765962 355572 usertrap_amd64.go:122] [ 4569(1176): 4573(1177)] Allocate a new trap: 0xc0008f2180 42 D0318 16:20:34.766035 355572 usertrap_amd64.go:225] [ 4569(1176): 4573(1177)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.766782 355572 task_exit.go:204] [ 4568( 714): 4572( 715)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.766870 355572 task_exit.go:204] [ 4568( 714): 4572( 715)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.766940 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.767168 355572 task_exit.go:204] [ 4568( 714): 4568( 714)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.767496 355572 usertrap_amd64.go:212] [ 4569(1176): 4573(1177)] Found the pattern at ip 55ec958b2999:sysno 257 D0318 16:20:34.767598 355572 usertrap_amd64.go:122] [ 4569(1176): 4573(1177)] Allocate a new trap: 0xc0008f2180 43 D0318 16:20:34.767698 355572 usertrap_amd64.go:225] [ 4569(1176): 4573(1177)] Apply the binary patch addr 55ec958b2999 trap addr 66d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 109 6 0]) 16:20:34 executing program 2: lsetxattr$security_ima(&(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0) D0318 16:20:34.769201 355572 usertrap_amd64.go:212] [ 4571( 51): 4571( 51)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:34.769288 355572 usertrap_amd64.go:122] [ 4571( 51): 4571( 51)] Allocate a new trap: 0xc00637c4e0 38 D0318 16:20:34.769343 355572 usertrap_amd64.go:225] [ 4571( 51): 4571( 51)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:34.774907 355572 usertrap_amd64.go:212] [ 4569(1176): 4569(1176)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.774984 355572 usertrap_amd64.go:122] [ 4569(1176): 4569(1176)] Allocate a new trap: 0xc0008f2180 44 D0318 16:20:34.775056 355572 usertrap_amd64.go:225] [ 4569(1176): 4569(1176)] Apply the binary patch addr 55ec958b2c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:34.777659 355572 task_exit.go:204] [ 4569(1176): 4569(1176)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.778292 355572 task_signals.go:204] [ 4569(1176): 4573(1177)] Signal 9, PID: 4569, TID: 4573, fault addr: 0x0: terminating thread group D0318 16:20:34.778386 355572 task_exit.go:204] [ 4569(1176): 4573(1177)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.778622 355572 task_exit.go:204] [ 4569(1176): 4569(1176)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.781495 355572 usertrap_amd64.go:212] [ 4571( 51): 4571( 51)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:34.781552 355572 usertrap_amd64.go:122] [ 4571( 51): 4571( 51)] Allocate a new trap: 0xc00637c4e0 39 D0318 16:20:34.781657 355572 usertrap_amd64.go:225] [ 4571( 51): 4571( 51)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:34.783056 355572 usertrap_amd64.go:212] [ 4571( 51): 4571( 51)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:34.783150 355572 usertrap_amd64.go:122] [ 4571( 51): 4571( 51)] Allocate a new trap: 0xc00637c4e0 40 D0318 16:20:34.783278 355572 usertrap_amd64.go:225] [ 4571( 51): 4571( 51)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:34.783642 355572 usertrap_amd64.go:212] [ 4571( 51): 4574( 52)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:34.783724 355572 usertrap_amd64.go:122] [ 4571( 51): 4574( 52)] Allocate a new trap: 0xc00637c4e0 41 D0318 16:20:34.783860 355572 usertrap_amd64.go:225] [ 4571( 51): 4574( 52)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:34.784353 355572 task_exit.go:204] [ 4569(1176): 4573(1177)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.784415 355572 task_exit.go:204] [ 4569(1176): 4573(1177)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.784488 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.784635 355572 task_exit.go:204] [ 4569(1176): 4569(1176)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f000000a8c0), &(0x7f000000a900)='./file0\x00', 0x0, &(0x7f000000a980)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}}, 0x0, 0x0, 0x0) D0318 16:20:34.787100 355572 usertrap_amd64.go:212] [ 4571( 51): 4571( 51)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:34.787198 355572 usertrap_amd64.go:122] [ 4571( 51): 4571( 51)] Allocate a new trap: 0xc00637c4e0 42 D0318 16:20:34.787298 355572 usertrap_amd64.go:225] [ 4571( 51): 4571( 51)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:34.792336 355572 usertrap_amd64.go:212] [ 4567(1136): 4567(1136)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.792448 355572 usertrap_amd64.go:122] [ 4567(1136): 4567(1136)] Allocate a new trap: 0xc00637c4b0 43 D0318 16:20:34.792488 355572 task_exit.go:204] [ 4571( 51): 4571( 51)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.792536 355572 usertrap_amd64.go:225] [ 4567(1136): 4567(1136)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.792785 355572 task_signals.go:204] [ 4571( 51): 4574( 52)] Signal 9, PID: 4571, TID: 4574, fault addr: 0x0: terminating thread group D0318 16:20:34.793410 355572 task_exit.go:204] [ 4571( 51): 4571( 51)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.793791 355572 task_exit.go:204] [ 4571( 51): 4574( 52)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.797405 355572 task_exit.go:204] [ 4567(1136): 4567(1136)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.798149 355572 task_signals.go:204] [ 4567(1136): 4576(1138)] Signal 9, PID: 4567, TID: 4576, fault addr: 0x0: terminating thread group D0318 16:20:34.798143 355572 task_signals.go:204] [ 4567(1136): 4570(1137)] Signal 9, PID: 4567, TID: 4570, fault addr: 0x0: terminating thread group D0318 16:20:34.798277 355572 task_exit.go:204] [ 4567(1136): 4576(1138)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.798466 355572 task_exit.go:204] [ 4567(1136): 4570(1137)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.798697 355572 task_exit.go:204] [ 4567(1136): 4567(1136)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.799457 355572 task_exit.go:204] [ 4567(1136): 4576(1138)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.799520 355572 task_exit.go:204] [ 4567(1136): 4576(1138)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.800459 355572 task_exit.go:204] [ 4571( 51): 4574( 52)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.800521 355572 task_exit.go:204] [ 4571( 51): 4574( 52)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.800634 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:34.801155 355572 task_exit.go:204] [ 4571( 51): 4571( 51)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000002040)=0x3639) D0318 16:20:34.802841 355572 usertrap_amd64.go:212] [ 4575( 716): 4575( 716)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:34.802970 355572 usertrap_amd64.go:122] [ 4575( 716): 4575( 716)] Allocate a new trap: 0xc000b76420 37 D0318 16:20:34.803972 355572 usertrap_amd64.go:225] [ 4575( 716): 4575( 716)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:34.804659 355572 task_exit.go:204] [ 4567(1136): 4570(1137)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.804718 355572 task_exit.go:204] [ 4567(1136): 4570(1137)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.804842 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.805029 355572 task_exit.go:204] [ 4567(1136): 4567(1136)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 1: prctl$PR_GET_TID_ADDRESS(0x2a, &(0x7f0000008640)) D0318 16:20:34.807560 355572 usertrap_amd64.go:212] [ 4575( 716): 4575( 716)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:34.808155 355572 usertrap_amd64.go:122] [ 4575( 716): 4575( 716)] Allocate a new trap: 0xc000b76420 38 D0318 16:20:34.808299 355572 usertrap_amd64.go:225] [ 4575( 716): 4575( 716)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:34.824300 355572 usertrap_amd64.go:212] [ 4577(1178): 4577(1178)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.824427 355572 usertrap_amd64.go:122] [ 4577(1178): 4577(1178)] Allocate a new trap: 0xc000976390 37 D0318 16:20:34.824804 355572 usertrap_amd64.go:212] [ 4575( 716): 4575( 716)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:34.824890 355572 usertrap_amd64.go:122] [ 4575( 716): 4575( 716)] Allocate a new trap: 0xc000b76420 39 D0318 16:20:34.824991 355572 usertrap_amd64.go:225] [ 4575( 716): 4575( 716)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:34.825324 355572 usertrap_amd64.go:225] [ 4577(1178): 4577(1178)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.829151 355572 usertrap_amd64.go:212] [ 4577(1178): 4577(1178)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.829252 355572 usertrap_amd64.go:122] [ 4577(1178): 4577(1178)] Allocate a new trap: 0xc000976390 38 D0318 16:20:34.829342 355572 usertrap_amd64.go:225] [ 4577(1178): 4577(1178)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.833994 355572 usertrap_amd64.go:212] [ 4578( 53): 4578( 53)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:34.834099 355572 usertrap_amd64.go:122] [ 4578( 53): 4578( 53)] Allocate a new trap: 0xc0005266c0 36 D0318 16:20:34.834758 355572 usertrap_amd64.go:225] [ 4578( 53): 4578( 53)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:34.837122 355572 usertrap_amd64.go:212] [ 4579(1139): 4579(1139)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.837213 355572 usertrap_amd64.go:122] [ 4579(1139): 4579(1139)] Allocate a new trap: 0xc0002d2a20 37 D0318 16:20:34.837405 355572 usertrap_amd64.go:212] [ 4575( 716): 4575( 716)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:34.837497 355572 usertrap_amd64.go:122] [ 4575( 716): 4575( 716)] Allocate a new trap: 0xc000b76420 40 D0318 16:20:34.837612 355572 usertrap_amd64.go:225] [ 4575( 716): 4575( 716)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:34.837684 355572 usertrap_amd64.go:212] [ 4578( 53): 4578( 53)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:34.837749 355572 usertrap_amd64.go:122] [ 4578( 53): 4578( 53)] Allocate a new trap: 0xc0005266c0 37 D0318 16:20:34.837854 355572 usertrap_amd64.go:225] [ 4578( 53): 4578( 53)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:34.837816 355572 usertrap_amd64.go:225] [ 4579(1139): 4579(1139)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.839484 355572 usertrap_amd64.go:212] [ 4575( 716): 4575( 716)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:34.839562 355572 usertrap_amd64.go:122] [ 4575( 716): 4575( 716)] Allocate a new trap: 0xc000b76420 41 D0318 16:20:34.839685 355572 usertrap_amd64.go:225] [ 4575( 716): 4575( 716)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:34.839941 355572 usertrap_amd64.go:212] [ 4575( 716): 4580( 717)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:34.840022 355572 usertrap_amd64.go:122] [ 4575( 716): 4580( 717)] Allocate a new trap: 0xc000b76420 42 D0318 16:20:34.840115 355572 usertrap_amd64.go:225] [ 4575( 716): 4580( 717)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:34.841501 355572 usertrap_amd64.go:212] [ 4577(1178): 4577(1178)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.841571 355572 usertrap_amd64.go:122] [ 4577(1178): 4577(1178)] Allocate a new trap: 0xc000976390 39 D0318 16:20:34.841638 355572 usertrap_amd64.go:225] [ 4577(1178): 4577(1178)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.841819 355572 usertrap_amd64.go:212] [ 4579(1139): 4579(1139)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.841839 355572 usertrap_amd64.go:212] [ 4575( 716): 4575( 716)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:34.841891 355572 usertrap_amd64.go:122] [ 4579(1139): 4579(1139)] Allocate a new trap: 0xc0002d2a20 38 D0318 16:20:34.841916 355572 usertrap_amd64.go:122] [ 4575( 716): 4575( 716)] Allocate a new trap: 0xc000b76420 43 D0318 16:20:34.841968 355572 usertrap_amd64.go:225] [ 4579(1139): 4579(1139)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.842000 355572 usertrap_amd64.go:225] [ 4575( 716): 4575( 716)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:34.847829 355572 task_exit.go:204] [ 4575( 716): 4575( 716)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.847983 355572 task_signals.go:204] [ 4575( 716): 4580( 717)] Signal 9, PID: 4575, TID: 4580, fault addr: 0x0: terminating thread group D0318 16:20:34.848508 355572 task_exit.go:204] [ 4575( 716): 4575( 716)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.848659 355572 task_exit.go:204] [ 4575( 716): 4580( 717)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.849044 355572 usertrap_amd64.go:212] [ 4577(1178): 4577(1178)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.849100 355572 usertrap_amd64.go:122] [ 4577(1178): 4577(1178)] Allocate a new trap: 0xc000976390 40 D0318 16:20:34.849156 355572 usertrap_amd64.go:225] [ 4577(1178): 4577(1178)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.850554 355572 usertrap_amd64.go:212] [ 4577(1178): 4577(1178)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.850633 355572 usertrap_amd64.go:122] [ 4577(1178): 4577(1178)] Allocate a new trap: 0xc000976390 41 D0318 16:20:34.850730 355572 usertrap_amd64.go:225] [ 4577(1178): 4577(1178)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.851112 355572 usertrap_amd64.go:212] [ 4577(1178): 4581(1179)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.851183 355572 usertrap_amd64.go:122] [ 4577(1178): 4581(1179)] Allocate a new trap: 0xc000976390 42 D0318 16:20:34.851248 355572 usertrap_amd64.go:225] [ 4577(1178): 4581(1179)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.853697 355572 task_exit.go:204] [ 4575( 716): 4580( 717)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.853782 355572 task_exit.go:204] [ 4575( 716): 4580( 717)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.853943 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.854432 355572 task_exit.go:204] [ 4575( 716): 4575( 716)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.854459 355572 usertrap_amd64.go:212] [ 4579(1139): 4579(1139)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.854695 355572 usertrap_amd64.go:122] [ 4579(1139): 4579(1139)] Allocate a new trap: 0xc0002d2a20 39 D0318 16:20:34.854791 355572 usertrap_amd64.go:225] [ 4579(1139): 4579(1139)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.855155 355572 usertrap_amd64.go:212] [ 4577(1178): 4577(1178)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.855217 355572 usertrap_amd64.go:122] [ 4577(1178): 4577(1178)] Allocate a new trap: 0xc000976390 43 D0318 16:20:34.855293 355572 usertrap_amd64.go:225] [ 4577(1178): 4577(1178)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) 16:20:34 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:34.856841 355572 usertrap_amd64.go:212] [ 4578( 53): 4578( 53)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:34.856904 355572 usertrap_amd64.go:122] [ 4578( 53): 4578( 53)] Allocate a new trap: 0xc0005266c0 38 D0318 16:20:34.857031 355572 usertrap_amd64.go:225] [ 4578( 53): 4578( 53)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:34.861106 355572 task_exit.go:204] [ 4577(1178): 4577(1178)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.861731 355572 task_signals.go:204] [ 4577(1178): 4581(1179)] Signal 9, PID: 4577, TID: 4581, fault addr: 0x0: terminating thread group D0318 16:20:34.861819 355572 task_exit.go:204] [ 4577(1178): 4577(1178)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.862088 355572 task_exit.go:204] [ 4577(1178): 4581(1179)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.862927 355572 usertrap_amd64.go:212] [ 4579(1139): 4579(1139)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.863111 355572 usertrap_amd64.go:122] [ 4579(1139): 4579(1139)] Allocate a new trap: 0xc0002d2a20 40 D0318 16:20:34.863225 355572 usertrap_amd64.go:225] [ 4579(1139): 4579(1139)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.864463 355572 usertrap_amd64.go:212] [ 4578( 53): 4578( 53)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:34.864545 355572 usertrap_amd64.go:122] [ 4578( 53): 4578( 53)] Allocate a new trap: 0xc0005266c0 39 D0318 16:20:34.864630 355572 usertrap_amd64.go:225] [ 4578( 53): 4578( 53)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:34.865224 355572 usertrap_amd64.go:212] [ 4579(1139): 4579(1139)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.865299 355572 usertrap_amd64.go:122] [ 4579(1139): 4579(1139)] Allocate a new trap: 0xc0002d2a20 41 D0318 16:20:34.865410 355572 usertrap_amd64.go:225] [ 4579(1139): 4579(1139)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.865531 355572 usertrap_amd64.go:212] [ 4579(1139): 4582(1140)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.865620 355572 usertrap_amd64.go:122] [ 4579(1139): 4582(1140)] Allocate a new trap: 0xc0002d2a20 42 D0318 16:20:34.865726 355572 usertrap_amd64.go:225] [ 4579(1139): 4582(1140)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.866252 355572 usertrap_amd64.go:212] [ 4578( 53): 4578( 53)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:34.866345 355572 usertrap_amd64.go:122] [ 4578( 53): 4578( 53)] Allocate a new trap: 0xc0005266c0 40 D0318 16:20:34.866450 355572 usertrap_amd64.go:225] [ 4578( 53): 4578( 53)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:34.867296 355572 usertrap_amd64.go:212] [ 4578( 53): 4583( 54)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:34.867409 355572 usertrap_amd64.go:122] [ 4578( 53): 4583( 54)] Allocate a new trap: 0xc0005266c0 41 D0318 16:20:34.867510 355572 usertrap_amd64.go:225] [ 4578( 53): 4583( 54)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:34.867573 355572 task_exit.go:204] [ 4577(1178): 4581(1179)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.867679 355572 task_exit.go:204] [ 4577(1178): 4581(1179)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.867821 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.867959 355572 task_exit.go:204] [ 4577(1178): 4577(1178)] Transitioning from exit state TaskExitZombie to TaskExitDead I0318 16:20:34.867968 355572 compat.go:120] Unsupported syscall prctl(0x2a,0x20008640,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/prctl for more information. D0318 16:20:34.869182 355572 usertrap_amd64.go:212] [ 4578( 53): 4578( 53)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:34.869208 355572 usertrap_amd64.go:212] [ 4579(1139): 4579(1139)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.869251 355572 usertrap_amd64.go:122] [ 4578( 53): 4578( 53)] Allocate a new trap: 0xc0005266c0 42 D0318 16:20:34.869319 355572 usertrap_amd64.go:122] [ 4579(1139): 4579(1139)] Allocate a new trap: 0xc0002d2a20 43 D0318 16:20:34.869348 355572 usertrap_amd64.go:225] [ 4578( 53): 4578( 53)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) 16:20:34 executing program 3: prctl$PR_GET_TID_ADDRESS(0x34, &(0x7f0000008640)) D0318 16:20:34.869574 355572 usertrap_amd64.go:225] [ 4579(1139): 4579(1139)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.873754 355572 task_exit.go:204] [ 4578( 53): 4578( 53)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.874918 355572 task_signals.go:204] [ 4579(1139): 4582(1140)] Signal 9, PID: 4579, TID: 4582, fault addr: 0x0: terminating thread group D0318 16:20:34.874957 355572 task_signals.go:204] [ 4578( 53): 4583( 54)] Signal 9, PID: 4578, TID: 4583, fault addr: 0x0: terminating thread group D0318 16:20:34.875041 355572 task_exit.go:204] [ 4578( 53): 4583( 54)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.875594 355572 task_exit.go:204] [ 4578( 53): 4583( 54)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.875712 355572 task_exit.go:204] [ 4578( 53): 4583( 54)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.875816 355572 task_exit.go:204] [ 4579(1139): 4582(1140)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.876136 355572 task_exit.go:204] [ 4579(1139): 4579(1139)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.877092 355572 task_exit.go:204] [ 4579(1139): 4579(1139)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.882637 355572 task_exit.go:204] [ 4579(1139): 4582(1140)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.882718 355572 task_exit.go:204] [ 4579(1139): 4582(1140)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.882798 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.882991 355572 task_exit.go:204] [ 4579(1139): 4579(1139)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.883165 355572 task_exit.go:204] [ 4578( 53): 4578( 53)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.883251 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:34.883284 355572 usertrap_amd64.go:212] [ 4584( 718): 4584( 718)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:34.883356 355572 usertrap_amd64.go:122] [ 4584( 718): 4584( 718)] Allocate a new trap: 0xc000dc6e40 37 D0318 16:20:34.883958 355572 usertrap_amd64.go:225] [ 4584( 718): 4584( 718)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) 16:20:34 executing program 1: prctl$PR_GET_TID_ADDRESS(0x2c, 0x0) D0318 16:20:34.886254 355572 task_exit.go:204] [ 4578( 53): 4578( 53)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.887111 355572 usertrap_amd64.go:212] [ 4584( 718): 4584( 718)] Found the pattern at ip 55ca2d8e5520:sysno 266 16:20:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x480, 0x0, &(0x7f0000000180)) D0318 16:20:34.887180 355572 usertrap_amd64.go:122] [ 4584( 718): 4584( 718)] Allocate a new trap: 0xc000dc6e40 38 D0318 16:20:34.887485 355572 usertrap_amd64.go:225] [ 4584( 718): 4584( 718)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:34.896607 355572 usertrap_amd64.go:212] [ 4585(1180): 4585(1180)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.896839 355572 usertrap_amd64.go:122] [ 4585(1180): 4585(1180)] Allocate a new trap: 0xc000526750 37 D0318 16:20:34.897580 355572 usertrap_amd64.go:225] [ 4585(1180): 4585(1180)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.900425 355572 usertrap_amd64.go:212] [ 4585(1180): 4585(1180)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.900492 355572 usertrap_amd64.go:122] [ 4585(1180): 4585(1180)] Allocate a new trap: 0xc000526750 38 D0318 16:20:34.900540 355572 usertrap_amd64.go:225] [ 4585(1180): 4585(1180)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.904082 355572 usertrap_amd64.go:212] [ 4584( 718): 4584( 718)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:34.904141 355572 usertrap_amd64.go:122] [ 4584( 718): 4584( 718)] Allocate a new trap: 0xc000dc6e40 39 D0318 16:20:34.904215 355572 usertrap_amd64.go:225] [ 4584( 718): 4584( 718)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:34.911705 355572 usertrap_amd64.go:212] [ 4584( 718): 4584( 718)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:34.911764 355572 usertrap_amd64.go:122] [ 4584( 718): 4584( 718)] Allocate a new trap: 0xc000dc6e40 40 D0318 16:20:34.911827 355572 usertrap_amd64.go:225] [ 4584( 718): 4584( 718)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:34.913066 355572 usertrap_amd64.go:212] [ 4584( 718): 4584( 718)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:34.913153 355572 usertrap_amd64.go:122] [ 4584( 718): 4584( 718)] Allocate a new trap: 0xc000dc6e40 41 D0318 16:20:34.913233 355572 usertrap_amd64.go:225] [ 4584( 718): 4584( 718)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:34.913104 355572 usertrap_amd64.go:212] [ 4585(1180): 4585(1180)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.913302 355572 usertrap_amd64.go:122] [ 4585(1180): 4585(1180)] Allocate a new trap: 0xc000526750 39 D0318 16:20:34.913425 355572 usertrap_amd64.go:225] [ 4585(1180): 4585(1180)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.913631 355572 usertrap_amd64.go:212] [ 4584( 718): 4588( 719)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:34.913743 355572 usertrap_amd64.go:122] [ 4584( 718): 4588( 719)] Allocate a new trap: 0xc000dc6e40 42 D0318 16:20:34.913863 355572 usertrap_amd64.go:225] [ 4584( 718): 4588( 719)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:34.913677 355572 usertrap_amd64.go:212] [ 4587( 55): 4587( 55)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:34.914004 355572 usertrap_amd64.go:122] [ 4587( 55): 4587( 55)] Allocate a new trap: 0xc005d564b0 36 D0318 16:20:34.919446 355572 usertrap_amd64.go:225] [ 4587( 55): 4587( 55)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:34.919677 355572 usertrap_amd64.go:212] [ 4585(1180): 4585(1180)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.919773 355572 usertrap_amd64.go:122] [ 4585(1180): 4585(1180)] Allocate a new trap: 0xc000526750 40 D0318 16:20:34.919848 355572 usertrap_amd64.go:225] [ 4585(1180): 4585(1180)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.919875 355572 usertrap_amd64.go:212] [ 4586(1141): 4586(1141)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.919967 355572 usertrap_amd64.go:122] [ 4586(1141): 4586(1141)] Allocate a new trap: 0xc000dc6ea0 37 D0318 16:20:34.920605 355572 usertrap_amd64.go:225] [ 4586(1141): 4586(1141)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.921466 355572 usertrap_amd64.go:212] [ 4585(1180): 4585(1180)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.921538 355572 usertrap_amd64.go:122] [ 4585(1180): 4585(1180)] Allocate a new trap: 0xc000526750 41 D0318 16:20:34.921617 355572 usertrap_amd64.go:225] [ 4585(1180): 4585(1180)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.921865 355572 usertrap_amd64.go:212] [ 4585(1180): 4589(1181)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.921951 355572 usertrap_amd64.go:122] [ 4585(1180): 4589(1181)] Allocate a new trap: 0xc000526750 42 D0318 16:20:34.922020 355572 usertrap_amd64.go:225] [ 4585(1180): 4589(1181)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.923300 355572 usertrap_amd64.go:212] [ 4585(1180): 4585(1180)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.923308 355572 usertrap_amd64.go:212] [ 4587( 55): 4587( 55)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:34.923426 355572 usertrap_amd64.go:122] [ 4587( 55): 4587( 55)] Allocate a new trap: 0xc005d564b0 37 D0318 16:20:34.923368 355572 usertrap_amd64.go:122] [ 4585(1180): 4585(1180)] Allocate a new trap: 0xc000526750 43 D0318 16:20:34.923518 355572 usertrap_amd64.go:225] [ 4587( 55): 4587( 55)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:34.923589 355572 usertrap_amd64.go:225] [ 4585(1180): 4585(1180)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.923687 355572 usertrap_amd64.go:212] [ 4586(1141): 4586(1141)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:34.923774 355572 usertrap_amd64.go:122] [ 4586(1141): 4586(1141)] Allocate a new trap: 0xc000dc6ea0 38 D0318 16:20:34.923897 355572 usertrap_amd64.go:225] [ 4586(1141): 4586(1141)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.930175 355572 task_exit.go:204] [ 4585(1180): 4585(1180)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.930512 355572 task_signals.go:204] [ 4585(1180): 4589(1181)] Signal 9, PID: 4585, TID: 4589, fault addr: 0x0: terminating thread group D0318 16:20:34.930668 355572 task_exit.go:204] [ 4585(1180): 4589(1181)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.931480 355572 task_exit.go:204] [ 4585(1180): 4589(1181)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.931546 355572 task_exit.go:204] [ 4585(1180): 4589(1181)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.935055 355572 usertrap_amd64.go:212] [ 4587( 55): 4587( 55)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:34.935182 355572 usertrap_amd64.go:122] [ 4587( 55): 4587( 55)] Allocate a new trap: 0xc005d564b0 38 D0318 16:20:34.935312 355572 usertrap_amd64.go:225] [ 4587( 55): 4587( 55)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:34.936011 355572 task_exit.go:204] [ 4585(1180): 4585(1180)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.936164 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:34.936267 355572 task_exit.go:204] [ 4585(1180): 4585(1180)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 3: prctl$PR_GET_TID_ADDRESS(0x29, &(0x7f0000008640)) D0318 16:20:34.938628 355572 usertrap_amd64.go:212] [ 4586(1141): 4586(1141)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:34.938691 355572 usertrap_amd64.go:122] [ 4586(1141): 4586(1141)] Allocate a new trap: 0xc000dc6ea0 39 D0318 16:20:34.938782 355572 usertrap_amd64.go:225] [ 4586(1141): 4586(1141)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.942818 355572 usertrap_amd64.go:212] [ 4587( 55): 4587( 55)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:34.942888 355572 usertrap_amd64.go:122] [ 4587( 55): 4587( 55)] Allocate a new trap: 0xc005d564b0 39 D0318 16:20:34.942951 355572 usertrap_amd64.go:225] [ 4587( 55): 4587( 55)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:34.944455 355572 usertrap_amd64.go:212] [ 4587( 55): 4587( 55)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:34.944519 355572 usertrap_amd64.go:122] [ 4587( 55): 4587( 55)] Allocate a new trap: 0xc005d564b0 40 D0318 16:20:34.944621 355572 usertrap_amd64.go:225] [ 4587( 55): 4587( 55)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:34.945056 355572 usertrap_amd64.go:212] [ 4587( 55): 4590( 56)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:34.945136 355572 usertrap_amd64.go:122] [ 4587( 55): 4590( 56)] Allocate a new trap: 0xc005d564b0 41 D0318 16:20:34.945207 355572 usertrap_amd64.go:225] [ 4587( 55): 4590( 56)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:34.945694 355572 usertrap_amd64.go:212] [ 4586(1141): 4586(1141)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:34.945767 355572 usertrap_amd64.go:122] [ 4586(1141): 4586(1141)] Allocate a new trap: 0xc000dc6ea0 40 D0318 16:20:34.945919 355572 usertrap_amd64.go:225] [ 4586(1141): 4586(1141)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.947554 355572 usertrap_amd64.go:212] [ 4586(1141): 4586(1141)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:34.947663 355572 usertrap_amd64.go:122] [ 4586(1141): 4586(1141)] Allocate a new trap: 0xc000dc6ea0 41 D0318 16:20:34.947809 355572 usertrap_amd64.go:225] [ 4586(1141): 4586(1141)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.948063 355572 usertrap_amd64.go:212] [ 4587( 55): 4587( 55)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:34.948177 355572 usertrap_amd64.go:122] [ 4587( 55): 4587( 55)] Allocate a new trap: 0xc005d564b0 42 D0318 16:20:34.948100 355572 usertrap_amd64.go:212] [ 4586(1141): 4591(1142)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:34.948323 355572 usertrap_amd64.go:122] [ 4586(1141): 4591(1142)] Allocate a new trap: 0xc000dc6ea0 42 D0318 16:20:34.948436 355572 usertrap_amd64.go:225] [ 4586(1141): 4591(1142)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:34.948253 355572 usertrap_amd64.go:225] [ 4587( 55): 4587( 55)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) I0318 16:20:34.949645 355572 compat.go:120] Unsupported syscall prctl(0x2c,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/prctl for more information. D0318 16:20:34.950194 355572 usertrap_amd64.go:212] [ 4586(1141): 4586(1141)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:34.950289 355572 usertrap_amd64.go:122] [ 4586(1141): 4586(1141)] Allocate a new trap: 0xc000dc6ea0 43 D0318 16:20:34.950373 355572 usertrap_amd64.go:225] [ 4586(1141): 4586(1141)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.952044 355572 task_signals.go:204] [ 4587( 55): 4590( 56)] Signal 9, PID: 4587, TID: 4590, fault addr: 0x0: terminating thread group D0318 16:20:34.952186 355572 task_exit.go:204] [ 4587( 55): 4590( 56)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.952648 355572 task_exit.go:204] [ 4587( 55): 4587( 55)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.953207 355572 task_exit.go:204] [ 4587( 55): 4590( 56)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.953293 355572 task_exit.go:204] [ 4587( 55): 4590( 56)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.955321 355572 task_exit.go:204] [ 4586(1141): 4586(1141)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.955539 355572 task_signals.go:204] [ 4586(1141): 4591(1142)] Signal 9, PID: 4586, TID: 4591, fault addr: 0x0: terminating thread group D0318 16:20:34.956071 355572 task_exit.go:204] [ 4586(1141): 4586(1141)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.956232 355572 task_exit.go:204] [ 4586(1141): 4591(1142)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.958437 355572 task_exit.go:204] [ 4587( 55): 4587( 55)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.958516 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:34.958664 355572 task_exit.go:204] [ 4587( 55): 4587( 55)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5411, &(0x7f00000008c0)={'batadv_slave_1\x00'}) D0318 16:20:34.961424 355572 task_exit.go:204] [ 4586(1141): 4591(1142)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.961472 355572 task_exit.go:204] [ 4586(1141): 4591(1142)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.961536 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:34.961986 355572 usertrap_amd64.go:212] [ 4592(1182): 4592(1182)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:34.962017 355572 task_exit.go:204] [ 4586(1141): 4586(1141)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.962065 355572 usertrap_amd64.go:122] [ 4592(1182): 4592(1182)] Allocate a new trap: 0xc0002d2bd0 37 D0318 16:20:34.962516 355572 usertrap_amd64.go:225] [ 4592(1182): 4592(1182)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) 16:20:34 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{0x77359400}}, 0x0) D0318 16:20:34.966324 355572 usertrap_amd64.go:212] [ 4592(1182): 4592(1182)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:34.966403 355572 usertrap_amd64.go:122] [ 4592(1182): 4592(1182)] Allocate a new trap: 0xc0002d2bd0 38 D0318 16:20:34.966472 355572 usertrap_amd64.go:225] [ 4592(1182): 4592(1182)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:34.971013 355572 usertrap_amd64.go:212] [ 4584( 718): 4584( 718)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:34.971091 355572 usertrap_amd64.go:122] [ 4584( 718): 4584( 718)] Allocate a new trap: 0xc000dc6e40 43 D0318 16:20:34.971186 355572 usertrap_amd64.go:225] [ 4584( 718): 4584( 718)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:34.974976 355572 task_exit.go:204] [ 4584( 718): 4584( 718)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.975096 355572 task_signals.go:204] [ 4584( 718): 4588( 719)] Signal 9, PID: 4584, TID: 4588, fault addr: 0x0: terminating thread group D0318 16:20:34.975639 355572 task_signals.go:204] [ 4584( 718): 4593( 720)] Signal 9, PID: 4584, TID: 4593, fault addr: 0x0: terminating thread group D0318 16:20:34.975734 355572 task_exit.go:204] [ 4584( 718): 4588( 719)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.975933 355572 task_exit.go:204] [ 4584( 718): 4584( 718)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.976698 355572 task_exit.go:204] [ 4584( 718): 4588( 719)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.976809 355572 task_exit.go:204] [ 4584( 718): 4588( 719)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.976954 355572 task_exit.go:204] [ 4584( 718): 4593( 720)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:34.979352 355572 usertrap_amd64.go:212] [ 4592(1182): 4592(1182)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:34.979469 355572 usertrap_amd64.go:122] [ 4592(1182): 4592(1182)] Allocate a new trap: 0xc0002d2bd0 39 D0318 16:20:34.979589 355572 usertrap_amd64.go:225] [ 4592(1182): 4592(1182)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:34.984700 355572 task_exit.go:204] [ 4584( 718): 4593( 720)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:34.984784 355572 task_exit.go:204] [ 4584( 718): 4593( 720)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:34.984928 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:34.985269 355572 task_exit.go:204] [ 4584( 718): 4584( 718)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:34 executing program 2: linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x0) D0318 16:20:34.987863 355572 usertrap_amd64.go:212] [ 4594( 57): 4594( 57)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:34.987989 355572 usertrap_amd64.go:122] [ 4594( 57): 4594( 57)] Allocate a new trap: 0xc00637c540 36 D0318 16:20:34.988567 355572 usertrap_amd64.go:225] [ 4594( 57): 4594( 57)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:34.989602 355572 usertrap_amd64.go:212] [ 4592(1182): 4592(1182)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:34.989697 355572 usertrap_amd64.go:122] [ 4592(1182): 4592(1182)] Allocate a new trap: 0xc0002d2bd0 40 D0318 16:20:34.989813 355572 usertrap_amd64.go:225] [ 4592(1182): 4592(1182)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:34.991346 355572 usertrap_amd64.go:212] [ 4592(1182): 4592(1182)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:34.991433 355572 usertrap_amd64.go:122] [ 4592(1182): 4592(1182)] Allocate a new trap: 0xc0002d2bd0 41 D0318 16:20:34.991560 355572 usertrap_amd64.go:225] [ 4592(1182): 4592(1182)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:34.991883 355572 usertrap_amd64.go:212] [ 4592(1182): 4596(1183)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:34.991955 355572 usertrap_amd64.go:122] [ 4592(1182): 4596(1183)] Allocate a new trap: 0xc0002d2bd0 42 D0318 16:20:34.992170 355572 usertrap_amd64.go:225] [ 4592(1182): 4596(1183)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) I0318 16:20:34.992974 355572 compat.go:120] Unsupported syscall prctl(0x29,0x20008640,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/prctl for more information. D0318 16:20:34.993533 355572 usertrap_amd64.go:212] [ 4595(1143): 4595(1143)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:34.993662 355572 usertrap_amd64.go:122] [ 4595(1143): 4595(1143)] Allocate a new trap: 0xc0078f62a0 37 D0318 16:20:34.994043 355572 usertrap_amd64.go:212] [ 4592(1182): 4592(1182)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:34.994120 355572 usertrap_amd64.go:122] [ 4592(1182): 4592(1182)] Allocate a new trap: 0xc0002d2bd0 43 D0318 16:20:34.994191 355572 usertrap_amd64.go:225] [ 4592(1182): 4592(1182)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:34.994205 355572 usertrap_amd64.go:225] [ 4595(1143): 4595(1143)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:34.995749 355572 usertrap_amd64.go:212] [ 4594( 57): 4594( 57)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:34.995805 355572 usertrap_amd64.go:122] [ 4594( 57): 4594( 57)] Allocate a new trap: 0xc00637c540 37 D0318 16:20:34.995877 355572 usertrap_amd64.go:225] [ 4594( 57): 4594( 57)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.000291 355572 task_exit.go:204] [ 4592(1182): 4592(1182)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.000600 355572 task_signals.go:204] [ 4592(1182): 4596(1183)] Signal 9, PID: 4592, TID: 4596, fault addr: 0x0: terminating thread group D0318 16:20:35.001025 355572 task_exit.go:204] [ 4592(1182): 4592(1182)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.001276 355572 task_exit.go:204] [ 4592(1182): 4596(1183)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.003803 355572 usertrap_amd64.go:212] [ 4595(1143): 4595(1143)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.003941 355572 usertrap_amd64.go:122] [ 4595(1143): 4595(1143)] Allocate a new trap: 0xc0078f62a0 38 D0318 16:20:35.004026 355572 usertrap_amd64.go:225] [ 4595(1143): 4595(1143)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.006618 355572 usertrap_amd64.go:212] [ 4594( 57): 4594( 57)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.006710 355572 usertrap_amd64.go:122] [ 4594( 57): 4594( 57)] Allocate a new trap: 0xc00637c540 38 D0318 16:20:35.006808 355572 usertrap_amd64.go:225] [ 4594( 57): 4594( 57)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.008791 355572 task_exit.go:204] [ 4592(1182): 4596(1183)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.008867 355572 task_exit.go:204] [ 4592(1182): 4596(1183)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.008985 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:35.009462 355572 task_exit.go:204] [ 4592(1182): 4592(1182)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:35.018045 355572 usertrap_amd64.go:212] [ 4594( 57): 4594( 57)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.018135 355572 usertrap_amd64.go:122] [ 4594( 57): 4594( 57)] Allocate a new trap: 0xc00637c540 39 D0318 16:20:35.018214 355572 usertrap_amd64.go:225] [ 4594( 57): 4594( 57)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.018701 355572 usertrap_amd64.go:212] [ 4597( 721): 4597( 721)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.018812 355572 usertrap_amd64.go:122] [ 4597( 721): 4597( 721)] Allocate a new trap: 0xc0002d2c00 37 D0318 16:20:35.019483 355572 usertrap_amd64.go:225] [ 4597( 721): 4597( 721)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.019772 355572 usertrap_amd64.go:212] [ 4594( 57): 4594( 57)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.019837 355572 usertrap_amd64.go:122] [ 4594( 57): 4594( 57)] Allocate a new trap: 0xc00637c540 40 D0318 16:20:35.019940 355572 usertrap_amd64.go:225] [ 4594( 57): 4594( 57)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.020338 355572 usertrap_amd64.go:212] [ 4594( 57): 4598( 58)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.020414 355572 usertrap_amd64.go:122] [ 4594( 57): 4598( 58)] Allocate a new trap: 0xc00637c540 41 D0318 16:20:35.020500 355572 usertrap_amd64.go:225] [ 4594( 57): 4598( 58)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.024567 355572 usertrap_amd64.go:212] [ 4594( 57): 4594( 57)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.024668 355572 usertrap_amd64.go:122] [ 4594( 57): 4594( 57)] Allocate a new trap: 0xc00637c540 42 D0318 16:20:35.024744 355572 usertrap_amd64.go:225] [ 4594( 57): 4594( 57)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.026234 355572 usertrap_amd64.go:212] [ 4597( 721): 4597( 721)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.026322 355572 usertrap_amd64.go:122] [ 4597( 721): 4597( 721)] Allocate a new trap: 0xc0002d2c00 38 D0318 16:20:35.026440 355572 usertrap_amd64.go:225] [ 4597( 721): 4597( 721)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.028395 355572 task_exit.go:204] [ 4594( 57): 4594( 57)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.028995 355572 task_signals.go:204] [ 4594( 57): 4598( 58)] Signal 9, PID: 4594, TID: 4598, fault addr: 0x0: terminating thread group D0318 16:20:35.029029 355572 task_exit.go:204] [ 4594( 57): 4594( 57)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.029120 355572 task_exit.go:204] [ 4594( 57): 4598( 58)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.032337 355572 usertrap_amd64.go:212] [ 4595(1143): 4595(1143)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.032433 355572 usertrap_amd64.go:122] [ 4595(1143): 4595(1143)] Allocate a new trap: 0xc0078f62a0 39 D0318 16:20:35.032519 355572 usertrap_amd64.go:225] [ 4595(1143): 4595(1143)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.034845 355572 task_exit.go:204] [ 4594( 57): 4598( 58)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.034977 355572 task_exit.go:204] [ 4594( 57): 4598( 58)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.035108 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.035219 355572 task_exit.go:204] [ 4594( 57): 4594( 57)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: syz_emit_ethernet(0x32, &(0x7f00000000c0)={@remote, @broadcast, @val={@val={0x88a8, 0x0, 0x1}}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @local}, @info_reply}}}}, 0x0) D0318 16:20:35.041648 355572 usertrap_amd64.go:212] [ 4595(1143): 4595(1143)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.041720 355572 usertrap_amd64.go:122] [ 4595(1143): 4595(1143)] Allocate a new trap: 0xc0078f62a0 40 D0318 16:20:35.041809 355572 usertrap_amd64.go:225] [ 4595(1143): 4595(1143)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.043305 355572 usertrap_amd64.go:212] [ 4595(1143): 4595(1143)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.043411 355572 usertrap_amd64.go:122] [ 4595(1143): 4595(1143)] Allocate a new trap: 0xc0078f62a0 41 D0318 16:20:35.043495 355572 usertrap_amd64.go:225] [ 4595(1143): 4595(1143)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.043689 355572 usertrap_amd64.go:212] [ 4595(1143): 4600(1144)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.043739 355572 usertrap_amd64.go:122] [ 4595(1143): 4600(1144)] Allocate a new trap: 0xc0078f62a0 42 D0318 16:20:35.043795 355572 usertrap_amd64.go:225] [ 4595(1143): 4600(1144)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.046800 355572 usertrap_amd64.go:212] [ 4595(1143): 4595(1143)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.046884 355572 usertrap_amd64.go:122] [ 4595(1143): 4595(1143)] Allocate a new trap: 0xc0078f62a0 43 D0318 16:20:35.046948 355572 usertrap_amd64.go:225] [ 4595(1143): 4595(1143)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.050889 355572 usertrap_amd64.go:212] [ 4599(1184): 4599(1184)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:35.051097 355572 usertrap_amd64.go:122] [ 4599(1184): 4599(1184)] Allocate a new trap: 0xc0078f6300 37 D0318 16:20:35.052054 355572 usertrap_amd64.go:225] [ 4599(1184): 4599(1184)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.052075 355572 task_exit.go:204] [ 4595(1143): 4595(1143)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.052286 355572 task_signals.go:204] [ 4595(1143): 4600(1144)] Signal 9, PID: 4595, TID: 4600, fault addr: 0x0: terminating thread group D0318 16:20:35.052720 355572 task_exit.go:204] [ 4595(1143): 4595(1143)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.052831 355572 task_exit.go:204] [ 4595(1143): 4600(1144)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.056112 355572 usertrap_amd64.go:212] [ 4599(1184): 4599(1184)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:35.056218 355572 usertrap_amd64.go:122] [ 4599(1184): 4599(1184)] Allocate a new trap: 0xc0078f6300 38 D0318 16:20:35.056312 355572 usertrap_amd64.go:225] [ 4599(1184): 4599(1184)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.056994 355572 usertrap_amd64.go:212] [ 4597( 721): 4597( 721)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.057168 355572 usertrap_amd64.go:122] [ 4597( 721): 4597( 721)] Allocate a new trap: 0xc0002d2c00 39 D0318 16:20:35.057274 355572 usertrap_amd64.go:225] [ 4597( 721): 4597( 721)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.058477 355572 task_exit.go:204] [ 4595(1143): 4600(1144)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.058565 355572 task_exit.go:204] [ 4595(1143): 4600(1144)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.058683 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.058824 355572 task_exit.go:204] [ 4595(1143): 4595(1143)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 1: prctl$PR_GET_TID_ADDRESS(0x3d, &(0x7f0000008640)) D0318 16:20:35.064726 355572 usertrap_amd64.go:212] [ 4597( 721): 4597( 721)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.064794 355572 usertrap_amd64.go:122] [ 4597( 721): 4597( 721)] Allocate a new trap: 0xc0002d2c00 40 D0318 16:20:35.064900 355572 usertrap_amd64.go:225] [ 4597( 721): 4597( 721)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.066896 355572 usertrap_amd64.go:212] [ 4599(1184): 4599(1184)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:35.066989 355572 usertrap_amd64.go:122] [ 4599(1184): 4599(1184)] Allocate a new trap: 0xc0078f6300 39 D0318 16:20:35.067045 355572 usertrap_amd64.go:225] [ 4599(1184): 4599(1184)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.067060 355572 usertrap_amd64.go:212] [ 4597( 721): 4597( 721)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.067130 355572 usertrap_amd64.go:122] [ 4597( 721): 4597( 721)] Allocate a new trap: 0xc0002d2c00 41 D0318 16:20:35.067194 355572 usertrap_amd64.go:225] [ 4597( 721): 4597( 721)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.067499 355572 usertrap_amd64.go:212] [ 4597( 721): 4602( 722)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.067709 355572 usertrap_amd64.go:122] [ 4597( 721): 4602( 722)] Allocate a new trap: 0xc0002d2c00 42 D0318 16:20:35.067950 355572 usertrap_amd64.go:225] [ 4597( 721): 4602( 722)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.068574 355572 usertrap_amd64.go:212] [ 4601( 59): 4601( 59)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.068655 355572 usertrap_amd64.go:122] [ 4601( 59): 4601( 59)] Allocate a new trap: 0xc000bce990 36 D0318 16:20:35.069135 355572 usertrap_amd64.go:225] [ 4601( 59): 4601( 59)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.069938 355572 usertrap_amd64.go:212] [ 4597( 721): 4597( 721)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.070041 355572 usertrap_amd64.go:122] [ 4597( 721): 4597( 721)] Allocate a new trap: 0xc0002d2c00 43 D0318 16:20:35.070101 355572 usertrap_amd64.go:225] [ 4597( 721): 4597( 721)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.072268 355572 usertrap_amd64.go:212] [ 4601( 59): 4601( 59)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.072327 355572 usertrap_amd64.go:122] [ 4601( 59): 4601( 59)] Allocate a new trap: 0xc000bce990 37 D0318 16:20:35.072421 355572 usertrap_amd64.go:225] [ 4601( 59): 4601( 59)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.073407 355572 usertrap_amd64.go:212] [ 4599(1184): 4599(1184)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:35.073467 355572 usertrap_amd64.go:122] [ 4599(1184): 4599(1184)] Allocate a new trap: 0xc0078f6300 40 D0318 16:20:35.073550 355572 usertrap_amd64.go:225] [ 4599(1184): 4599(1184)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.075186 355572 usertrap_amd64.go:212] [ 4599(1184): 4599(1184)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:35.075313 355572 usertrap_amd64.go:122] [ 4599(1184): 4599(1184)] Allocate a new trap: 0xc0078f6300 41 D0318 16:20:35.075463 355572 usertrap_amd64.go:225] [ 4599(1184): 4599(1184)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.076543 355572 usertrap_amd64.go:212] [ 4599(1184): 4603(1185)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:35.076675 355572 usertrap_amd64.go:122] [ 4599(1184): 4603(1185)] Allocate a new trap: 0xc0078f6300 42 D0318 16:20:35.076771 355572 usertrap_amd64.go:225] [ 4599(1184): 4603(1185)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.078142 355572 task_signals.go:309] [ 4599(1184): 4603(1185)] failed to restore from a signal frame: bad address D0318 16:20:35.078276 355572 task_signals.go:470] [ 4599(1184): 4603(1185)] Notified of signal 11 D0318 16:20:35.078332 355572 task_signals.go:220] [ 4599(1184): 4603(1185)] Signal 11: delivering to handler D0318 16:20:35.079309 355572 task_exit.go:204] [ 4597( 721): 4597( 721)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.079466 355572 task_signals.go:204] [ 4597( 721): 4602( 722)] Signal 9, PID: 4597, TID: 4602, fault addr: 0x0: terminating thread group D0318 16:20:35.079895 355572 task_exit.go:204] [ 4597( 721): 4597( 721)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.079926 355572 usertrap_amd64.go:212] [ 4599(1184): 4599(1184)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:35.079973 355572 task_exit.go:204] [ 4597( 721): 4602( 722)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.079976 355572 usertrap_amd64.go:122] [ 4599(1184): 4599(1184)] Allocate a new trap: 0xc0078f6300 43 D0318 16:20:35.080143 355572 usertrap_amd64.go:225] [ 4599(1184): 4599(1184)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.083684 355572 task_signals.go:204] [ 4599(1184): 4603(1185)] Signal 9, PID: 4599, TID: 4603, fault addr: 0x0: terminating thread group D0318 16:20:35.083805 355572 usertrap_amd64.go:212] [ 4601( 59): 4601( 59)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.083820 355572 task_exit.go:204] [ 4599(1184): 4603(1185)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.083885 355572 usertrap_amd64.go:122] [ 4601( 59): 4601( 59)] Allocate a new trap: 0xc000bce990 38 D0318 16:20:35.084023 355572 usertrap_amd64.go:225] [ 4601( 59): 4601( 59)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.084079 355572 task_exit.go:204] [ 4599(1184): 4599(1184)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.084885 355572 task_exit.go:204] [ 4599(1184): 4603(1185)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.084956 355572 task_exit.go:204] [ 4599(1184): 4603(1185)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.085669 355572 task_exit.go:204] [ 4597( 721): 4602( 722)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.085739 355572 task_exit.go:204] [ 4597( 721): 4602( 722)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.085856 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.086043 355572 task_exit.go:204] [ 4597( 721): 4597( 721)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: r0 = shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) shmdt(0x0) shmat(0x0, &(0x7f0000ff0000/0x10000)=nil, 0x0) shmdt(r0) D0318 16:20:35.090133 355572 task_exit.go:204] [ 4599(1184): 4599(1184)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.090235 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:35.091203 355572 task_exit.go:204] [ 4599(1184): 4599(1184)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, 0x99) D0318 16:20:35.093407 355572 usertrap_amd64.go:212] [ 4601( 59): 4601( 59)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.093475 355572 usertrap_amd64.go:122] [ 4601( 59): 4601( 59)] Allocate a new trap: 0xc000bce990 39 D0318 16:20:35.093603 355572 usertrap_amd64.go:225] [ 4601( 59): 4601( 59)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.095134 355572 usertrap_amd64.go:212] [ 4601( 59): 4601( 59)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.095149 355572 usertrap_amd64.go:212] [ 4604(1145): 4604(1145)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.095196 355572 usertrap_amd64.go:122] [ 4601( 59): 4601( 59)] Allocate a new trap: 0xc000bce990 40 D0318 16:20:35.095285 355572 usertrap_amd64.go:122] [ 4604(1145): 4604(1145)] Allocate a new trap: 0xc0008f2330 37 D0318 16:20:35.095292 355572 usertrap_amd64.go:225] [ 4601( 59): 4601( 59)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.095661 355572 usertrap_amd64.go:212] [ 4601( 59): 4605( 60)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.095824 355572 usertrap_amd64.go:122] [ 4601( 59): 4605( 60)] Allocate a new trap: 0xc000bce990 41 D0318 16:20:35.096041 355572 usertrap_amd64.go:225] [ 4601( 59): 4605( 60)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.096103 355572 usertrap_amd64.go:225] [ 4604(1145): 4604(1145)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.097896 355572 usertrap_amd64.go:212] [ 4601( 59): 4605( 60)] Found the pattern at ip 55e9c276bae8:sysno 1 D0318 16:20:35.097980 355572 usertrap_amd64.go:122] [ 4601( 59): 4605( 60)] Allocate a new trap: 0xc000bce990 42 D0318 16:20:35.098108 355572 usertrap_amd64.go:225] [ 4601( 59): 4605( 60)] Apply the binary patch addr 55e9c276bae8 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.099666 355572 usertrap_amd64.go:212] [ 4604(1145): 4604(1145)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.099778 355572 usertrap_amd64.go:122] [ 4604(1145): 4604(1145)] Allocate a new trap: 0xc0008f2330 38 D0318 16:20:35.099877 355572 usertrap_amd64.go:225] [ 4604(1145): 4604(1145)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.102006 355572 usertrap_amd64.go:212] [ 4601( 59): 4601( 59)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.102135 355572 usertrap_amd64.go:122] [ 4601( 59): 4601( 59)] Allocate a new trap: 0xc000bce990 43 D0318 16:20:35.102268 355572 usertrap_amd64.go:225] [ 4601( 59): 4601( 59)] Apply the binary patch addr 55e9c276bc93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 16:20:35.107915 355572 task_exit.go:204] [ 4601( 59): 4601( 59)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.108663 355572 task_exit.go:204] [ 4601( 59): 4601( 59)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.109922 355572 task_signals.go:204] [ 4601( 59): 4605( 60)] Signal 9, PID: 4601, TID: 4605, fault addr: 0x0: terminating thread group D0318 16:20:35.110070 355572 task_exit.go:204] [ 4601( 59): 4605( 60)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.115575 355572 usertrap_amd64.go:212] [ 4604(1145): 4604(1145)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.115744 355572 usertrap_amd64.go:122] [ 4604(1145): 4604(1145)] Allocate a new trap: 0xc0008f2330 39 D0318 16:20:35.115830 355572 usertrap_amd64.go:225] [ 4604(1145): 4604(1145)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.116866 355572 usertrap_amd64.go:212] [ 4606( 723): 4606( 723)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.117023 355572 usertrap_amd64.go:122] [ 4606( 723): 4606( 723)] Allocate a new trap: 0xc0008f2360 37 D0318 16:20:35.117777 355572 task_exit.go:204] [ 4601( 59): 4605( 60)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.117813 355572 usertrap_amd64.go:225] [ 4606( 723): 4606( 723)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.117903 355572 task_exit.go:204] [ 4601( 59): 4605( 60)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.118064 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.118202 355572 task_exit.go:204] [ 4601( 59): 4601( 59)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: r0 = semget$private(0x0, 0x5, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:35.120944 355572 usertrap_amd64.go:212] [ 4607(1186): 4607(1186)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:35.121079 355572 usertrap_amd64.go:122] [ 4607(1186): 4607(1186)] Allocate a new trap: 0xc000b76510 37 D0318 16:20:35.121817 355572 usertrap_amd64.go:225] [ 4607(1186): 4607(1186)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.122110 355572 usertrap_amd64.go:212] [ 4606( 723): 4606( 723)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.122175 355572 usertrap_amd64.go:122] [ 4606( 723): 4606( 723)] Allocate a new trap: 0xc0008f2360 38 D0318 16:20:35.122282 355572 usertrap_amd64.go:225] [ 4606( 723): 4606( 723)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.132115 355572 usertrap_amd64.go:212] [ 4607(1186): 4607(1186)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:35.132223 355572 usertrap_amd64.go:122] [ 4607(1186): 4607(1186)] Allocate a new trap: 0xc000b76510 38 D0318 16:20:35.132296 355572 usertrap_amd64.go:225] [ 4607(1186): 4607(1186)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.132343 355572 usertrap_amd64.go:212] [ 4604(1145): 4604(1145)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.132388 355572 usertrap_amd64.go:122] [ 4604(1145): 4604(1145)] Allocate a new trap: 0xc0008f2330 40 D0318 16:20:35.132459 355572 usertrap_amd64.go:225] [ 4604(1145): 4604(1145)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.133737 355572 usertrap_amd64.go:212] [ 4604(1145): 4604(1145)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.133803 355572 usertrap_amd64.go:122] [ 4604(1145): 4604(1145)] Allocate a new trap: 0xc0008f2330 41 D0318 16:20:35.133910 355572 usertrap_amd64.go:225] [ 4604(1145): 4604(1145)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.134757 355572 usertrap_amd64.go:212] [ 4604(1145): 4608(1146)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.134887 355572 usertrap_amd64.go:122] [ 4604(1145): 4608(1146)] Allocate a new trap: 0xc0008f2330 42 D0318 16:20:35.135049 355572 usertrap_amd64.go:225] [ 4604(1145): 4608(1146)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.136709 355572 usertrap_amd64.go:212] [ 4604(1145): 4604(1145)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.136847 355572 usertrap_amd64.go:122] [ 4604(1145): 4604(1145)] Allocate a new trap: 0xc0008f2330 43 D0318 16:20:35.136986 355572 usertrap_amd64.go:225] [ 4604(1145): 4604(1145)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.139539 355572 usertrap_amd64.go:212] [ 4606( 723): 4606( 723)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.139644 355572 usertrap_amd64.go:122] [ 4606( 723): 4606( 723)] Allocate a new trap: 0xc0008f2360 39 D0318 16:20:35.139715 355572 usertrap_amd64.go:225] [ 4606( 723): 4606( 723)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.142786 355572 task_exit.go:204] [ 4604(1145): 4604(1145)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.143475 355572 task_signals.go:204] [ 4604(1145): 4608(1146)] Signal 9, PID: 4604, TID: 4608, fault addr: 0x0: terminating thread group D0318 16:20:35.143688 355572 task_exit.go:204] [ 4604(1145): 4608(1146)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.144014 355572 task_exit.go:204] [ 4604(1145): 4604(1145)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.147295 355572 usertrap_amd64.go:212] [ 4606( 723): 4606( 723)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.147409 355572 usertrap_amd64.go:122] [ 4606( 723): 4606( 723)] Allocate a new trap: 0xc0008f2360 40 D0318 16:20:35.147560 355572 usertrap_amd64.go:225] [ 4606( 723): 4606( 723)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.147950 355572 task_exit.go:204] [ 4604(1145): 4608(1146)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.148008 355572 task_exit.go:204] [ 4604(1145): 4608(1146)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.148104 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.149744 355572 task_exit.go:204] [ 4604(1145): 4604(1145)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.149927 355572 usertrap_amd64.go:212] [ 4607(1186): 4607(1186)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:35.149996 355572 usertrap_amd64.go:212] [ 4606( 723): 4606( 723)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.150051 355572 usertrap_amd64.go:122] [ 4606( 723): 4606( 723)] Allocate a new trap: 0xc0008f2360 41 D0318 16:20:35.150160 355572 usertrap_amd64.go:225] [ 4606( 723): 4606( 723)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.150011 355572 usertrap_amd64.go:122] [ 4607(1186): 4607(1186)] Allocate a new trap: 0xc000b76510 39 D0318 16:20:35.150356 355572 usertrap_amd64.go:225] [ 4607(1186): 4607(1186)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.151008 355572 usertrap_amd64.go:212] [ 4606( 723): 4610( 724)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.151140 355572 usertrap_amd64.go:122] [ 4606( 723): 4610( 724)] Allocate a new trap: 0xc0008f2360 42 D0318 16:20:35.151245 355572 usertrap_amd64.go:225] [ 4606( 723): 4610( 724)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) 16:20:35 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000006600)='.pending_reads\x00', 0x4841, 0x0) getpeername$inet6(r0, 0x0, 0x0) D0318 16:20:35.152479 355572 usertrap_amd64.go:212] [ 4609( 61): 4609( 61)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.152608 355572 usertrap_amd64.go:122] [ 4609( 61): 4609( 61)] Allocate a new trap: 0xc000e1c780 36 D0318 16:20:35.153211 355572 usertrap_amd64.go:225] [ 4609( 61): 4609( 61)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.155263 355572 usertrap_amd64.go:212] [ 4606( 723): 4606( 723)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.155347 355572 usertrap_amd64.go:122] [ 4606( 723): 4606( 723)] Allocate a new trap: 0xc0008f2360 43 D0318 16:20:35.155463 355572 usertrap_amd64.go:225] [ 4606( 723): 4606( 723)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.156282 355572 usertrap_amd64.go:212] [ 4609( 61): 4609( 61)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.156336 355572 usertrap_amd64.go:122] [ 4609( 61): 4609( 61)] Allocate a new trap: 0xc000e1c780 37 D0318 16:20:35.156471 355572 usertrap_amd64.go:225] [ 4609( 61): 4609( 61)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.159225 355572 usertrap_amd64.go:212] [ 4607(1186): 4607(1186)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:35.159302 355572 usertrap_amd64.go:122] [ 4607(1186): 4607(1186)] Allocate a new trap: 0xc000b76510 40 D0318 16:20:35.159407 355572 usertrap_amd64.go:225] [ 4607(1186): 4607(1186)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.160820 355572 task_signals.go:204] [ 4606( 723): 4610( 724)] Signal 9, PID: 4606, TID: 4610, fault addr: 0x0: terminating thread group D0318 16:20:35.160987 355572 usertrap_amd64.go:212] [ 4607(1186): 4607(1186)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:35.161046 355572 usertrap_amd64.go:122] [ 4607(1186): 4607(1186)] Allocate a new trap: 0xc000b76510 41 D0318 16:20:35.161119 355572 usertrap_amd64.go:225] [ 4607(1186): 4607(1186)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.161303 355572 task_exit.go:204] [ 4606( 723): 4606( 723)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.161588 355572 usertrap_amd64.go:212] [ 4607(1186): 4611(1187)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:35.161696 355572 usertrap_amd64.go:122] [ 4607(1186): 4611(1187)] Allocate a new trap: 0xc000b76510 42 D0318 16:20:35.161567 355572 task_exit.go:204] [ 4606( 723): 4610( 724)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.161781 355572 usertrap_amd64.go:225] [ 4607(1186): 4611(1187)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.162689 355572 task_exit.go:204] [ 4606( 723): 4610( 724)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.162754 355572 task_exit.go:204] [ 4606( 723): 4610( 724)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.168800 355572 task_exit.go:204] [ 4606( 723): 4606( 723)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.168931 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.169257 355572 task_exit.go:204] [ 4606( 723): 4606( 723)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000003c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timerfd_gettime(r0, &(0x7f0000000000)) D0318 16:20:35.172181 355572 usertrap_amd64.go:212] [ 4609( 61): 4609( 61)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.172304 355572 usertrap_amd64.go:122] [ 4609( 61): 4609( 61)] Allocate a new trap: 0xc000e1c780 38 D0318 16:20:35.172365 355572 usertrap_amd64.go:225] [ 4609( 61): 4609( 61)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.177906 355572 usertrap_amd64.go:212] [ 4612(1147): 4612(1147)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.178061 355572 usertrap_amd64.go:122] [ 4612(1147): 4612(1147)] Allocate a new trap: 0xc000976780 37 D0318 16:20:35.178707 355572 usertrap_amd64.go:225] [ 4612(1147): 4612(1147)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.181503 355572 usertrap_amd64.go:212] [ 4609( 61): 4609( 61)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.181574 355572 usertrap_amd64.go:122] [ 4609( 61): 4609( 61)] Allocate a new trap: 0xc000e1c780 39 D0318 16:20:35.181648 355572 usertrap_amd64.go:225] [ 4609( 61): 4609( 61)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.182133 355572 usertrap_amd64.go:212] [ 4612(1147): 4612(1147)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.182188 355572 usertrap_amd64.go:122] [ 4612(1147): 4612(1147)] Allocate a new trap: 0xc000976780 38 D0318 16:20:35.182242 355572 usertrap_amd64.go:225] [ 4612(1147): 4612(1147)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.183080 355572 usertrap_amd64.go:212] [ 4609( 61): 4609( 61)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.183182 355572 usertrap_amd64.go:122] [ 4609( 61): 4609( 61)] Allocate a new trap: 0xc000e1c780 40 D0318 16:20:35.183245 355572 usertrap_amd64.go:225] [ 4609( 61): 4609( 61)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.183644 355572 usertrap_amd64.go:212] [ 4609( 61): 4613( 62)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.183739 355572 usertrap_amd64.go:122] [ 4609( 61): 4613( 62)] Allocate a new trap: 0xc000e1c780 41 D0318 16:20:35.183904 355572 usertrap_amd64.go:225] [ 4609( 61): 4613( 62)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.185062 355572 task_signals.go:309] [ 4609( 61): 4613( 62)] failed to restore from a signal frame: bad address D0318 16:20:35.185170 355572 task_signals.go:470] [ 4609( 61): 4613( 62)] Notified of signal 11 D0318 16:20:35.185236 355572 task_signals.go:220] [ 4609( 61): 4613( 62)] Signal 11: delivering to handler D0318 16:20:35.187752 355572 usertrap_amd64.go:212] [ 4609( 61): 4609( 61)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.187832 355572 usertrap_amd64.go:122] [ 4609( 61): 4609( 61)] Allocate a new trap: 0xc000e1c780 42 D0318 16:20:35.187915 355572 usertrap_amd64.go:225] [ 4609( 61): 4609( 61)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.192462 355572 task_exit.go:204] [ 4609( 61): 4609( 61)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.193233 355572 task_signals.go:204] [ 4609( 61): 4613( 62)] Signal 9, PID: 4609, TID: 4613, fault addr: 0x0: terminating thread group D0318 16:20:35.193242 355572 task_exit.go:204] [ 4609( 61): 4609( 61)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.193559 355572 task_exit.go:204] [ 4609( 61): 4613( 62)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.194337 355572 usertrap_amd64.go:212] [ 4612(1147): 4612(1147)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.194437 355572 usertrap_amd64.go:122] [ 4612(1147): 4612(1147)] Allocate a new trap: 0xc000976780 39 D0318 16:20:35.194546 355572 usertrap_amd64.go:225] [ 4612(1147): 4612(1147)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.198639 355572 task_exit.go:204] [ 4609( 61): 4613( 62)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.198721 355572 task_exit.go:204] [ 4609( 61): 4613( 62)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.198842 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.199156 355572 task_exit.go:204] [ 4609( 61): 4609( 61)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.199461 355572 usertrap_amd64.go:212] [ 4614( 725): 4614( 725)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.199579 355572 usertrap_amd64.go:122] [ 4614( 725): 4614( 725)] Allocate a new trap: 0xc000976810 37 D0318 16:20:35.200318 355572 usertrap_amd64.go:225] [ 4614( 725): 4614( 725)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) 16:20:35 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0xe0, 0x0, 0x0, 0x0, 0x2000000}}}}}, 0x0) D0318 16:20:35.202180 355572 usertrap_amd64.go:212] [ 4612(1147): 4612(1147)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.202280 355572 usertrap_amd64.go:122] [ 4612(1147): 4612(1147)] Allocate a new trap: 0xc000976780 40 D0318 16:20:35.202365 355572 usertrap_amd64.go:225] [ 4612(1147): 4612(1147)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.203529 355572 usertrap_amd64.go:212] [ 4614( 725): 4614( 725)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.203676 355572 usertrap_amd64.go:122] [ 4614( 725): 4614( 725)] Allocate a new trap: 0xc000976810 38 D0318 16:20:35.203759 355572 usertrap_amd64.go:225] [ 4614( 725): 4614( 725)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.203862 355572 usertrap_amd64.go:212] [ 4612(1147): 4612(1147)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.203967 355572 usertrap_amd64.go:122] [ 4612(1147): 4612(1147)] Allocate a new trap: 0xc000976780 41 D0318 16:20:35.204073 355572 usertrap_amd64.go:225] [ 4612(1147): 4612(1147)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.204303 355572 usertrap_amd64.go:212] [ 4612(1147): 4615(1148)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.204381 355572 usertrap_amd64.go:122] [ 4612(1147): 4615(1148)] Allocate a new trap: 0xc000976780 42 D0318 16:20:35.204449 355572 usertrap_amd64.go:225] [ 4612(1147): 4615(1148)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.206327 355572 usertrap_amd64.go:212] [ 4612(1147): 4612(1147)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.206436 355572 usertrap_amd64.go:122] [ 4612(1147): 4612(1147)] Allocate a new trap: 0xc000976780 43 D0318 16:20:35.206502 355572 usertrap_amd64.go:225] [ 4612(1147): 4612(1147)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.210982 355572 task_exit.go:204] [ 4612(1147): 4612(1147)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.211223 355572 task_signals.go:204] [ 4612(1147): 4615(1148)] Signal 9, PID: 4612, TID: 4615, fault addr: 0x0: terminating thread group D0318 16:20:35.211694 355572 task_exit.go:204] [ 4612(1147): 4612(1147)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.211978 355572 task_exit.go:204] [ 4612(1147): 4615(1148)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.214136 355572 usertrap_amd64.go:212] [ 4607(1186): 4607(1186)] Found the pattern at ip 55ec958df1ae:sysno 230 D0318 16:20:35.214214 355572 usertrap_amd64.go:122] [ 4607(1186): 4607(1186)] Allocate a new trap: 0xc000b76510 43 D0318 16:20:35.214348 355572 usertrap_amd64.go:225] [ 4607(1186): 4607(1186)] Apply the binary patch addr 55ec958df1ae trap addr 66d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.217141 355572 task_exit.go:204] [ 4612(1147): 4615(1148)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.217223 355572 task_exit.go:204] [ 4612(1147): 4615(1148)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.217319 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.217467 355572 task_exit.go:204] [ 4612(1147): 4612(1147)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.217538 355572 usertrap_amd64.go:212] [ 4614( 725): 4614( 725)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.217589 355572 usertrap_amd64.go:122] [ 4614( 725): 4614( 725)] Allocate a new trap: 0xc000976810 39 D0318 16:20:35.217709 355572 usertrap_amd64.go:225] [ 4614( 725): 4614( 725)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) 16:20:35 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:35.224099 355572 usertrap_amd64.go:212] [ 4614( 725): 4614( 725)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.224158 355572 usertrap_amd64.go:122] [ 4614( 725): 4614( 725)] Allocate a new trap: 0xc000976810 40 D0318 16:20:35.224211 355572 usertrap_amd64.go:225] [ 4614( 725): 4614( 725)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.225533 355572 usertrap_amd64.go:212] [ 4614( 725): 4614( 725)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.225642 355572 usertrap_amd64.go:122] [ 4614( 725): 4614( 725)] Allocate a new trap: 0xc000976810 41 D0318 16:20:35.225761 355572 usertrap_amd64.go:225] [ 4614( 725): 4614( 725)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.226161 355572 usertrap_amd64.go:212] [ 4614( 725): 4617( 726)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.226240 355572 usertrap_amd64.go:122] [ 4614( 725): 4617( 726)] Allocate a new trap: 0xc000976810 42 D0318 16:20:35.226344 355572 usertrap_amd64.go:225] [ 4614( 725): 4617( 726)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.227236 355572 usertrap_amd64.go:212] [ 4616( 63): 4616( 63)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.227323 355572 usertrap_amd64.go:122] [ 4616( 63): 4616( 63)] Allocate a new trap: 0xc0002d2c90 36 D0318 16:20:35.227887 355572 usertrap_amd64.go:225] [ 4616( 63): 4616( 63)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.229178 355572 usertrap_amd64.go:212] [ 4614( 725): 4614( 725)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.229234 355572 usertrap_amd64.go:122] [ 4614( 725): 4614( 725)] Allocate a new trap: 0xc000976810 43 D0318 16:20:35.229306 355572 usertrap_amd64.go:225] [ 4614( 725): 4614( 725)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.233239 355572 task_signals.go:204] [ 4614( 725): 4617( 726)] Signal 9, PID: 4614, TID: 4617, fault addr: 0x0: terminating thread group D0318 16:20:35.233409 355572 task_exit.go:204] [ 4614( 725): 4617( 726)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.234030 355572 task_exit.go:204] [ 4614( 725): 4614( 725)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.234252 355572 task_exit.go:204] [ 4614( 725): 4617( 726)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.234311 355572 task_exit.go:204] [ 4614( 725): 4617( 726)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.235914 355572 usertrap_amd64.go:212] [ 4616( 63): 4616( 63)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.236023 355572 usertrap_amd64.go:122] [ 4616( 63): 4616( 63)] Allocate a new trap: 0xc0002d2c90 37 D0318 16:20:35.236098 355572 usertrap_amd64.go:225] [ 4616( 63): 4616( 63)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.238894 355572 task_exit.go:204] [ 4614( 725): 4614( 725)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.239007 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.239739 355572 task_exit.go:204] [ 4614( 725): 4614( 725)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: prctl$PR_GET_TID_ADDRESS(0x38, &(0x7f0000008640)) D0318 16:20:35.242650 355572 usertrap_amd64.go:212] [ 4618(1149): 4618(1149)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.242761 355572 usertrap_amd64.go:122] [ 4618(1149): 4618(1149)] Allocate a new trap: 0xc00637c600 37 D0318 16:20:35.243367 355572 usertrap_amd64.go:225] [ 4618(1149): 4618(1149)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.246924 355572 usertrap_amd64.go:212] [ 4618(1149): 4618(1149)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.247033 355572 usertrap_amd64.go:122] [ 4618(1149): 4618(1149)] Allocate a new trap: 0xc00637c600 38 D0318 16:20:35.247153 355572 usertrap_amd64.go:225] [ 4618(1149): 4618(1149)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.249895 355572 usertrap_amd64.go:212] [ 4616( 63): 4616( 63)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.249971 355572 usertrap_amd64.go:122] [ 4616( 63): 4616( 63)] Allocate a new trap: 0xc0002d2c90 38 D0318 16:20:35.250050 355572 usertrap_amd64.go:225] [ 4616( 63): 4616( 63)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.256853 355572 usertrap_amd64.go:212] [ 4616( 63): 4616( 63)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.256945 355572 usertrap_amd64.go:122] [ 4616( 63): 4616( 63)] Allocate a new trap: 0xc0002d2c90 39 D0318 16:20:35.257044 355572 usertrap_amd64.go:225] [ 4616( 63): 4616( 63)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.258712 355572 usertrap_amd64.go:212] [ 4616( 63): 4616( 63)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.258749 355572 usertrap_amd64.go:212] [ 4618(1149): 4618(1149)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.258780 355572 usertrap_amd64.go:122] [ 4616( 63): 4616( 63)] Allocate a new trap: 0xc0002d2c90 40 D0318 16:20:35.258829 355572 usertrap_amd64.go:122] [ 4618(1149): 4618(1149)] Allocate a new trap: 0xc00637c600 39 D0318 16:20:35.258882 355572 usertrap_amd64.go:225] [ 4616( 63): 4616( 63)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.258914 355572 usertrap_amd64.go:225] [ 4618(1149): 4618(1149)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.259159 355572 usertrap_amd64.go:212] [ 4616( 63): 4620( 64)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.259223 355572 usertrap_amd64.go:122] [ 4616( 63): 4620( 64)] Allocate a new trap: 0xc0002d2c90 41 D0318 16:20:35.259288 355572 usertrap_amd64.go:225] [ 4616( 63): 4620( 64)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.260401 355572 usertrap_amd64.go:212] [ 4616( 63): 4620( 64)] Found the pattern at ip 55e9c276bae8:sysno 1 D0318 16:20:35.260490 355572 usertrap_amd64.go:122] [ 4616( 63): 4620( 64)] Allocate a new trap: 0xc0002d2c90 42 D0318 16:20:35.260587 355572 usertrap_amd64.go:225] [ 4616( 63): 4620( 64)] Apply the binary patch addr 55e9c276bae8 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.263484 355572 usertrap_amd64.go:212] [ 4616( 63): 4616( 63)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.263566 355572 usertrap_amd64.go:122] [ 4616( 63): 4616( 63)] Allocate a new trap: 0xc0002d2c90 43 D0318 16:20:35.263677 355572 usertrap_amd64.go:225] [ 4616( 63): 4616( 63)] Apply the binary patch addr 55e9c276bc93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 16:20:35.265364 355572 usertrap_amd64.go:212] [ 4618(1149): 4618(1149)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.265454 355572 usertrap_amd64.go:122] [ 4618(1149): 4618(1149)] Allocate a new trap: 0xc00637c600 40 D0318 16:20:35.265522 355572 usertrap_amd64.go:225] [ 4618(1149): 4618(1149)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.266462 355572 usertrap_amd64.go:212] [ 4619( 727): 4619( 727)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.266582 355572 usertrap_amd64.go:122] [ 4619( 727): 4619( 727)] Allocate a new trap: 0xc0009768a0 37 D0318 16:20:35.266711 355572 task_signals.go:204] [ 4616( 63): 4620( 64)] Signal 9, PID: 4616, TID: 4620, fault addr: 0x0: terminating thread group D0318 16:20:35.266802 355572 task_exit.go:204] [ 4616( 63): 4616( 63)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.266942 355572 usertrap_amd64.go:212] [ 4618(1149): 4618(1149)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.266992 355572 usertrap_amd64.go:122] [ 4618(1149): 4618(1149)] Allocate a new trap: 0xc00637c600 41 D0318 16:20:35.267106 355572 usertrap_amd64.go:225] [ 4618(1149): 4618(1149)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.267248 355572 usertrap_amd64.go:225] [ 4619( 727): 4619( 727)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.267398 355572 usertrap_amd64.go:212] [ 4618(1149): 4621(1150)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.267430 355572 task_exit.go:204] [ 4616( 63): 4620( 64)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.267494 355572 usertrap_amd64.go:122] [ 4618(1149): 4621(1150)] Allocate a new trap: 0xc00637c600 42 D0318 16:20:35.267628 355572 task_exit.go:204] [ 4616( 63): 4616( 63)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.267659 355572 usertrap_amd64.go:225] [ 4618(1149): 4621(1150)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.268851 355572 task_signals.go:309] [ 4618(1149): 4621(1150)] failed to restore from a signal frame: bad address D0318 16:20:35.268961 355572 task_signals.go:470] [ 4618(1149): 4621(1150)] Notified of signal 11 D0318 16:20:35.269030 355572 task_signals.go:220] [ 4618(1149): 4621(1150)] Signal 11: delivering to handler D0318 16:20:35.270451 355572 usertrap_amd64.go:212] [ 4619( 727): 4619( 727)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.270593 355572 usertrap_amd64.go:122] [ 4619( 727): 4619( 727)] Allocate a new trap: 0xc0009768a0 38 D0318 16:20:35.270736 355572 usertrap_amd64.go:225] [ 4619( 727): 4619( 727)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.270845 355572 usertrap_amd64.go:212] [ 4618(1149): 4618(1149)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.270927 355572 usertrap_amd64.go:122] [ 4618(1149): 4618(1149)] Allocate a new trap: 0xc00637c600 43 D0318 16:20:35.271012 355572 usertrap_amd64.go:225] [ 4618(1149): 4618(1149)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.272459 355572 task_exit.go:204] [ 4616( 63): 4620( 64)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.272543 355572 task_exit.go:204] [ 4616( 63): 4620( 64)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.272653 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.273664 355572 task_exit.go:204] [ 4616( 63): 4616( 63)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @dev}, 0xc) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x2, 0x0, 0xac141400}}}}}, 0x0) D0318 16:20:35.275041 355572 task_exit.go:204] [ 4618(1149): 4618(1149)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.275264 355572 task_signals.go:204] [ 4618(1149): 4621(1150)] Signal 9, PID: 4618, TID: 4621, fault addr: 0x0: terminating thread group D0318 16:20:35.275723 355572 task_exit.go:204] [ 4618(1149): 4618(1149)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.275919 355572 task_exit.go:204] [ 4618(1149): 4621(1150)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.281407 355572 task_exit.go:204] [ 4618(1149): 4621(1150)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.281488 355572 task_exit.go:204] [ 4618(1149): 4621(1150)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.281589 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.282757 355572 task_exit.go:204] [ 4618(1149): 4618(1149)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 1: execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f00000000c0), 0x0) D0318 16:20:35.285800 355572 usertrap_amd64.go:212] [ 4619( 727): 4619( 727)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.285887 355572 usertrap_amd64.go:122] [ 4619( 727): 4619( 727)] Allocate a new trap: 0xc0009768a0 39 D0318 16:20:35.285960 355572 usertrap_amd64.go:225] [ 4619( 727): 4619( 727)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.299624 355572 usertrap_amd64.go:212] [ 4622( 65): 4622( 65)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.299739 355572 usertrap_amd64.go:122] [ 4622( 65): 4622( 65)] Allocate a new trap: 0xc0057286c0 36 D0318 16:20:35.300408 355572 usertrap_amd64.go:225] [ 4622( 65): 4622( 65)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.300761 355572 usertrap_amd64.go:212] [ 4619( 727): 4619( 727)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.300874 355572 usertrap_amd64.go:122] [ 4619( 727): 4619( 727)] Allocate a new trap: 0xc0009768a0 40 D0318 16:20:35.300948 355572 usertrap_amd64.go:225] [ 4619( 727): 4619( 727)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.302726 355572 usertrap_amd64.go:212] [ 4619( 727): 4619( 727)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.302901 355572 usertrap_amd64.go:122] [ 4619( 727): 4619( 727)] Allocate a new trap: 0xc0009768a0 41 D0318 16:20:35.303072 355572 usertrap_amd64.go:225] [ 4619( 727): 4619( 727)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.303298 355572 usertrap_amd64.go:212] [ 4619( 727): 4624( 728)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.303400 355572 usertrap_amd64.go:122] [ 4619( 727): 4624( 728)] Allocate a new trap: 0xc0009768a0 42 D0318 16:20:35.303511 355572 usertrap_amd64.go:225] [ 4619( 727): 4624( 728)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.362279 355572 usertrap_amd64.go:212] [ 4619( 727): 4619( 727)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.362694 355572 usertrap_amd64.go:122] [ 4619( 727): 4619( 727)] Allocate a new trap: 0xc0009768a0 43 D0318 16:20:35.362881 355572 usertrap_amd64.go:225] [ 4619( 727): 4619( 727)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.363850 355572 usertrap_amd64.go:212] [ 4622( 65): 4622( 65)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.364127 355572 usertrap_amd64.go:122] [ 4622( 65): 4622( 65)] Allocate a new trap: 0xc0057286c0 37 D0318 16:20:35.364304 355572 usertrap_amd64.go:225] [ 4622( 65): 4622( 65)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.367275 355572 usertrap_amd64.go:212] [ 4623(1151): 4623(1151)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.367541 355572 usertrap_amd64.go:122] [ 4623(1151): 4623(1151)] Allocate a new trap: 0xc0008f26f0 37 D0318 16:20:35.368211 355572 usertrap_amd64.go:225] [ 4623(1151): 4623(1151)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.369850 355572 task_exit.go:204] [ 4619( 727): 4619( 727)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.371183 355572 task_exit.go:204] [ 4619( 727): 4619( 727)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.371283 355572 task_signals.go:204] [ 4619( 727): 4624( 728)] Signal 9, PID: 4619, TID: 4624, fault addr: 0x0: terminating thread group D0318 16:20:35.371862 355572 task_exit.go:204] [ 4619( 727): 4624( 728)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.373936 355572 usertrap_amd64.go:212] [ 4623(1151): 4623(1151)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.374037 355572 usertrap_amd64.go:122] [ 4623(1151): 4623(1151)] Allocate a new trap: 0xc0008f26f0 38 D0318 16:20:35.374191 355572 usertrap_amd64.go:225] [ 4623(1151): 4623(1151)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.378415 355572 task_exit.go:204] [ 4619( 727): 4624( 728)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.378510 355572 task_exit.go:204] [ 4619( 727): 4624( 728)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.378813 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.379296 355572 task_exit.go:204] [ 4619( 727): 4619( 727)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.381448 355572 usertrap_amd64.go:212] [ 4622( 65): 4622( 65)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.381543 355572 usertrap_amd64.go:122] [ 4622( 65): 4622( 65)] Allocate a new trap: 0xc0057286c0 38 D0318 16:20:35.381684 355572 usertrap_amd64.go:225] [ 4622( 65): 4622( 65)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) 16:20:35 executing program 2: semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:35.389118 355572 usertrap_amd64.go:212] [ 4622( 65): 4622( 65)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.389237 355572 usertrap_amd64.go:122] [ 4622( 65): 4622( 65)] Allocate a new trap: 0xc0057286c0 39 D0318 16:20:35.389363 355572 usertrap_amd64.go:225] [ 4622( 65): 4622( 65)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.391068 355572 usertrap_amd64.go:212] [ 4622( 65): 4622( 65)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.391188 355572 usertrap_amd64.go:122] [ 4622( 65): 4622( 65)] Allocate a new trap: 0xc0057286c0 40 D0318 16:20:35.391295 355572 usertrap_amd64.go:225] [ 4622( 65): 4622( 65)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.391763 355572 usertrap_amd64.go:212] [ 4622( 65): 4625( 66)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.391851 355572 usertrap_amd64.go:122] [ 4622( 65): 4625( 66)] Allocate a new trap: 0xc0057286c0 41 D0318 16:20:35.391985 355572 usertrap_amd64.go:225] [ 4622( 65): 4625( 66)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.392613 355572 usertrap_amd64.go:212] [ 4623(1151): 4623(1151)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.392691 355572 usertrap_amd64.go:122] [ 4623(1151): 4623(1151)] Allocate a new trap: 0xc0008f26f0 39 D0318 16:20:35.392801 355572 usertrap_amd64.go:225] [ 4623(1151): 4623(1151)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.394678 355572 usertrap_amd64.go:212] [ 4622( 65): 4625( 66)] Found the pattern at ip 55e9c276bae8:sysno 1 D0318 16:20:35.394792 355572 usertrap_amd64.go:122] [ 4622( 65): 4625( 66)] Allocate a new trap: 0xc0057286c0 42 D0318 16:20:35.394894 355572 usertrap_amd64.go:225] [ 4622( 65): 4625( 66)] Apply the binary patch addr 55e9c276bae8 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.399091 355572 usertrap_amd64.go:212] [ 4622( 65): 4622( 65)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.399154 355572 usertrap_amd64.go:122] [ 4622( 65): 4622( 65)] Allocate a new trap: 0xc0057286c0 43 D0318 16:20:35.399230 355572 usertrap_amd64.go:225] [ 4622( 65): 4622( 65)] Apply the binary patch addr 55e9c276bc93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 16:20:35.400446 355572 usertrap_amd64.go:212] [ 4623(1151): 4623(1151)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.400606 355572 usertrap_amd64.go:122] [ 4623(1151): 4623(1151)] Allocate a new trap: 0xc0008f26f0 40 D0318 16:20:35.400689 355572 usertrap_amd64.go:225] [ 4623(1151): 4623(1151)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.402038 355572 task_exit.go:204] [ 4622( 65): 4622( 65)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.402773 355572 task_signals.go:204] [ 4622( 65): 4625( 66)] Signal 9, PID: 4622, TID: 4625, fault addr: 0x0: terminating thread group D0318 16:20:35.403808 355572 task_exit.go:204] [ 4622( 65): 4622( 65)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.403938 355572 usertrap_amd64.go:212] [ 4623(1151): 4623(1151)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.403999 355572 usertrap_amd64.go:122] [ 4623(1151): 4623(1151)] Allocate a new trap: 0xc0008f26f0 41 D0318 16:20:35.404118 355572 usertrap_amd64.go:225] [ 4623(1151): 4623(1151)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.404108 355572 task_exit.go:204] [ 4622( 65): 4625( 66)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.404875 355572 usertrap_amd64.go:212] [ 4623(1151): 4627(1152)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.405077 355572 usertrap_amd64.go:122] [ 4623(1151): 4627(1152)] Allocate a new trap: 0xc0008f26f0 42 D0318 16:20:35.405247 355572 usertrap_amd64.go:225] [ 4623(1151): 4627(1152)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.408982 355572 usertrap_amd64.go:212] [ 4623(1151): 4623(1151)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.409096 355572 usertrap_amd64.go:122] [ 4623(1151): 4623(1151)] Allocate a new trap: 0xc0008f26f0 43 D0318 16:20:35.409203 355572 usertrap_amd64.go:225] [ 4623(1151): 4623(1151)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.410189 355572 task_exit.go:204] [ 4622( 65): 4625( 66)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.410275 355572 task_exit.go:204] [ 4622( 65): 4625( 66)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.410448 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.410719 355572 task_exit.go:204] [ 4622( 65): 4622( 65)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: prctl$PR_GET_TID_ADDRESS(0x1c, &(0x7f0000008640)) D0318 16:20:35.415754 355572 task_exit.go:204] [ 4623(1151): 4623(1151)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.415949 355572 task_signals.go:204] [ 4623(1151): 4627(1152)] Signal 9, PID: 4623, TID: 4627, fault addr: 0x0: terminating thread group D0318 16:20:35.416158 355572 usertrap_amd64.go:212] [ 4626( 729): 4626( 729)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.416284 355572 usertrap_amd64.go:122] [ 4626( 729): 4626( 729)] Allocate a new trap: 0xc0078f6480 37 D0318 16:20:35.416324 355572 task_exit.go:204] [ 4623(1151): 4623(1151)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.416424 355572 task_exit.go:204] [ 4623(1151): 4627(1152)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.416954 355572 usertrap_amd64.go:225] [ 4626( 729): 4626( 729)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.420896 355572 usertrap_amd64.go:212] [ 4626( 729): 4626( 729)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.420970 355572 usertrap_amd64.go:122] [ 4626( 729): 4626( 729)] Allocate a new trap: 0xc0078f6480 38 D0318 16:20:35.421056 355572 usertrap_amd64.go:225] [ 4626( 729): 4626( 729)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.421516 355572 task_exit.go:204] [ 4623(1151): 4627(1152)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.421577 355572 task_exit.go:204] [ 4623(1151): 4627(1152)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.421739 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.423074 355572 task_exit.go:204] [ 4623(1151): 4623(1151)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) D0318 16:20:35.435679 355572 usertrap_amd64.go:212] [ 4626( 729): 4626( 729)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.435825 355572 usertrap_amd64.go:122] [ 4626( 729): 4626( 729)] Allocate a new trap: 0xc0078f6480 39 D0318 16:20:35.435906 355572 usertrap_amd64.go:225] [ 4626( 729): 4626( 729)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.437929 355572 usertrap_amd64.go:212] [ 4628( 67): 4628( 67)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.438042 355572 usertrap_amd64.go:122] [ 4628( 67): 4628( 67)] Allocate a new trap: 0xc0008f2780 36 D0318 16:20:35.438917 355572 usertrap_amd64.go:225] [ 4628( 67): 4628( 67)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.443000 355572 usertrap_amd64.go:212] [ 4626( 729): 4626( 729)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.443095 355572 usertrap_amd64.go:122] [ 4626( 729): 4626( 729)] Allocate a new trap: 0xc0078f6480 40 D0318 16:20:35.443183 355572 usertrap_amd64.go:225] [ 4626( 729): 4626( 729)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.444451 355572 usertrap_amd64.go:212] [ 4626( 729): 4626( 729)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.444531 355572 usertrap_amd64.go:122] [ 4626( 729): 4626( 729)] Allocate a new trap: 0xc0078f6480 41 D0318 16:20:35.444626 355572 usertrap_amd64.go:225] [ 4626( 729): 4626( 729)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.444832 355572 usertrap_amd64.go:212] [ 4626( 729): 4630( 730)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.444909 355572 usertrap_amd64.go:122] [ 4626( 729): 4630( 730)] Allocate a new trap: 0xc0078f6480 42 D0318 16:20:35.445016 355572 usertrap_amd64.go:225] [ 4626( 729): 4630( 730)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.446139 355572 task_signals.go:309] [ 4626( 729): 4630( 730)] failed to restore from a signal frame: bad address D0318 16:20:35.446286 355572 task_signals.go:470] [ 4626( 729): 4630( 730)] Notified of signal 11 D0318 16:20:35.446277 355572 usertrap_amd64.go:212] [ 4628( 67): 4628( 67)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.446476 355572 usertrap_amd64.go:122] [ 4628( 67): 4628( 67)] Allocate a new trap: 0xc0008f2780 37 D0318 16:20:35.446413 355572 task_signals.go:220] [ 4626( 729): 4630( 730)] Signal 11: delivering to handler D0318 16:20:35.446562 355572 usertrap_amd64.go:225] [ 4628( 67): 4628( 67)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.447703 355572 usertrap_amd64.go:212] [ 4626( 729): 4626( 729)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.447774 355572 usertrap_amd64.go:122] [ 4626( 729): 4626( 729)] Allocate a new trap: 0xc0078f6480 43 D0318 16:20:35.447883 355572 usertrap_amd64.go:225] [ 4626( 729): 4626( 729)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.450155 355572 usertrap_amd64.go:212] [ 4629(1153): 4629(1153)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.450263 355572 usertrap_amd64.go:122] [ 4629(1153): 4629(1153)] Allocate a new trap: 0xc0002d2d80 37 D0318 16:20:35.450860 355572 usertrap_amd64.go:225] [ 4629(1153): 4629(1153)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.452456 355572 task_exit.go:204] [ 4626( 729): 4626( 729)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.452736 355572 task_signals.go:204] [ 4626( 729): 4630( 730)] Signal 9, PID: 4626, TID: 4630, fault addr: 0x0: terminating thread group D0318 16:20:35.453299 355572 task_exit.go:204] [ 4626( 729): 4630( 730)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.453516 355572 task_exit.go:204] [ 4626( 729): 4626( 729)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.453601 355572 usertrap_amd64.go:212] [ 4629(1153): 4629(1153)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.453687 355572 usertrap_amd64.go:122] [ 4629(1153): 4629(1153)] Allocate a new trap: 0xc0002d2d80 38 D0318 16:20:35.453758 355572 usertrap_amd64.go:225] [ 4629(1153): 4629(1153)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.458791 355572 task_exit.go:204] [ 4626( 729): 4630( 730)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.458948 355572 task_exit.go:204] [ 4626( 729): 4630( 730)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.459200 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.459675 355572 task_exit.go:204] [ 4626( 729): 4626( 729)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: syz_emit_ethernet(0x20001836, &(0x7f0000001800)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x14}}}}}, 0x0) D0318 16:20:35.467972 355572 usertrap_amd64.go:212] [ 4628( 67): 4628( 67)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.468050 355572 usertrap_amd64.go:122] [ 4628( 67): 4628( 67)] Allocate a new trap: 0xc0008f2780 38 D0318 16:20:35.468106 355572 usertrap_amd64.go:225] [ 4628( 67): 4628( 67)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.469029 355572 usertrap_amd64.go:212] [ 4629(1153): 4629(1153)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.469108 355572 usertrap_amd64.go:122] [ 4629(1153): 4629(1153)] Allocate a new trap: 0xc0002d2d80 39 D0318 16:20:35.469185 355572 usertrap_amd64.go:225] [ 4629(1153): 4629(1153)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.474786 355572 usertrap_amd64.go:212] [ 4628( 67): 4628( 67)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.474861 355572 usertrap_amd64.go:122] [ 4628( 67): 4628( 67)] Allocate a new trap: 0xc0008f2780 39 D0318 16:20:35.474952 355572 usertrap_amd64.go:225] [ 4628( 67): 4628( 67)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.476809 355572 usertrap_amd64.go:212] [ 4628( 67): 4628( 67)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.476876 355572 usertrap_amd64.go:122] [ 4628( 67): 4628( 67)] Allocate a new trap: 0xc0008f2780 40 D0318 16:20:35.476952 355572 usertrap_amd64.go:225] [ 4628( 67): 4628( 67)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.477004 355572 usertrap_amd64.go:212] [ 4629(1153): 4629(1153)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.477105 355572 usertrap_amd64.go:122] [ 4629(1153): 4629(1153)] Allocate a new trap: 0xc0002d2d80 40 D0318 16:20:35.477218 355572 usertrap_amd64.go:225] [ 4629(1153): 4629(1153)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.477281 355572 usertrap_amd64.go:212] [ 4628( 67): 4632( 68)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.477427 355572 usertrap_amd64.go:122] [ 4628( 67): 4632( 68)] Allocate a new trap: 0xc0008f2780 41 D0318 16:20:35.477510 355572 usertrap_amd64.go:225] [ 4628( 67): 4632( 68)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.478541 355572 usertrap_amd64.go:212] [ 4628( 67): 4628( 67)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.478620 355572 usertrap_amd64.go:122] [ 4628( 67): 4628( 67)] Allocate a new trap: 0xc0008f2780 42 D0318 16:20:35.478674 355572 usertrap_amd64.go:225] [ 4628( 67): 4628( 67)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.478734 355572 usertrap_amd64.go:212] [ 4629(1153): 4629(1153)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.478797 355572 usertrap_amd64.go:122] [ 4629(1153): 4629(1153)] Allocate a new trap: 0xc0002d2d80 41 D0318 16:20:35.478886 355572 usertrap_amd64.go:225] [ 4629(1153): 4629(1153)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.479335 355572 usertrap_amd64.go:212] [ 4629(1153): 4633(1154)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.479414 355572 usertrap_amd64.go:122] [ 4629(1153): 4633(1154)] Allocate a new trap: 0xc0002d2d80 42 D0318 16:20:35.479496 355572 usertrap_amd64.go:225] [ 4629(1153): 4633(1154)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.481738 355572 usertrap_amd64.go:212] [ 4629(1153): 4629(1153)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.481799 355572 usertrap_amd64.go:122] [ 4629(1153): 4629(1153)] Allocate a new trap: 0xc0002d2d80 43 D0318 16:20:35.481854 355572 usertrap_amd64.go:225] [ 4629(1153): 4629(1153)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.482533 355572 task_exit.go:204] [ 4628( 67): 4628( 67)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.482711 355572 task_signals.go:204] [ 4628( 67): 4632( 68)] Signal 9, PID: 4628, TID: 4632, fault addr: 0x0: terminating thread group D0318 16:20:35.482820 355572 task_exit.go:204] [ 4628( 67): 4632( 68)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.483381 355572 task_exit.go:204] [ 4628( 67): 4628( 67)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.486910 355572 usertrap_amd64.go:212] [ 4631( 731): 4631( 731)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.486983 355572 usertrap_amd64.go:122] [ 4631( 731): 4631( 731)] Allocate a new trap: 0xc00637c660 37 D0318 16:20:35.487722 355572 usertrap_amd64.go:225] [ 4631( 731): 4631( 731)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.488122 355572 task_exit.go:204] [ 4628( 67): 4632( 68)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.488242 355572 task_exit.go:204] [ 4628( 67): 4632( 68)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.488398 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.488667 355572 task_exit.go:204] [ 4628( 67): 4628( 67)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:35.492433 355572 usertrap_amd64.go:212] [ 4631( 731): 4631( 731)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.492499 355572 usertrap_amd64.go:122] [ 4631( 731): 4631( 731)] Allocate a new trap: 0xc00637c660 38 D0318 16:20:35.492558 355572 usertrap_amd64.go:225] [ 4631( 731): 4631( 731)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.500221 355572 task_exit.go:204] [ 4629(1153): 4629(1153)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.500496 355572 task_signals.go:204] [ 4629(1153): 4633(1154)] Signal 9, PID: 4629, TID: 4633, fault addr: 0x0: terminating thread group D0318 16:20:35.501046 355572 task_exit.go:204] [ 4629(1153): 4633(1154)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.501507 355572 task_exit.go:204] [ 4629(1153): 4629(1153)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.507048 355572 task_exit.go:204] [ 4629(1153): 4633(1154)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.507164 355572 task_exit.go:204] [ 4629(1153): 4633(1154)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.507259 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.507529 355572 usertrap_amd64.go:212] [ 4631( 731): 4631( 731)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.507595 355572 usertrap_amd64.go:122] [ 4631( 731): 4631( 731)] Allocate a new trap: 0xc00637c660 39 D0318 16:20:35.507719 355572 usertrap_amd64.go:225] [ 4631( 731): 4631( 731)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.508542 355572 task_exit.go:204] [ 4629(1153): 4629(1153)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f0000006600)='.pending_reads\x00', 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000001100)='.pending_reads\x00', 0x0, 0x0) D0318 16:20:35.514901 355572 usertrap_amd64.go:212] [ 4634( 69): 4634( 69)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.515072 355572 usertrap_amd64.go:122] [ 4634( 69): 4634( 69)] Allocate a new trap: 0xc00637c690 36 D0318 16:20:35.515686 355572 usertrap_amd64.go:212] [ 4631( 731): 4631( 731)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.515740 355572 usertrap_amd64.go:122] [ 4631( 731): 4631( 731)] Allocate a new trap: 0xc00637c660 40 D0318 16:20:35.515713 355572 usertrap_amd64.go:225] [ 4634( 69): 4634( 69)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.515789 355572 usertrap_amd64.go:225] [ 4631( 731): 4631( 731)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.517236 355572 usertrap_amd64.go:212] [ 4631( 731): 4631( 731)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.517334 355572 usertrap_amd64.go:122] [ 4631( 731): 4631( 731)] Allocate a new trap: 0xc00637c660 41 D0318 16:20:35.517443 355572 usertrap_amd64.go:225] [ 4631( 731): 4631( 731)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.517753 355572 usertrap_amd64.go:212] [ 4631( 731): 4635( 732)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.517849 355572 usertrap_amd64.go:122] [ 4631( 731): 4635( 732)] Allocate a new trap: 0xc00637c660 42 D0318 16:20:35.517934 355572 usertrap_amd64.go:225] [ 4631( 731): 4635( 732)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.519086 355572 usertrap_amd64.go:212] [ 4631( 731): 4635( 732)] Found the pattern at ip 55ca2d8e4ae8:sysno 1 D0318 16:20:35.519152 355572 usertrap_amd64.go:122] [ 4631( 731): 4635( 732)] Allocate a new trap: 0xc00637c660 43 D0318 16:20:35.519215 355572 usertrap_amd64.go:225] [ 4631( 731): 4635( 732)] Apply the binary patch addr 55ca2d8e4ae8 trap addr 6ad70 ([184 1 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.519978 355572 usertrap_amd64.go:212] [ 4634( 69): 4634( 69)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.520111 355572 usertrap_amd64.go:122] [ 4634( 69): 4634( 69)] Allocate a new trap: 0xc00637c690 37 D0318 16:20:35.520212 355572 usertrap_amd64.go:225] [ 4634( 69): 4634( 69)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.522055 355572 usertrap_amd64.go:212] [ 4631( 731): 4631( 731)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.522112 355572 usertrap_amd64.go:122] [ 4631( 731): 4631( 731)] Allocate a new trap: 0xc00637c660 44 D0318 16:20:35.522185 355572 usertrap_amd64.go:225] [ 4631( 731): 4631( 731)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6adc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0318 16:20:35.524096 355572 task_exit.go:204] [ 4631( 731): 4631( 731)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.524646 355572 task_signals.go:204] [ 4631( 731): 4635( 732)] Signal 9, PID: 4631, TID: 4635, fault addr: 0x0: terminating thread group D0318 16:20:35.524773 355572 task_exit.go:204] [ 4631( 731): 4635( 732)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.525022 355572 task_exit.go:204] [ 4631( 731): 4631( 731)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.530818 355572 usertrap_amd64.go:212] [ 4634( 69): 4634( 69)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.530920 355572 usertrap_amd64.go:122] [ 4634( 69): 4634( 69)] Allocate a new trap: 0xc00637c690 38 D0318 16:20:35.531119 355572 usertrap_amd64.go:225] [ 4634( 69): 4634( 69)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.531734 355572 task_exit.go:204] [ 4631( 731): 4635( 732)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.531875 355572 task_exit.go:204] [ 4631( 731): 4635( 732)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.531994 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.532281 355572 task_exit.go:204] [ 4631( 731): 4631( 731)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x3, &(0x7f00000003c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) D0318 16:20:35.537625 355572 usertrap_amd64.go:212] [ 4634( 69): 4634( 69)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.537686 355572 usertrap_amd64.go:122] [ 4634( 69): 4634( 69)] Allocate a new trap: 0xc00637c690 39 D0318 16:20:35.537775 355572 usertrap_amd64.go:225] [ 4634( 69): 4634( 69)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.539136 355572 usertrap_amd64.go:212] [ 4634( 69): 4634( 69)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.539272 355572 usertrap_amd64.go:122] [ 4634( 69): 4634( 69)] Allocate a new trap: 0xc00637c690 40 D0318 16:20:35.539395 355572 usertrap_amd64.go:225] [ 4634( 69): 4634( 69)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.539599 355572 usertrap_amd64.go:212] [ 4634( 69): 4637( 70)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.539728 355572 usertrap_amd64.go:122] [ 4634( 69): 4637( 70)] Allocate a new trap: 0xc00637c690 41 D0318 16:20:35.539874 355572 usertrap_amd64.go:225] [ 4634( 69): 4637( 70)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.540678 355572 usertrap_amd64.go:212] [ 4636(1155): 4636(1155)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.540792 355572 usertrap_amd64.go:122] [ 4636(1155): 4636(1155)] Allocate a new trap: 0xc000bceb40 37 D0318 16:20:35.541212 355572 task_signals.go:309] [ 4634( 69): 4637( 70)] failed to restore from a signal frame: bad address D0318 16:20:35.541345 355572 task_signals.go:470] [ 4634( 69): 4637( 70)] Notified of signal 11 D0318 16:20:35.541417 355572 task_signals.go:220] [ 4634( 69): 4637( 70)] Signal 11: delivering to handler D0318 16:20:35.541463 355572 usertrap_amd64.go:225] [ 4636(1155): 4636(1155)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.542287 355572 usertrap_amd64.go:212] [ 4634( 69): 4634( 69)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.542360 355572 usertrap_amd64.go:122] [ 4634( 69): 4634( 69)] Allocate a new trap: 0xc00637c690 42 D0318 16:20:35.542433 355572 usertrap_amd64.go:225] [ 4634( 69): 4634( 69)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.544238 355572 usertrap_amd64.go:212] [ 4636(1155): 4636(1155)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.544298 355572 usertrap_amd64.go:122] [ 4636(1155): 4636(1155)] Allocate a new trap: 0xc000bceb40 38 D0318 16:20:35.544356 355572 usertrap_amd64.go:225] [ 4636(1155): 4636(1155)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.545106 355572 task_signals.go:204] [ 4634( 69): 4637( 70)] Signal 9, PID: 4634, TID: 4637, fault addr: 0x0: terminating thread group D0318 16:20:35.545167 355572 task_exit.go:204] [ 4634( 69): 4634( 69)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.545334 355572 task_exit.go:204] [ 4634( 69): 4637( 70)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.546026 355572 task_exit.go:204] [ 4634( 69): 4637( 70)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.546087 355572 task_exit.go:204] [ 4634( 69): 4637( 70)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.550796 355572 task_exit.go:204] [ 4634( 69): 4634( 69)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.550880 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.551370 355572 task_exit.go:204] [ 4634( 69): 4634( 69)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x7fe, &(0x7f0000000040)=0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14113e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) ftruncate(r0, 0x7fff) fcntl$setstatus(r0, 0x4, 0x6800) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) D0318 16:20:35.556789 355572 usertrap_amd64.go:212] [ 4636(1155): 4636(1155)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.556896 355572 usertrap_amd64.go:122] [ 4636(1155): 4636(1155)] Allocate a new trap: 0xc000bceb40 39 D0318 16:20:35.556986 355572 usertrap_amd64.go:225] [ 4636(1155): 4636(1155)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.557506 355572 usertrap_amd64.go:212] [ 4638( 733): 4638( 733)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.557600 355572 usertrap_amd64.go:122] [ 4638( 733): 4638( 733)] Allocate a new trap: 0xc0078f6540 37 D0318 16:20:35.558098 355572 usertrap_amd64.go:225] [ 4638( 733): 4638( 733)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.561568 355572 usertrap_amd64.go:212] [ 4638( 733): 4638( 733)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.561656 355572 usertrap_amd64.go:122] [ 4638( 733): 4638( 733)] Allocate a new trap: 0xc0078f6540 38 D0318 16:20:35.561766 355572 usertrap_amd64.go:225] [ 4638( 733): 4638( 733)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.563909 355572 usertrap_amd64.go:212] [ 4636(1155): 4636(1155)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.563992 355572 usertrap_amd64.go:122] [ 4636(1155): 4636(1155)] Allocate a new trap: 0xc000bceb40 40 D0318 16:20:35.564055 355572 usertrap_amd64.go:225] [ 4636(1155): 4636(1155)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.565418 355572 usertrap_amd64.go:212] [ 4636(1155): 4636(1155)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.565489 355572 usertrap_amd64.go:122] [ 4636(1155): 4636(1155)] Allocate a new trap: 0xc000bceb40 41 D0318 16:20:35.565567 355572 usertrap_amd64.go:225] [ 4636(1155): 4636(1155)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.566001 355572 usertrap_amd64.go:212] [ 4636(1155): 4639(1156)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.566212 355572 usertrap_amd64.go:122] [ 4636(1155): 4639(1156)] Allocate a new trap: 0xc000bceb40 42 D0318 16:20:35.566414 355572 usertrap_amd64.go:225] [ 4636(1155): 4639(1156)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.568822 355572 usertrap_amd64.go:212] [ 4636(1155): 4636(1155)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.568887 355572 usertrap_amd64.go:122] [ 4636(1155): 4636(1155)] Allocate a new trap: 0xc000bceb40 43 D0318 16:20:35.568974 355572 usertrap_amd64.go:225] [ 4636(1155): 4636(1155)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.572673 355572 task_exit.go:204] [ 4636(1155): 4636(1155)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.572854 355572 task_signals.go:204] [ 4636(1155): 4639(1156)] Signal 9, PID: 4636, TID: 4639, fault addr: 0x0: terminating thread group D0318 16:20:35.573347 355572 task_exit.go:204] [ 4636(1155): 4636(1155)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.573476 355572 task_exit.go:204] [ 4636(1155): 4639(1156)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.574140 355572 usertrap_amd64.go:212] [ 4638( 733): 4638( 733)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.574198 355572 usertrap_amd64.go:122] [ 4638( 733): 4638( 733)] Allocate a new trap: 0xc0078f6540 39 D0318 16:20:35.574314 355572 usertrap_amd64.go:225] [ 4638( 733): 4638( 733)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.578506 355572 task_exit.go:204] [ 4636(1155): 4639(1156)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.578569 355572 task_exit.go:204] [ 4636(1155): 4639(1156)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.578641 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.579307 355572 task_exit.go:204] [ 4636(1155): 4636(1155)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 1: semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:35.583777 355572 usertrap_amd64.go:212] [ 4640( 71): 4640( 71)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.583884 355572 usertrap_amd64.go:122] [ 4640( 71): 4640( 71)] Allocate a new trap: 0xc000bceba0 36 D0318 16:20:35.584578 355572 usertrap_amd64.go:225] [ 4640( 71): 4640( 71)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.585180 355572 usertrap_amd64.go:212] [ 4638( 733): 4638( 733)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.585246 355572 usertrap_amd64.go:122] [ 4638( 733): 4638( 733)] Allocate a new trap: 0xc0078f6540 40 D0318 16:20:35.585300 355572 usertrap_amd64.go:225] [ 4638( 733): 4638( 733)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.586597 355572 usertrap_amd64.go:212] [ 4638( 733): 4638( 733)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.586659 355572 usertrap_amd64.go:122] [ 4638( 733): 4638( 733)] Allocate a new trap: 0xc0078f6540 41 D0318 16:20:35.586709 355572 usertrap_amd64.go:225] [ 4638( 733): 4638( 733)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.586966 355572 usertrap_amd64.go:212] [ 4638( 733): 4641( 734)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.587053 355572 usertrap_amd64.go:122] [ 4638( 733): 4641( 734)] Allocate a new trap: 0xc0078f6540 42 D0318 16:20:35.587167 355572 usertrap_amd64.go:225] [ 4638( 733): 4641( 734)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.588793 355572 usertrap_amd64.go:212] [ 4640( 71): 4640( 71)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.588917 355572 usertrap_amd64.go:122] [ 4640( 71): 4640( 71)] Allocate a new trap: 0xc000bceba0 37 D0318 16:20:35.589037 355572 usertrap_amd64.go:225] [ 4640( 71): 4640( 71)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.589746 355572 usertrap_amd64.go:212] [ 4638( 733): 4638( 733)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.589855 355572 usertrap_amd64.go:122] [ 4638( 733): 4638( 733)] Allocate a new trap: 0xc0078f6540 43 D0318 16:20:35.589965 355572 usertrap_amd64.go:225] [ 4638( 733): 4638( 733)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.595301 355572 task_signals.go:204] [ 4638( 733): 4641( 734)] Signal 9, PID: 4638, TID: 4641, fault addr: 0x0: terminating thread group D0318 16:20:35.595411 355572 task_exit.go:204] [ 4638( 733): 4641( 734)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.595518 355572 task_exit.go:204] [ 4638( 733): 4638( 733)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.596280 355572 task_exit.go:204] [ 4638( 733): 4638( 733)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.598391 355572 usertrap_amd64.go:212] [ 4640( 71): 4640( 71)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.598511 355572 usertrap_amd64.go:122] [ 4640( 71): 4640( 71)] Allocate a new trap: 0xc000bceba0 38 D0318 16:20:35.598614 355572 usertrap_amd64.go:225] [ 4640( 71): 4640( 71)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.601183 355572 task_exit.go:204] [ 4638( 733): 4641( 734)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.601248 355572 task_exit.go:204] [ 4638( 733): 4641( 734)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.601359 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.601469 355572 task_exit.go:204] [ 4638( 733): 4638( 733)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@link_local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f53a04", 0x30, 0x2b, 0x0, @empty, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "508359", 0x0, 0x0, 0x0, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}}, 0x0) D0318 16:20:35.605923 355572 usertrap_amd64.go:212] [ 4640( 71): 4640( 71)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.606043 355572 usertrap_amd64.go:122] [ 4640( 71): 4640( 71)] Allocate a new trap: 0xc000bceba0 39 D0318 16:20:35.606142 355572 usertrap_amd64.go:225] [ 4640( 71): 4640( 71)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.607369 355572 usertrap_amd64.go:212] [ 4640( 71): 4640( 71)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.607423 355572 usertrap_amd64.go:122] [ 4640( 71): 4640( 71)] Allocate a new trap: 0xc000bceba0 40 D0318 16:20:35.607510 355572 usertrap_amd64.go:225] [ 4640( 71): 4640( 71)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.610061 355572 usertrap_amd64.go:212] [ 4642(1157): 4642(1157)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.610158 355572 usertrap_amd64.go:122] [ 4642(1157): 4642(1157)] Allocate a new trap: 0xc000b76810 37 D0318 16:20:35.610809 355572 usertrap_amd64.go:225] [ 4642(1157): 4642(1157)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.611980 355572 usertrap_amd64.go:212] [ 4640( 71): 4643( 72)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.612040 355572 usertrap_amd64.go:122] [ 4640( 71): 4643( 72)] Allocate a new trap: 0xc000bceba0 41 D0318 16:20:35.612164 355572 usertrap_amd64.go:225] [ 4640( 71): 4643( 72)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.617915 355572 usertrap_amd64.go:212] [ 4640( 71): 4640( 71)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.617987 355572 usertrap_amd64.go:122] [ 4640( 71): 4640( 71)] Allocate a new trap: 0xc000bceba0 42 D0318 16:20:35.618114 355572 usertrap_amd64.go:225] [ 4640( 71): 4640( 71)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.619761 355572 usertrap_amd64.go:212] [ 4642(1157): 4642(1157)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.619866 355572 usertrap_amd64.go:122] [ 4642(1157): 4642(1157)] Allocate a new trap: 0xc000b76810 38 D0318 16:20:35.619966 355572 usertrap_amd64.go:225] [ 4642(1157): 4642(1157)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.621724 355572 task_exit.go:204] [ 4640( 71): 4640( 71)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.621866 355572 task_signals.go:204] [ 4640( 71): 4643( 72)] Signal 9, PID: 4640, TID: 4643, fault addr: 0x0: terminating thread group D0318 16:20:35.622339 355572 task_exit.go:204] [ 4640( 71): 4640( 71)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.622755 355572 task_exit.go:204] [ 4640( 71): 4643( 72)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.627982 355572 task_exit.go:204] [ 4640( 71): 4643( 72)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.628055 355572 task_exit.go:204] [ 4640( 71): 4643( 72)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.628226 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.628427 355572 task_exit.go:204] [ 4640( 71): 4640( 71)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: r0 = getpgrp(0xffffffffffffffff) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x1) D0318 16:20:35.631711 355572 usertrap_amd64.go:212] [ 4644( 735): 4644( 735)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.631829 355572 usertrap_amd64.go:122] [ 4644( 735): 4644( 735)] Allocate a new trap: 0xc0002d2f00 37 D0318 16:20:35.632593 355572 usertrap_amd64.go:225] [ 4644( 735): 4644( 735)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.634114 355572 usertrap_amd64.go:212] [ 4642(1157): 4642(1157)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.634252 355572 usertrap_amd64.go:122] [ 4642(1157): 4642(1157)] Allocate a new trap: 0xc000b76810 39 D0318 16:20:35.634315 355572 usertrap_amd64.go:225] [ 4642(1157): 4642(1157)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.636247 355572 usertrap_amd64.go:212] [ 4644( 735): 4644( 735)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.636309 355572 usertrap_amd64.go:122] [ 4644( 735): 4644( 735)] Allocate a new trap: 0xc0002d2f00 38 D0318 16:20:35.636378 355572 usertrap_amd64.go:225] [ 4644( 735): 4644( 735)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.643276 355572 usertrap_amd64.go:212] [ 4642(1157): 4642(1157)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.643348 355572 usertrap_amd64.go:122] [ 4642(1157): 4642(1157)] Allocate a new trap: 0xc000b76810 40 D0318 16:20:35.643459 355572 usertrap_amd64.go:225] [ 4642(1157): 4642(1157)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.646176 355572 usertrap_amd64.go:212] [ 4642(1157): 4642(1157)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.646253 355572 usertrap_amd64.go:122] [ 4642(1157): 4642(1157)] Allocate a new trap: 0xc000b76810 41 D0318 16:20:35.646340 355572 usertrap_amd64.go:225] [ 4642(1157): 4642(1157)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.646513 355572 usertrap_amd64.go:212] [ 4642(1157): 4645(1158)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.646584 355572 usertrap_amd64.go:122] [ 4642(1157): 4645(1158)] Allocate a new trap: 0xc000b76810 42 D0318 16:20:35.646670 355572 usertrap_amd64.go:225] [ 4642(1157): 4645(1158)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.649280 355572 task_signals.go:309] [ 4642(1157): 4645(1158)] failed to restore from a signal frame: bad address D0318 16:20:35.649391 355572 task_signals.go:470] [ 4642(1157): 4645(1158)] Notified of signal 11 D0318 16:20:35.649459 355572 task_signals.go:220] [ 4642(1157): 4645(1158)] Signal 11: delivering to handler D0318 16:20:35.649874 355572 usertrap_amd64.go:212] [ 4644( 735): 4644( 735)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.649966 355572 usertrap_amd64.go:122] [ 4644( 735): 4644( 735)] Allocate a new trap: 0xc0002d2f00 39 D0318 16:20:35.650109 355572 usertrap_amd64.go:225] [ 4644( 735): 4644( 735)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.650769 355572 usertrap_amd64.go:212] [ 4642(1157): 4642(1157)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.650863 355572 usertrap_amd64.go:122] [ 4642(1157): 4642(1157)] Allocate a new trap: 0xc000b76810 43 D0318 16:20:35.650961 355572 usertrap_amd64.go:225] [ 4642(1157): 4642(1157)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.657002 355572 task_exit.go:204] [ 4642(1157): 4642(1157)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.657271 355572 task_signals.go:204] [ 4642(1157): 4645(1158)] Signal 9, PID: 4642, TID: 4645, fault addr: 0x0: terminating thread group D0318 16:20:35.657293 355572 usertrap_amd64.go:212] [ 4644( 735): 4644( 735)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.657397 355572 task_exit.go:204] [ 4642(1157): 4645(1158)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.657392 355572 usertrap_amd64.go:122] [ 4644( 735): 4644( 735)] Allocate a new trap: 0xc0002d2f00 40 D0318 16:20:35.657616 355572 usertrap_amd64.go:225] [ 4644( 735): 4644( 735)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.657912 355572 task_exit.go:204] [ 4642(1157): 4642(1157)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.659054 355572 usertrap_amd64.go:212] [ 4644( 735): 4644( 735)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.659131 355572 usertrap_amd64.go:122] [ 4644( 735): 4644( 735)] Allocate a new trap: 0xc0002d2f00 41 D0318 16:20:35.659244 355572 usertrap_amd64.go:225] [ 4644( 735): 4644( 735)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.659453 355572 usertrap_amd64.go:212] [ 4644( 735): 4647( 736)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.659506 355572 usertrap_amd64.go:122] [ 4644( 735): 4647( 736)] Allocate a new trap: 0xc0002d2f00 42 D0318 16:20:35.659675 355572 usertrap_amd64.go:225] [ 4644( 735): 4647( 736)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.660690 355572 usertrap_amd64.go:212] [ 4644( 735): 4647( 736)] Found the pattern at ip 55ca2d8e4ae8:sysno 1 D0318 16:20:35.660806 355572 usertrap_amd64.go:122] [ 4644( 735): 4647( 736)] Allocate a new trap: 0xc0002d2f00 43 D0318 16:20:35.660896 355572 usertrap_amd64.go:225] [ 4644( 735): 4647( 736)] Apply the binary patch addr 55ca2d8e4ae8 trap addr 6ad70 ([184 1 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.664405 355572 usertrap_amd64.go:212] [ 4644( 735): 4644( 735)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.664478 355572 usertrap_amd64.go:122] [ 4644( 735): 4644( 735)] Allocate a new trap: 0xc0002d2f00 44 D0318 16:20:35.664547 355572 task_exit.go:204] [ 4642(1157): 4645(1158)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.664587 355572 usertrap_amd64.go:225] [ 4644( 735): 4644( 735)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6adc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 173 6 0]) D0318 16:20:35.664717 355572 task_exit.go:204] [ 4642(1157): 4645(1158)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.665014 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.665240 355572 task_exit.go:204] [ 4642(1157): 4642(1157)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x891b, &(0x7f00000008c0)={'batadv_slave_1\x00'}) D0318 16:20:35.669230 355572 usertrap_amd64.go:212] [ 4646( 73): 4646( 73)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.669302 355572 usertrap_amd64.go:122] [ 4646( 73): 4646( 73)] Allocate a new trap: 0xc000e1c960 36 D0318 16:20:35.669407 355572 task_exit.go:204] [ 4644( 735): 4644( 735)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.669955 355572 usertrap_amd64.go:225] [ 4646( 73): 4646( 73)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.670088 355572 task_signals.go:204] [ 4644( 735): 4647( 736)] Signal 9, PID: 4644, TID: 4647, fault addr: 0x0: terminating thread group D0318 16:20:35.670169 355572 task_exit.go:204] [ 4644( 735): 4644( 735)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.670295 355572 task_exit.go:204] [ 4644( 735): 4647( 736)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.672654 355572 usertrap_amd64.go:212] [ 4646( 73): 4646( 73)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.672751 355572 usertrap_amd64.go:122] [ 4646( 73): 4646( 73)] Allocate a new trap: 0xc000e1c960 37 D0318 16:20:35.672834 355572 usertrap_amd64.go:225] [ 4646( 73): 4646( 73)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.675283 355572 task_exit.go:204] [ 4644( 735): 4647( 736)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.675380 355572 task_exit.go:204] [ 4644( 735): 4647( 736)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.675471 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.675749 355572 task_exit.go:204] [ 4644( 735): 4644( 735)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:35.684268 355572 usertrap_amd64.go:212] [ 4646( 73): 4646( 73)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.684323 355572 usertrap_amd64.go:122] [ 4646( 73): 4646( 73)] Allocate a new trap: 0xc000e1c960 38 D0318 16:20:35.684382 355572 usertrap_amd64.go:225] [ 4646( 73): 4646( 73)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.689708 355572 usertrap_amd64.go:212] [ 4646( 73): 4646( 73)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.689777 355572 usertrap_amd64.go:122] [ 4646( 73): 4646( 73)] Allocate a new trap: 0xc000e1c960 39 D0318 16:20:35.689848 355572 usertrap_amd64.go:225] [ 4646( 73): 4646( 73)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.691057 355572 usertrap_amd64.go:212] [ 4646( 73): 4646( 73)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.691115 355572 usertrap_amd64.go:122] [ 4646( 73): 4646( 73)] Allocate a new trap: 0xc000e1c960 40 D0318 16:20:35.691177 355572 usertrap_amd64.go:225] [ 4646( 73): 4646( 73)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.691577 355572 usertrap_amd64.go:212] [ 4646( 73): 4649( 74)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.691664 355572 usertrap_amd64.go:122] [ 4646( 73): 4649( 74)] Allocate a new trap: 0xc000e1c960 41 D0318 16:20:35.691742 355572 usertrap_amd64.go:225] [ 4646( 73): 4649( 74)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.692002 355572 usertrap_amd64.go:212] [ 4648(1159): 4648(1159)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.692130 355572 usertrap_amd64.go:122] [ 4648(1159): 4648(1159)] Allocate a new trap: 0xc0002d2f60 37 D0318 16:20:35.692861 355572 usertrap_amd64.go:225] [ 4648(1159): 4648(1159)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.693694 355572 usertrap_amd64.go:212] [ 4646( 73): 4646( 73)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.693775 355572 usertrap_amd64.go:122] [ 4646( 73): 4646( 73)] Allocate a new trap: 0xc000e1c960 42 D0318 16:20:35.693853 355572 usertrap_amd64.go:225] [ 4646( 73): 4646( 73)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.696539 355572 task_exit.go:204] [ 4646( 73): 4646( 73)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.696718 355572 usertrap_amd64.go:212] [ 4648(1159): 4648(1159)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.696789 355572 usertrap_amd64.go:122] [ 4648(1159): 4648(1159)] Allocate a new trap: 0xc0002d2f60 38 D0318 16:20:35.696904 355572 usertrap_amd64.go:225] [ 4648(1159): 4648(1159)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.697220 355572 task_signals.go:204] [ 4646( 73): 4649( 74)] Signal 9, PID: 4646, TID: 4649, fault addr: 0x0: terminating thread group D0318 16:20:35.697321 355572 task_exit.go:204] [ 4646( 73): 4646( 73)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.697470 355572 task_exit.go:204] [ 4646( 73): 4649( 74)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.700485 355572 usertrap_amd64.go:212] [ 4650( 737): 4650( 737)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.700596 355572 usertrap_amd64.go:122] [ 4650( 737): 4650( 737)] Allocate a new trap: 0xc000e1c990 37 D0318 16:20:35.701243 355572 usertrap_amd64.go:225] [ 4650( 737): 4650( 737)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.701868 355572 task_exit.go:204] [ 4646( 73): 4649( 74)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.701942 355572 task_exit.go:204] [ 4646( 73): 4649( 74)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.702039 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.702293 355572 task_exit.go:204] [ 4646( 73): 4646( 73)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x2}]}) D0318 16:20:35.705679 355572 usertrap_amd64.go:212] [ 4650( 737): 4650( 737)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.705785 355572 usertrap_amd64.go:122] [ 4650( 737): 4650( 737)] Allocate a new trap: 0xc000e1c990 38 D0318 16:20:35.705849 355572 usertrap_amd64.go:225] [ 4650( 737): 4650( 737)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.708683 355572 usertrap_amd64.go:212] [ 4648(1159): 4648(1159)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.708746 355572 usertrap_amd64.go:122] [ 4648(1159): 4648(1159)] Allocate a new trap: 0xc0002d2f60 39 D0318 16:20:35.708819 355572 usertrap_amd64.go:225] [ 4648(1159): 4648(1159)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.716911 355572 usertrap_amd64.go:212] [ 4650( 737): 4650( 737)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.716981 355572 usertrap_amd64.go:122] [ 4650( 737): 4650( 737)] Allocate a new trap: 0xc000e1c990 39 D0318 16:20:35.717117 355572 usertrap_amd64.go:225] [ 4650( 737): 4650( 737)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.719914 355572 usertrap_amd64.go:212] [ 4648(1159): 4648(1159)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.720016 355572 usertrap_amd64.go:122] [ 4648(1159): 4648(1159)] Allocate a new trap: 0xc0002d2f60 40 D0318 16:20:35.720102 355572 usertrap_amd64.go:225] [ 4648(1159): 4648(1159)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.722120 355572 usertrap_amd64.go:212] [ 4648(1159): 4652(1160)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.722206 355572 usertrap_amd64.go:122] [ 4648(1159): 4652(1160)] Allocate a new trap: 0xc0002d2f60 41 D0318 16:20:35.722301 355572 usertrap_amd64.go:225] [ 4648(1159): 4652(1160)] Apply the binary patch addr 562e85ccb320 trap addr 66cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.722442 355572 usertrap_amd64.go:212] [ 4648(1159): 4648(1159)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.722551 355572 usertrap_amd64.go:122] [ 4648(1159): 4648(1159)] Allocate a new trap: 0xc0002d2f60 42 D0318 16:20:35.722633 355572 usertrap_amd64.go:225] [ 4648(1159): 4648(1159)] Apply the binary patch addr 562e85ccbc10 trap addr 66d20 ([184 14 0 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.724431 355572 usertrap_amd64.go:212] [ 4650( 737): 4650( 737)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.724531 355572 usertrap_amd64.go:122] [ 4650( 737): 4650( 737)] Allocate a new trap: 0xc000e1c990 40 D0318 16:20:35.724601 355572 usertrap_amd64.go:225] [ 4650( 737): 4650( 737)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.726368 355572 usertrap_amd64.go:212] [ 4650( 737): 4650( 737)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.726452 355572 usertrap_amd64.go:122] [ 4650( 737): 4650( 737)] Allocate a new trap: 0xc000e1c990 41 D0318 16:20:35.726606 355572 usertrap_amd64.go:225] [ 4650( 737): 4650( 737)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.727189 355572 usertrap_amd64.go:212] [ 4648(1159): 4648(1159)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.727289 355572 usertrap_amd64.go:122] [ 4648(1159): 4648(1159)] Allocate a new trap: 0xc0002d2f60 43 D0318 16:20:35.727172 355572 usertrap_amd64.go:212] [ 4650( 737): 4653( 738)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.727362 355572 usertrap_amd64.go:225] [ 4648(1159): 4648(1159)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.727387 355572 usertrap_amd64.go:122] [ 4650( 737): 4653( 738)] Allocate a new trap: 0xc000e1c990 42 D0318 16:20:35.727489 355572 usertrap_amd64.go:225] [ 4650( 737): 4653( 738)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.729580 355572 task_signals.go:309] [ 4650( 737): 4653( 738)] failed to restore from a signal frame: bad address D0318 16:20:35.729741 355572 task_signals.go:470] [ 4650( 737): 4653( 738)] Notified of signal 11 D0318 16:20:35.729854 355572 task_signals.go:220] [ 4650( 737): 4653( 738)] Signal 11: delivering to handler D0318 16:20:35.730797 355572 usertrap_amd64.go:212] [ 4651( 75): 4651( 75)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.730908 355572 usertrap_amd64.go:122] [ 4651( 75): 4651( 75)] Allocate a new trap: 0xc000e1c9f0 36 D0318 16:20:35.731583 355572 usertrap_amd64.go:225] [ 4651( 75): 4651( 75)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.731753 355572 usertrap_amd64.go:212] [ 4650( 737): 4650( 737)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.731832 355572 usertrap_amd64.go:122] [ 4650( 737): 4650( 737)] Allocate a new trap: 0xc000e1c990 43 D0318 16:20:35.731938 355572 usertrap_amd64.go:225] [ 4650( 737): 4650( 737)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.732251 355572 task_exit.go:204] [ 4648(1159): 4648(1159)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.732918 355572 task_exit.go:204] [ 4648(1159): 4648(1159)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.732880 355572 task_signals.go:204] [ 4648(1159): 4652(1160)] Signal 9, PID: 4648, TID: 4652, fault addr: 0x0: terminating thread group D0318 16:20:35.733105 355572 task_exit.go:204] [ 4648(1159): 4652(1160)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.735375 355572 usertrap_amd64.go:212] [ 4651( 75): 4651( 75)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.735448 355572 usertrap_amd64.go:122] [ 4651( 75): 4651( 75)] Allocate a new trap: 0xc000e1c9f0 37 D0318 16:20:35.735584 355572 usertrap_amd64.go:225] [ 4651( 75): 4651( 75)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.737719 355572 task_exit.go:204] [ 4650( 737): 4650( 737)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.738003 355572 task_signals.go:204] [ 4650( 737): 4653( 738)] Signal 9, PID: 4650, TID: 4653, fault addr: 0x0: terminating thread group D0318 16:20:35.738637 355572 task_exit.go:204] [ 4650( 737): 4650( 737)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.738749 355572 task_exit.go:204] [ 4650( 737): 4653( 738)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.739878 355572 task_exit.go:204] [ 4648(1159): 4652(1160)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.740251 355572 task_exit.go:204] [ 4648(1159): 4652(1160)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.740403 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.740502 355572 task_exit.go:204] [ 4648(1159): 4648(1159)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 1: chroot(&(0x7f0000000100)='./bus\x00') D0318 16:20:35.744715 355572 task_exit.go:204] [ 4650( 737): 4653( 738)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.744802 355572 task_exit.go:204] [ 4650( 737): 4653( 738)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.744942 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.746842 355572 task_exit.go:204] [ 4650( 737): 4650( 737)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: r0 = getpgrp(0xffffffffffffffff) sched_setscheduler(r0, 0x0, &(0x7f000000ccc0)) D0318 16:20:35.753712 355572 usertrap_amd64.go:212] [ 4651( 75): 4651( 75)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.753802 355572 usertrap_amd64.go:122] [ 4651( 75): 4651( 75)] Allocate a new trap: 0xc000e1c9f0 38 D0318 16:20:35.753876 355572 usertrap_amd64.go:225] [ 4651( 75): 4651( 75)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.764267 355572 usertrap_amd64.go:212] [ 4651( 75): 4651( 75)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.764356 355572 usertrap_amd64.go:122] [ 4651( 75): 4651( 75)] Allocate a new trap: 0xc000e1c9f0 39 D0318 16:20:35.764441 355572 usertrap_amd64.go:225] [ 4651( 75): 4651( 75)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.765868 355572 usertrap_amd64.go:212] [ 4651( 75): 4651( 75)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.765967 355572 usertrap_amd64.go:122] [ 4651( 75): 4651( 75)] Allocate a new trap: 0xc000e1c9f0 40 D0318 16:20:35.766076 355572 usertrap_amd64.go:225] [ 4651( 75): 4651( 75)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.766232 355572 usertrap_amd64.go:212] [ 4651( 75): 4655( 76)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.766296 355572 usertrap_amd64.go:122] [ 4651( 75): 4655( 76)] Allocate a new trap: 0xc000e1c9f0 41 D0318 16:20:35.766400 355572 usertrap_amd64.go:225] [ 4651( 75): 4655( 76)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.767332 355572 sys_seccomp.go:78] [ 4651( 75): 4655( 76)] Invalid seccomp-bpf filter: at l0: last instruction must be a return D0318 16:20:35.767950 355572 usertrap_amd64.go:212] [ 4651( 75): 4651( 75)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.768107 355572 usertrap_amd64.go:122] [ 4651( 75): 4651( 75)] Allocate a new trap: 0xc000e1c9f0 42 D0318 16:20:35.768196 355572 usertrap_amd64.go:225] [ 4651( 75): 4651( 75)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.769494 355572 usertrap_amd64.go:212] [ 4654(1161): 4654(1161)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.769591 355572 usertrap_amd64.go:122] [ 4654(1161): 4654(1161)] Allocate a new trap: 0xc005d56720 37 D0318 16:20:35.770185 355572 usertrap_amd64.go:225] [ 4654(1161): 4654(1161)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.771507 355572 task_exit.go:204] [ 4651( 75): 4651( 75)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.772232 355572 task_signals.go:204] [ 4651( 75): 4655( 76)] Signal 9, PID: 4651, TID: 4655, fault addr: 0x0: terminating thread group D0318 16:20:35.772337 355572 task_exit.go:204] [ 4651( 75): 4651( 75)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.772525 355572 task_exit.go:204] [ 4651( 75): 4655( 76)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.774390 355572 usertrap_amd64.go:212] [ 4654(1161): 4654(1161)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.774518 355572 usertrap_amd64.go:122] [ 4654(1161): 4654(1161)] Allocate a new trap: 0xc005d56720 38 D0318 16:20:35.774631 355572 usertrap_amd64.go:225] [ 4654(1161): 4654(1161)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.777536 355572 task_exit.go:204] [ 4651( 75): 4655( 76)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.777638 355572 task_exit.go:204] [ 4651( 75): 4655( 76)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.777733 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.779192 355572 task_exit.go:204] [ 4651( 75): 4651( 75)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:35.784187 355572 usertrap_amd64.go:212] [ 4656( 739): 4656( 739)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.784317 355572 usertrap_amd64.go:122] [ 4656( 739): 4656( 739)] Allocate a new trap: 0xc0078f6660 37 D0318 16:20:35.785037 355572 usertrap_amd64.go:225] [ 4656( 739): 4656( 739)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.789118 355572 usertrap_amd64.go:212] [ 4656( 739): 4656( 739)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.789236 355572 usertrap_amd64.go:122] [ 4656( 739): 4656( 739)] Allocate a new trap: 0xc0078f6660 38 D0318 16:20:35.789310 355572 usertrap_amd64.go:225] [ 4656( 739): 4656( 739)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.789864 355572 usertrap_amd64.go:212] [ 4654(1161): 4654(1161)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.789941 355572 usertrap_amd64.go:122] [ 4654(1161): 4654(1161)] Allocate a new trap: 0xc005d56720 39 D0318 16:20:35.790041 355572 usertrap_amd64.go:225] [ 4654(1161): 4654(1161)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.803752 355572 usertrap_amd64.go:212] [ 4656( 739): 4656( 739)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.803879 355572 usertrap_amd64.go:122] [ 4656( 739): 4656( 739)] Allocate a new trap: 0xc0078f6660 39 D0318 16:20:35.803966 355572 usertrap_amd64.go:225] [ 4656( 739): 4656( 739)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.804291 355572 usertrap_amd64.go:212] [ 4654(1161): 4654(1161)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.804362 355572 usertrap_amd64.go:122] [ 4654(1161): 4654(1161)] Allocate a new trap: 0xc005d56720 40 D0318 16:20:35.804435 355572 usertrap_amd64.go:225] [ 4654(1161): 4654(1161)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.806295 355572 usertrap_amd64.go:212] [ 4654(1161): 4654(1161)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.806350 355572 usertrap_amd64.go:122] [ 4654(1161): 4654(1161)] Allocate a new trap: 0xc005d56720 41 D0318 16:20:35.806609 355572 usertrap_amd64.go:225] [ 4654(1161): 4654(1161)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.806855 355572 usertrap_amd64.go:212] [ 4654(1161): 4658(1162)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.806921 355572 usertrap_amd64.go:122] [ 4654(1161): 4658(1162)] Allocate a new trap: 0xc005d56720 42 D0318 16:20:35.806996 355572 usertrap_amd64.go:225] [ 4654(1161): 4658(1162)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.808328 355572 usertrap_amd64.go:212] [ 4654(1161): 4654(1161)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.808405 355572 usertrap_amd64.go:122] [ 4654(1161): 4654(1161)] Allocate a new trap: 0xc005d56720 43 D0318 16:20:35.808502 355572 usertrap_amd64.go:212] [ 4657( 77): 4657( 77)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.808497 355572 usertrap_amd64.go:225] [ 4654(1161): 4654(1161)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.808601 355572 usertrap_amd64.go:122] [ 4657( 77): 4657( 77)] Allocate a new trap: 0xc000b76960 36 D0318 16:20:35.809217 355572 usertrap_amd64.go:225] [ 4657( 77): 4657( 77)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.812208 355572 usertrap_amd64.go:212] [ 4656( 739): 4656( 739)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.812292 355572 usertrap_amd64.go:122] [ 4656( 739): 4656( 739)] Allocate a new trap: 0xc0078f6660 40 D0318 16:20:35.812362 355572 usertrap_amd64.go:225] [ 4656( 739): 4656( 739)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.812638 355572 task_exit.go:204] [ 4654(1161): 4654(1161)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.812651 355572 usertrap_amd64.go:212] [ 4657( 77): 4657( 77)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.812727 355572 usertrap_amd64.go:122] [ 4657( 77): 4657( 77)] Allocate a new trap: 0xc000b76960 37 D0318 16:20:35.812788 355572 task_signals.go:204] [ 4654(1161): 4658(1162)] Signal 9, PID: 4654, TID: 4658, fault addr: 0x0: terminating thread group D0318 16:20:35.812833 355572 usertrap_amd64.go:225] [ 4657( 77): 4657( 77)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.813287 355572 task_exit.go:204] [ 4654(1161): 4654(1161)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.814460 355572 task_exit.go:204] [ 4654(1161): 4658(1162)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.814556 355572 usertrap_amd64.go:212] [ 4656( 739): 4656( 739)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.814803 355572 usertrap_amd64.go:122] [ 4656( 739): 4656( 739)] Allocate a new trap: 0xc0078f6660 41 D0318 16:20:35.814912 355572 usertrap_amd64.go:225] [ 4656( 739): 4656( 739)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.815163 355572 usertrap_amd64.go:212] [ 4656( 739): 4659( 740)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.815265 355572 usertrap_amd64.go:122] [ 4656( 739): 4659( 740)] Allocate a new trap: 0xc0078f6660 42 D0318 16:20:35.815362 355572 usertrap_amd64.go:225] [ 4656( 739): 4659( 740)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.818180 355572 usertrap_amd64.go:212] [ 4656( 739): 4656( 739)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.818333 355572 usertrap_amd64.go:122] [ 4656( 739): 4656( 739)] Allocate a new trap: 0xc0078f6660 43 D0318 16:20:35.818429 355572 usertrap_amd64.go:225] [ 4656( 739): 4656( 739)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.819389 355572 task_exit.go:204] [ 4654(1161): 4658(1162)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.819483 355572 task_exit.go:204] [ 4654(1161): 4658(1162)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.819680 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.820966 355572 task_exit.go:204] [ 4654(1161): 4654(1161)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000001800)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @multicast1, @broadcast}, @info_reply}}}}, 0x0) D0318 16:20:35.824827 355572 task_exit.go:204] [ 4656( 739): 4656( 739)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.825520 355572 task_signals.go:204] [ 4656( 739): 4659( 740)] Signal 9, PID: 4656, TID: 4659, fault addr: 0x0: terminating thread group D0318 16:20:35.825622 355572 task_exit.go:204] [ 4656( 739): 4659( 740)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.825759 355572 task_exit.go:204] [ 4656( 739): 4656( 739)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.829631 355572 usertrap_amd64.go:212] [ 4657( 77): 4657( 77)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.829741 355572 usertrap_amd64.go:122] [ 4657( 77): 4657( 77)] Allocate a new trap: 0xc000b76960 38 D0318 16:20:35.829849 355572 usertrap_amd64.go:225] [ 4657( 77): 4657( 77)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.831131 355572 task_exit.go:204] [ 4656( 739): 4659( 740)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.831252 355572 task_exit.go:204] [ 4656( 739): 4659( 740)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.831379 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.831917 355572 task_exit.go:204] [ 4656( 739): 4656( 739)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8953, &(0x7f00000008c0)={'batadv_slave_1\x00'}) D0318 16:20:35.837870 355572 usertrap_amd64.go:212] [ 4657( 77): 4657( 77)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.837975 355572 usertrap_amd64.go:122] [ 4657( 77): 4657( 77)] Allocate a new trap: 0xc000b76960 39 D0318 16:20:35.838060 355572 usertrap_amd64.go:225] [ 4657( 77): 4657( 77)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.839737 355572 usertrap_amd64.go:212] [ 4657( 77): 4657( 77)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.839828 355572 usertrap_amd64.go:122] [ 4657( 77): 4657( 77)] Allocate a new trap: 0xc000b76960 40 D0318 16:20:35.840271 355572 usertrap_amd64.go:225] [ 4657( 77): 4657( 77)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.840677 355572 usertrap_amd64.go:212] [ 4657( 77): 4661( 78)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.840823 355572 usertrap_amd64.go:122] [ 4657( 77): 4661( 78)] Allocate a new trap: 0xc000b76960 41 D0318 16:20:35.841077 355572 usertrap_amd64.go:225] [ 4657( 77): 4661( 78)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.844109 355572 task_signals.go:309] [ 4657( 77): 4661( 78)] failed to restore from a signal frame: bad address D0318 16:20:35.844258 355572 task_signals.go:470] [ 4657( 77): 4661( 78)] Notified of signal 11 D0318 16:20:35.844360 355572 task_signals.go:220] [ 4657( 77): 4661( 78)] Signal 11: delivering to handler D0318 16:20:35.845591 355572 usertrap_amd64.go:212] [ 4657( 77): 4657( 77)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.845684 355572 usertrap_amd64.go:122] [ 4657( 77): 4657( 77)] Allocate a new trap: 0xc000b76960 42 D0318 16:20:35.845766 355572 usertrap_amd64.go:225] [ 4657( 77): 4657( 77)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.847990 355572 usertrap_amd64.go:212] [ 4660(1163): 4660(1163)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.848142 355572 usertrap_amd64.go:122] [ 4660(1163): 4660(1163)] Allocate a new trap: 0xc0057287e0 37 D0318 16:20:35.849410 355572 task_exit.go:204] [ 4657( 77): 4657( 77)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.849570 355572 task_signals.go:204] [ 4657( 77): 4661( 78)] Signal 9, PID: 4657, TID: 4661, fault addr: 0x0: terminating thread group D0318 16:20:35.850212 355572 task_exit.go:204] [ 4657( 77): 4657( 77)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.850396 355572 task_exit.go:204] [ 4657( 77): 4661( 78)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.851346 355572 usertrap_amd64.go:225] [ 4660(1163): 4660(1163)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.855019 355572 task_exit.go:204] [ 4657( 77): 4661( 78)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.855092 355572 task_exit.go:204] [ 4657( 77): 4661( 78)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.855181 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.855325 355572 task_exit.go:204] [ 4657( 77): 4657( 77)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 0: prctl$PR_GET_TID_ADDRESS(0x1c, 0x0) D0318 16:20:35.863025 355572 usertrap_amd64.go:212] [ 4662( 741): 4662( 741)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.863170 355572 usertrap_amd64.go:122] [ 4662( 741): 4662( 741)] Allocate a new trap: 0xc0008f2990 37 D0318 16:20:35.863812 355572 usertrap_amd64.go:212] [ 4660(1163): 4660(1163)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.863976 355572 usertrap_amd64.go:122] [ 4660(1163): 4660(1163)] Allocate a new trap: 0xc0057287e0 38 D0318 16:20:35.863836 355572 usertrap_amd64.go:225] [ 4662( 741): 4662( 741)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.864075 355572 usertrap_amd64.go:225] [ 4660(1163): 4660(1163)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:35.867544 355572 usertrap_amd64.go:212] [ 4662( 741): 4662( 741)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.867661 355572 usertrap_amd64.go:122] [ 4662( 741): 4662( 741)] Allocate a new trap: 0xc0008f2990 38 D0318 16:20:35.867783 355572 usertrap_amd64.go:225] [ 4662( 741): 4662( 741)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.875932 355572 usertrap_amd64.go:212] [ 4660(1163): 4660(1163)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.876054 355572 usertrap_amd64.go:122] [ 4660(1163): 4660(1163)] Allocate a new trap: 0xc0057287e0 39 D0318 16:20:35.876178 355572 usertrap_amd64.go:225] [ 4660(1163): 4660(1163)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.882827 355572 usertrap_amd64.go:212] [ 4660(1163): 4660(1163)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.882901 355572 usertrap_amd64.go:122] [ 4660(1163): 4660(1163)] Allocate a new trap: 0xc0057287e0 40 D0318 16:20:35.883003 355572 usertrap_amd64.go:225] [ 4660(1163): 4660(1163)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.884601 355572 usertrap_amd64.go:212] [ 4660(1163): 4660(1163)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.884690 355572 usertrap_amd64.go:122] [ 4660(1163): 4660(1163)] Allocate a new trap: 0xc0057287e0 41 D0318 16:20:35.884804 355572 usertrap_amd64.go:225] [ 4660(1163): 4660(1163)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.885277 355572 usertrap_amd64.go:212] [ 4660(1163): 4664(1164)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.885408 355572 usertrap_amd64.go:122] [ 4660(1163): 4664(1164)] Allocate a new trap: 0xc0057287e0 42 D0318 16:20:35.885501 355572 usertrap_amd64.go:225] [ 4660(1163): 4664(1164)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.886740 355572 usertrap_amd64.go:212] [ 4663( 79): 4663( 79)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.886777 355572 usertrap_amd64.go:212] [ 4660(1163): 4664(1164)] Found the pattern at ip 562e85cf5ae8:sysno 1 D0318 16:20:35.886843 355572 usertrap_amd64.go:122] [ 4663( 79): 4663( 79)] Allocate a new trap: 0xc0078f66f0 36 D0318 16:20:35.886853 355572 usertrap_amd64.go:122] [ 4660(1163): 4664(1164)] Allocate a new trap: 0xc0057287e0 43 D0318 16:20:35.886977 355572 usertrap_amd64.go:225] [ 4660(1163): 4664(1164)] Apply the binary patch addr 562e85cf5ae8 trap addr 66d70 ([184 1 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.887130 355572 usertrap_amd64.go:212] [ 4662( 741): 4662( 741)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.887211 355572 usertrap_amd64.go:122] [ 4662( 741): 4662( 741)] Allocate a new trap: 0xc0008f2990 39 D0318 16:20:35.887266 355572 usertrap_amd64.go:225] [ 4662( 741): 4662( 741)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.887344 355572 usertrap_amd64.go:225] [ 4663( 79): 4663( 79)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.891074 355572 usertrap_amd64.go:212] [ 4660(1163): 4660(1163)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.891074 355572 usertrap_amd64.go:212] [ 4663( 79): 4663( 79)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.891141 355572 usertrap_amd64.go:122] [ 4660(1163): 4660(1163)] Allocate a new trap: 0xc0057287e0 44 D0318 16:20:35.891178 355572 usertrap_amd64.go:122] [ 4663( 79): 4663( 79)] Allocate a new trap: 0xc0078f66f0 37 D0318 16:20:35.891209 355572 usertrap_amd64.go:225] [ 4660(1163): 4660(1163)] Apply the binary patch addr 562e85cf5c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:35.891314 355572 usertrap_amd64.go:225] [ 4663( 79): 4663( 79)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.894409 355572 usertrap_amd64.go:212] [ 4662( 741): 4662( 741)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.894490 355572 usertrap_amd64.go:122] [ 4662( 741): 4662( 741)] Allocate a new trap: 0xc0008f2990 40 D0318 16:20:35.894591 355572 usertrap_amd64.go:225] [ 4662( 741): 4662( 741)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.894653 355572 task_exit.go:204] [ 4660(1163): 4660(1163)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.895583 355572 task_signals.go:204] [ 4660(1163): 4664(1164)] Signal 9, PID: 4660, TID: 4664, fault addr: 0x0: terminating thread group D0318 16:20:35.895694 355572 task_exit.go:204] [ 4660(1163): 4660(1163)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.895999 355572 task_exit.go:204] [ 4660(1163): 4664(1164)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.897168 355572 usertrap_amd64.go:212] [ 4662( 741): 4662( 741)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.897247 355572 usertrap_amd64.go:122] [ 4662( 741): 4662( 741)] Allocate a new trap: 0xc0008f2990 41 D0318 16:20:35.897320 355572 usertrap_amd64.go:225] [ 4662( 741): 4662( 741)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.897612 355572 usertrap_amd64.go:212] [ 4662( 741): 4665( 742)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.897741 355572 usertrap_amd64.go:122] [ 4662( 741): 4665( 742)] Allocate a new trap: 0xc0008f2990 42 D0318 16:20:35.897981 355572 usertrap_amd64.go:225] [ 4662( 741): 4665( 742)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.900999 355572 usertrap_amd64.go:212] [ 4662( 741): 4662( 741)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.901078 355572 usertrap_amd64.go:122] [ 4662( 741): 4662( 741)] Allocate a new trap: 0xc0008f2990 43 D0318 16:20:35.901183 355572 usertrap_amd64.go:225] [ 4662( 741): 4662( 741)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.903312 355572 task_exit.go:204] [ 4660(1163): 4664(1164)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.903441 355572 task_exit.go:204] [ 4660(1163): 4664(1164)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.903578 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.904563 355572 task_exit.go:204] [ 4660(1163): 4660(1163)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 1: r0 = semget$private(0x0, 0x0, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:35.905972 355572 task_exit.go:204] [ 4662( 741): 4662( 741)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.906247 355572 task_signals.go:204] [ 4662( 741): 4665( 742)] Signal 9, PID: 4662, TID: 4665, fault addr: 0x0: terminating thread group D0318 16:20:35.906646 355572 task_exit.go:204] [ 4662( 741): 4662( 741)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.906752 355572 task_exit.go:204] [ 4662( 741): 4665( 742)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.910952 355572 usertrap_amd64.go:212] [ 4663( 79): 4663( 79)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.911130 355572 usertrap_amd64.go:122] [ 4663( 79): 4663( 79)] Allocate a new trap: 0xc0078f66f0 38 D0318 16:20:35.911315 355572 usertrap_amd64.go:225] [ 4663( 79): 4663( 79)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.911977 355572 task_exit.go:204] [ 4662( 741): 4665( 742)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.912076 355572 task_exit.go:204] [ 4662( 741): 4665( 742)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.912176 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.912381 355572 task_exit.go:204] [ 4662( 741): 4662( 741)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:35 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x5452, &(0x7f000000d140)) D0318 16:20:35.919997 355572 usertrap_amd64.go:212] [ 4663( 79): 4663( 79)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.920094 355572 usertrap_amd64.go:122] [ 4663( 79): 4663( 79)] Allocate a new trap: 0xc0078f66f0 39 D0318 16:20:35.920178 355572 usertrap_amd64.go:225] [ 4663( 79): 4663( 79)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.921797 355572 usertrap_amd64.go:212] [ 4663( 79): 4663( 79)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.921869 355572 usertrap_amd64.go:122] [ 4663( 79): 4663( 79)] Allocate a new trap: 0xc0078f66f0 40 D0318 16:20:35.921956 355572 usertrap_amd64.go:225] [ 4663( 79): 4663( 79)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.922081 355572 usertrap_amd64.go:212] [ 4663( 79): 4666( 80)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.922190 355572 usertrap_amd64.go:122] [ 4663( 79): 4666( 80)] Allocate a new trap: 0xc0078f66f0 41 D0318 16:20:35.922294 355572 usertrap_amd64.go:225] [ 4663( 79): 4666( 80)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.923801 355572 usertrap_amd64.go:212] [ 4663( 79): 4663( 79)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.923916 355572 usertrap_amd64.go:122] [ 4663( 79): 4663( 79)] Allocate a new trap: 0xc0078f66f0 42 D0318 16:20:35.924046 355572 usertrap_amd64.go:225] [ 4663( 79): 4663( 79)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.928277 355572 task_exit.go:204] [ 4663( 79): 4663( 79)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.928642 355572 task_signals.go:204] [ 4663( 79): 4666( 80)] Signal 9, PID: 4663, TID: 4666, fault addr: 0x0: terminating thread group D0318 16:20:35.929024 355572 task_exit.go:204] [ 4663( 79): 4666( 80)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.929328 355572 task_exit.go:204] [ 4663( 79): 4663( 79)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.932263 355572 usertrap_amd64.go:212] [ 4667(1165): 4667(1165)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:35.932392 355572 usertrap_amd64.go:122] [ 4667(1165): 4667(1165)] Allocate a new trap: 0xc000b76a80 37 D0318 16:20:35.932951 355572 usertrap_amd64.go:225] [ 4667(1165): 4667(1165)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:35.933921 355572 task_exit.go:204] [ 4663( 79): 4666( 80)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.933986 355572 task_exit.go:204] [ 4663( 79): 4666( 80)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.934084 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:35.935376 355572 task_exit.go:204] [ 4663( 79): 4663( 79)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.935991 355572 usertrap_amd64.go:212] [ 4667(1165): 4667(1165)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:35.936073 355572 usertrap_amd64.go:122] [ 4667(1165): 4667(1165)] Allocate a new trap: 0xc000b76a80 38 D0318 16:20:35.936164 355572 usertrap_amd64.go:225] [ 4667(1165): 4667(1165)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) 16:20:35 executing program 0: add_key$user(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\n', 0x1, 0xfffffffffffffffd) D0318 16:20:35.940906 355572 usertrap_amd64.go:212] [ 4668( 743): 4668( 743)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:35.941025 355572 usertrap_amd64.go:122] [ 4668( 743): 4668( 743)] Allocate a new trap: 0xc0008f2ae0 37 D0318 16:20:35.941661 355572 usertrap_amd64.go:225] [ 4668( 743): 4668( 743)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:35.944993 355572 usertrap_amd64.go:212] [ 4668( 743): 4668( 743)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:35.945086 355572 usertrap_amd64.go:122] [ 4668( 743): 4668( 743)] Allocate a new trap: 0xc0008f2ae0 38 D0318 16:20:35.945171 355572 usertrap_amd64.go:225] [ 4668( 743): 4668( 743)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:35.947642 355572 usertrap_amd64.go:212] [ 4667(1165): 4667(1165)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:35.947737 355572 usertrap_amd64.go:122] [ 4667(1165): 4667(1165)] Allocate a new trap: 0xc000b76a80 39 D0318 16:20:35.947820 355572 usertrap_amd64.go:225] [ 4667(1165): 4667(1165)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:35.955829 355572 usertrap_amd64.go:212] [ 4667(1165): 4667(1165)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:35.955910 355572 usertrap_amd64.go:122] [ 4667(1165): 4667(1165)] Allocate a new trap: 0xc000b76a80 40 D0318 16:20:35.956004 355572 usertrap_amd64.go:225] [ 4667(1165): 4667(1165)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:35.958114 355572 usertrap_amd64.go:212] [ 4667(1165): 4667(1165)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:35.958301 355572 usertrap_amd64.go:122] [ 4667(1165): 4667(1165)] Allocate a new trap: 0xc000b76a80 41 D0318 16:20:35.958414 355572 usertrap_amd64.go:225] [ 4667(1165): 4667(1165)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:35.958608 355572 usertrap_amd64.go:212] [ 4667(1165): 4670(1166)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:35.958733 355572 usertrap_amd64.go:122] [ 4667(1165): 4670(1166)] Allocate a new trap: 0xc000b76a80 42 D0318 16:20:35.958824 355572 usertrap_amd64.go:225] [ 4667(1165): 4670(1166)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:35.960356 355572 usertrap_amd64.go:212] [ 4669( 81): 4669( 81)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:35.960474 355572 usertrap_amd64.go:122] [ 4669( 81): 4669( 81)] Allocate a new trap: 0xc000e1ca20 36 D0318 16:20:35.961058 355572 task_signals.go:309] [ 4667(1165): 4670(1166)] failed to restore from a signal frame: bad address D0318 16:20:35.961202 355572 task_signals.go:470] [ 4667(1165): 4670(1166)] Notified of signal 11 D0318 16:20:35.961070 355572 usertrap_amd64.go:225] [ 4669( 81): 4669( 81)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:35.961273 355572 task_signals.go:220] [ 4667(1165): 4670(1166)] Signal 11: delivering to handler D0318 16:20:35.962433 355572 usertrap_amd64.go:212] [ 4667(1165): 4667(1165)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:35.962568 355572 usertrap_amd64.go:122] [ 4667(1165): 4667(1165)] Allocate a new trap: 0xc000b76a80 43 D0318 16:20:35.962798 355572 usertrap_amd64.go:225] [ 4667(1165): 4667(1165)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:35.965044 355572 usertrap_amd64.go:212] [ 4668( 743): 4668( 743)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:35.965118 355572 usertrap_amd64.go:122] [ 4668( 743): 4668( 743)] Allocate a new trap: 0xc0008f2ae0 39 D0318 16:20:35.965190 355572 usertrap_amd64.go:225] [ 4668( 743): 4668( 743)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:35.967707 355572 task_exit.go:204] [ 4667(1165): 4667(1165)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.967907 355572 task_signals.go:204] [ 4667(1165): 4670(1166)] Signal 9, PID: 4667, TID: 4670, fault addr: 0x0: terminating thread group D0318 16:20:35.968144 355572 usertrap_amd64.go:212] [ 4669( 81): 4669( 81)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:35.968243 355572 usertrap_amd64.go:122] [ 4669( 81): 4669( 81)] Allocate a new trap: 0xc000e1ca20 37 D0318 16:20:35.968299 355572 usertrap_amd64.go:225] [ 4669( 81): 4669( 81)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:35.968329 355572 task_exit.go:204] [ 4667(1165): 4667(1165)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.968443 355572 task_exit.go:204] [ 4667(1165): 4670(1166)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.973389 355572 task_exit.go:204] [ 4667(1165): 4670(1166)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.973525 355572 task_exit.go:204] [ 4667(1165): 4670(1166)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.973708 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:35.973853 355572 usertrap_amd64.go:212] [ 4668( 743): 4668( 743)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:35.973891 355572 task_exit.go:204] [ 4667(1165): 4667(1165)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.973931 355572 usertrap_amd64.go:122] [ 4668( 743): 4668( 743)] Allocate a new trap: 0xc0008f2ae0 40 D0318 16:20:35.974039 355572 usertrap_amd64.go:225] [ 4668( 743): 4668( 743)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:35.975961 355572 usertrap_amd64.go:212] [ 4668( 743): 4668( 743)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:35.976020 355572 usertrap_amd64.go:122] [ 4668( 743): 4668( 743)] Allocate a new trap: 0xc0008f2ae0 41 D0318 16:20:35.976533 355572 usertrap_amd64.go:225] [ 4668( 743): 4668( 743)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:35.976841 355572 usertrap_amd64.go:212] [ 4668( 743): 4671( 744)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:35.977435 355572 usertrap_amd64.go:122] [ 4668( 743): 4671( 744)] Allocate a new trap: 0xc0008f2ae0 42 D0318 16:20:35.977535 355572 usertrap_amd64.go:225] [ 4668( 743): 4671( 744)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:35.980220 355572 usertrap_amd64.go:212] [ 4668( 743): 4668( 743)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:35.980320 355572 usertrap_amd64.go:122] [ 4668( 743): 4668( 743)] Allocate a new trap: 0xc0008f2ae0 43 D0318 16:20:35.980466 355572 usertrap_amd64.go:225] [ 4668( 743): 4668( 743)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:35.981777 355572 usertrap_amd64.go:212] [ 4669( 81): 4669( 81)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:35.981912 355572 usertrap_amd64.go:212] [ 4607(1186): 4607(1186)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:35.981920 355572 usertrap_amd64.go:122] [ 4669( 81): 4669( 81)] Allocate a new trap: 0xc000e1ca20 38 D0318 16:20:35.981970 355572 usertrap_amd64.go:122] [ 4607(1186): 4607(1186)] Allocate a new trap: 0xc000b76510 44 D0318 16:20:35.982061 355572 usertrap_amd64.go:225] [ 4669( 81): 4669( 81)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:35.982061 355572 usertrap_amd64.go:225] [ 4607(1186): 4607(1186)] Apply the binary patch addr 55ec958b2c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:35.986600 355572 task_exit.go:204] [ 4668( 743): 4668( 743)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.986859 355572 task_signals.go:204] [ 4668( 743): 4671( 744)] Signal 9, PID: 4668, TID: 4671, fault addr: 0x0: terminating thread group D0318 16:20:35.987427 355572 task_exit.go:204] [ 4668( 743): 4668( 743)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.987572 355572 task_exit.go:204] [ 4668( 743): 4671( 744)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.989308 355572 task_exit.go:204] [ 4607(1186): 4607(1186)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.989446 355572 usertrap_amd64.go:212] [ 4669( 81): 4669( 81)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:35.989523 355572 usertrap_amd64.go:122] [ 4669( 81): 4669( 81)] Allocate a new trap: 0xc000e1ca20 39 D0318 16:20:35.989664 355572 usertrap_amd64.go:225] [ 4669( 81): 4669( 81)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:35.991965 355572 usertrap_amd64.go:212] [ 4669( 81): 4669( 81)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:35.992048 355572 usertrap_amd64.go:122] [ 4669( 81): 4669( 81)] Allocate a new trap: 0xc000e1ca20 40 D0318 16:20:35.992220 355572 task_exit.go:204] [ 4607(1186): 4607(1186)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.992357 355572 usertrap_amd64.go:225] [ 4669( 81): 4669( 81)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:35.992197 355572 task_signals.go:204] [ 4607(1186): 4611(1187)] Signal 9, PID: 4607, TID: 4611, fault addr: 0x0: terminating thread group D0318 16:20:35.992713 355572 task_exit.go:204] [ 4607(1186): 4611(1187)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.992797 355572 usertrap_amd64.go:212] [ 4669( 81): 4672( 82)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:35.992855 355572 usertrap_amd64.go:122] [ 4669( 81): 4672( 82)] Allocate a new trap: 0xc000e1ca20 41 D0318 16:20:35.992986 355572 usertrap_amd64.go:225] [ 4669( 81): 4672( 82)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:35.993596 355572 task_exit.go:204] [ 4668( 743): 4671( 744)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.993755 355572 task_exit.go:204] [ 4668( 743): 4671( 744)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.993894 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:35.994120 355572 task_exit.go:204] [ 4668( 743): 4668( 743)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.994951 355572 usertrap_amd64.go:212] [ 4669( 81): 4669( 81)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:35.995056 355572 usertrap_amd64.go:122] [ 4669( 81): 4669( 81)] Allocate a new trap: 0xc000e1ca20 42 D0318 16:20:35.995141 355572 usertrap_amd64.go:225] [ 4669( 81): 4669( 81)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:35.998764 355572 task_exit.go:204] [ 4607(1186): 4611(1187)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:35.998872 355572 task_exit.go:204] [ 4607(1186): 4611(1187)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:35.999214 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:35.999366 355572 task_signals.go:204] [ 4669( 81): 4672( 82)] Signal 9, PID: 4669, TID: 4672, fault addr: 0x0: terminating thread group D0318 16:20:35.999382 355572 task_exit.go:204] [ 4669( 81): 4669( 81)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.999533 355572 task_exit.go:204] [ 4669( 81): 4672( 82)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:35.999756 355572 task_exit.go:204] [ 4607(1186): 4607(1186)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.000701 355572 task_exit.go:204] [ 4669( 81): 4672( 82)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.000770 355572 task_exit.go:204] [ 4669( 81): 4672( 82)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x401c5820, &(0x7f000000d140)) 16:20:36 executing program 1: r0 = memfd_create(&(0x7f00000005c0)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5\x00\x00\x00\x00\x00\x00\x00\x05L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0\xc8d\x96G\xcf\x066\x84\x82-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xa4(Q\x80Fy\xb5\xe4q\xc9\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f\x1f\xc2e/\x8d\x1e\n\xd0_\xbd!^\xa46\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88y\xebX\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a', 0x0) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB='#!'], 0x10c) execveat(r0, &(0x7f0000000140)='\x00', 0x0, 0x0, 0x1000) 16:20:36 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:36.004939 355572 task_exit.go:204] [ 4669( 81): 4669( 81)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.005062 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:36.005363 355572 task_exit.go:204] [ 4669( 81): 4669( 81)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 0: prctl$PR_GET_TID_ADDRESS(0x8, &(0x7f0000008640)) D0318 16:20:36.027639 355572 usertrap_amd64.go:212] [ 4674( 745): 4674( 745)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.027831 355572 usertrap_amd64.go:122] [ 4674( 745): 4674( 745)] Allocate a new trap: 0xc0021005a0 37 D0318 16:20:36.028085 355572 usertrap_amd64.go:212] [ 4673(1167): 4673(1167)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.028255 355572 usertrap_amd64.go:122] [ 4673(1167): 4673(1167)] Allocate a new trap: 0xc000976ab0 37 D0318 16:20:36.028654 355572 usertrap_amd64.go:225] [ 4674( 745): 4674( 745)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.029813 355572 usertrap_amd64.go:212] [ 4675(1188): 4675(1188)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.029914 355572 usertrap_amd64.go:225] [ 4673(1167): 4673(1167)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.030016 355572 usertrap_amd64.go:122] [ 4675(1188): 4675(1188)] Allocate a new trap: 0xc00637c870 37 D0318 16:20:36.031073 355572 usertrap_amd64.go:225] [ 4675(1188): 4675(1188)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.032511 355572 usertrap_amd64.go:212] [ 4674( 745): 4674( 745)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.032590 355572 usertrap_amd64.go:122] [ 4674( 745): 4674( 745)] Allocate a new trap: 0xc0021005a0 38 D0318 16:20:36.032662 355572 usertrap_amd64.go:225] [ 4674( 745): 4674( 745)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.033942 355572 usertrap_amd64.go:212] [ 4673(1167): 4673(1167)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.034107 355572 usertrap_amd64.go:122] [ 4673(1167): 4673(1167)] Allocate a new trap: 0xc000976ab0 38 D0318 16:20:36.034194 355572 usertrap_amd64.go:225] [ 4673(1167): 4673(1167)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.034984 355572 usertrap_amd64.go:212] [ 4675(1188): 4675(1188)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.035190 355572 usertrap_amd64.go:122] [ 4675(1188): 4675(1188)] Allocate a new trap: 0xc00637c870 38 D0318 16:20:36.035339 355572 usertrap_amd64.go:225] [ 4675(1188): 4675(1188)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.042203 355572 usertrap_amd64.go:212] [ 4676( 83): 4676( 83)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:36.042367 355572 usertrap_amd64.go:122] [ 4676( 83): 4676( 83)] Allocate a new trap: 0xc0021005d0 36 D0318 16:20:36.042996 355572 usertrap_amd64.go:225] [ 4676( 83): 4676( 83)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:36.046263 355572 usertrap_amd64.go:212] [ 4676( 83): 4676( 83)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:36.046321 355572 usertrap_amd64.go:122] [ 4676( 83): 4676( 83)] Allocate a new trap: 0xc0021005d0 37 D0318 16:20:36.046408 355572 usertrap_amd64.go:225] [ 4676( 83): 4676( 83)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:36.048441 355572 usertrap_amd64.go:212] [ 4673(1167): 4673(1167)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.048499 355572 usertrap_amd64.go:122] [ 4673(1167): 4673(1167)] Allocate a new trap: 0xc000976ab0 39 D0318 16:20:36.048587 355572 usertrap_amd64.go:225] [ 4673(1167): 4673(1167)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.051574 355572 usertrap_amd64.go:212] [ 4675(1188): 4675(1188)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.051678 355572 usertrap_amd64.go:122] [ 4675(1188): 4675(1188)] Allocate a new trap: 0xc00637c870 39 D0318 16:20:36.051783 355572 usertrap_amd64.go:225] [ 4675(1188): 4675(1188)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.053134 355572 usertrap_amd64.go:212] [ 4674( 745): 4674( 745)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.053318 355572 usertrap_amd64.go:122] [ 4674( 745): 4674( 745)] Allocate a new trap: 0xc0021005a0 39 D0318 16:20:36.053559 355572 usertrap_amd64.go:225] [ 4674( 745): 4674( 745)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.059663 355572 usertrap_amd64.go:212] [ 4676( 83): 4676( 83)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:36.059837 355572 usertrap_amd64.go:122] [ 4676( 83): 4676( 83)] Allocate a new trap: 0xc0021005d0 38 D0318 16:20:36.060069 355572 usertrap_amd64.go:225] [ 4676( 83): 4676( 83)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:36.059977 355572 usertrap_amd64.go:212] [ 4673(1167): 4673(1167)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.060361 355572 usertrap_amd64.go:122] [ 4673(1167): 4673(1167)] Allocate a new trap: 0xc000976ab0 40 D0318 16:20:36.060481 355572 usertrap_amd64.go:225] [ 4673(1167): 4673(1167)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.061188 355572 usertrap_amd64.go:212] [ 4675(1188): 4675(1188)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.061289 355572 usertrap_amd64.go:122] [ 4675(1188): 4675(1188)] Allocate a new trap: 0xc00637c870 40 D0318 16:20:36.061367 355572 usertrap_amd64.go:225] [ 4675(1188): 4675(1188)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.062594 355572 usertrap_amd64.go:212] [ 4673(1167): 4673(1167)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.062686 355572 usertrap_amd64.go:122] [ 4673(1167): 4673(1167)] Allocate a new trap: 0xc000976ab0 41 D0318 16:20:36.062786 355572 usertrap_amd64.go:225] [ 4673(1167): 4673(1167)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.062821 355572 usertrap_amd64.go:212] [ 4674( 745): 4674( 745)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.062872 355572 usertrap_amd64.go:122] [ 4674( 745): 4674( 745)] Allocate a new trap: 0xc0021005a0 40 D0318 16:20:36.062951 355572 usertrap_amd64.go:225] [ 4674( 745): 4674( 745)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.063065 355572 usertrap_amd64.go:212] [ 4673(1167): 4677(1168)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.063136 355572 usertrap_amd64.go:122] [ 4673(1167): 4677(1168)] Allocate a new trap: 0xc000976ab0 42 D0318 16:20:36.063213 355572 usertrap_amd64.go:225] [ 4673(1167): 4677(1168)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.063746 355572 usertrap_amd64.go:212] [ 4675(1188): 4675(1188)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.063869 355572 usertrap_amd64.go:122] [ 4675(1188): 4675(1188)] Allocate a new trap: 0xc00637c870 41 D0318 16:20:36.063961 355572 usertrap_amd64.go:225] [ 4675(1188): 4675(1188)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.064726 355572 usertrap_amd64.go:212] [ 4675(1188): 4678(1189)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.064824 355572 usertrap_amd64.go:122] [ 4675(1188): 4678(1189)] Allocate a new trap: 0xc00637c870 42 D0318 16:20:36.065118 355572 usertrap_amd64.go:212] [ 4674( 745): 4674( 745)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.065216 355572 usertrap_amd64.go:122] [ 4674( 745): 4674( 745)] Allocate a new trap: 0xc0021005a0 41 D0318 16:20:36.065239 355572 usertrap_amd64.go:225] [ 4675(1188): 4678(1189)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.065304 355572 usertrap_amd64.go:225] [ 4674( 745): 4674( 745)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.065960 355572 usertrap_amd64.go:212] [ 4674( 745): 4679( 746)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.066045 355572 usertrap_amd64.go:122] [ 4674( 745): 4679( 746)] Allocate a new trap: 0xc0021005a0 42 D0318 16:20:36.066134 355572 usertrap_amd64.go:225] [ 4674( 745): 4679( 746)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) I0318 16:20:36.066134 355572 loader.go:185] [ 4673(1167): 4677(1168)] Error opening : no such file or directory D0318 16:20:36.067047 355572 usertrap_amd64.go:212] [ 4673(1167): 4673(1167)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.067118 355572 usertrap_amd64.go:122] [ 4673(1167): 4673(1167)] Allocate a new trap: 0xc000976ab0 43 D0318 16:20:36.067204 355572 usertrap_amd64.go:225] [ 4673(1167): 4673(1167)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.067720 355572 usertrap_amd64.go:212] [ 4675(1188): 4675(1188)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.067815 355572 usertrap_amd64.go:212] [ 4676( 83): 4676( 83)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:36.067843 355572 usertrap_amd64.go:122] [ 4675(1188): 4675(1188)] Allocate a new trap: 0xc00637c870 43 D0318 16:20:36.067970 355572 usertrap_amd64.go:122] [ 4676( 83): 4676( 83)] Allocate a new trap: 0xc0021005d0 39 D0318 16:20:36.068185 355572 usertrap_amd64.go:225] [ 4676( 83): 4676( 83)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:36.068175 355572 usertrap_amd64.go:225] [ 4675(1188): 4675(1188)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.069894 355572 usertrap_amd64.go:212] [ 4676( 83): 4676( 83)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:36.069964 355572 usertrap_amd64.go:122] [ 4676( 83): 4676( 83)] Allocate a new trap: 0xc0021005d0 40 D0318 16:20:36.070061 355572 usertrap_amd64.go:225] [ 4676( 83): 4676( 83)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:36.070318 355572 usertrap_amd64.go:212] [ 4676( 83): 4680( 84)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:36.070386 355572 usertrap_amd64.go:122] [ 4676( 83): 4680( 84)] Allocate a new trap: 0xc0021005d0 41 D0318 16:20:36.070549 355572 usertrap_amd64.go:225] [ 4676( 83): 4680( 84)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:36.072119 355572 usertrap_amd64.go:212] [ 4676( 83): 4676( 83)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:36.072221 355572 usertrap_amd64.go:122] [ 4676( 83): 4676( 83)] Allocate a new trap: 0xc0021005d0 42 D0318 16:20:36.072325 355572 usertrap_amd64.go:225] [ 4676( 83): 4676( 83)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:36.072924 355572 task_exit.go:204] [ 4673(1167): 4673(1167)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.073206 355572 task_signals.go:204] [ 4673(1167): 4677(1168)] Signal 9, PID: 4673, TID: 4677, fault addr: 0x0: terminating thread group D0318 16:20:36.073343 355572 task_exit.go:204] [ 4673(1167): 4677(1168)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.073475 355572 task_signals.go:204] [ 4675(1188): 4678(1189)] Signal 9, PID: 4675, TID: 4678, fault addr: 0x0: terminating thread group D0318 16:20:36.073531 355572 task_exit.go:204] [ 4675(1188): 4675(1188)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.074150 355572 task_exit.go:204] [ 4675(1188): 4675(1188)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.074815 355572 task_exit.go:204] [ 4675(1188): 4678(1189)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.075262 355572 task_exit.go:204] [ 4673(1167): 4673(1167)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.077148 355572 task_exit.go:204] [ 4676( 83): 4676( 83)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.077392 355572 task_signals.go:204] [ 4676( 83): 4680( 84)] Signal 9, PID: 4676, TID: 4680, fault addr: 0x0: terminating thread group D0318 16:20:36.077849 355572 task_exit.go:204] [ 4676( 83): 4676( 83)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.078230 355572 task_exit.go:204] [ 4676( 83): 4680( 84)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.079521 355572 task_exit.go:204] [ 4673(1167): 4677(1168)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.079844 355572 task_exit.go:204] [ 4673(1167): 4677(1168)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.080071 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.080362 355572 task_exit.go:204] [ 4673(1167): 4673(1167)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.080573 355572 task_signals.go:309] [ 4674( 745): 4679( 746)] failed to restore from a signal frame: bad address D0318 16:20:36.080715 355572 task_signals.go:470] [ 4674( 745): 4679( 746)] Notified of signal 11 D0318 16:20:36.080831 355572 task_signals.go:220] [ 4674( 745): 4679( 746)] Signal 11: delivering to handler D0318 16:20:36.081319 355572 task_exit.go:204] [ 4675(1188): 4678(1189)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.081397 355572 task_exit.go:204] [ 4675(1188): 4678(1189)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.081477 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 16:20:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x3, 0x0, &(0x7f0000000180)) D0318 16:20:36.082123 355572 task_exit.go:204] [ 4675(1188): 4675(1188)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.082356 355572 usertrap_amd64.go:212] [ 4674( 745): 4674( 745)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.082413 355572 usertrap_amd64.go:122] [ 4674( 745): 4674( 745)] Allocate a new trap: 0xc0021005a0 43 D0318 16:20:36.082494 355572 usertrap_amd64.go:225] [ 4674( 745): 4674( 745)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) 16:20:36 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @dev}, 0xc) syz_emit_ethernet(0x36, &(0x7f0000001800)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast=0xfeffffff}, @timestamp_reply={0x12, 0x0, 0x0, 0xe000, 0x2}}}}}, 0x0) D0318 16:20:36.083726 355572 task_exit.go:204] [ 4676( 83): 4680( 84)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.083807 355572 task_exit.go:204] [ 4676( 83): 4680( 84)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.083904 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:36.084279 355572 task_exit.go:204] [ 4676( 83): 4676( 83)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 0: add_key$user(&(0x7f0000000440), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000940), 0x0, 0x0, 0x0, 0xfffffffffffffffe) D0318 16:20:36.090134 355572 task_exit.go:204] [ 4674( 745): 4674( 745)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.090837 355572 task_signals.go:204] [ 4674( 745): 4679( 746)] Signal 9, PID: 4674, TID: 4679, fault addr: 0x0: terminating thread group D0318 16:20:36.090927 355572 task_exit.go:204] [ 4674( 745): 4674( 745)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.091099 355572 task_exit.go:204] [ 4674( 745): 4679( 746)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.096668 355572 task_exit.go:204] [ 4674( 745): 4679( 746)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.096743 355572 task_exit.go:204] [ 4674( 745): 4679( 746)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.096835 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.096939 355572 task_exit.go:204] [ 4674( 745): 4674( 745)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 2: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000003c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) D0318 16:20:36.112148 355572 usertrap_amd64.go:212] [ 4681(1169): 4681(1169)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.112286 355572 usertrap_amd64.go:122] [ 4681(1169): 4681(1169)] Allocate a new trap: 0xc000526ed0 37 D0318 16:20:36.113161 355572 usertrap_amd64.go:225] [ 4681(1169): 4681(1169)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.113398 355572 usertrap_amd64.go:212] [ 4682(1190): 4682(1190)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.113480 355572 usertrap_amd64.go:122] [ 4682(1190): 4682(1190)] Allocate a new trap: 0xc000bced20 37 D0318 16:20:36.114130 355572 usertrap_amd64.go:225] [ 4682(1190): 4682(1190)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.118101 355572 usertrap_amd64.go:212] [ 4681(1169): 4681(1169)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.118217 355572 usertrap_amd64.go:122] [ 4681(1169): 4681(1169)] Allocate a new trap: 0xc000526ed0 38 D0318 16:20:36.118305 355572 usertrap_amd64.go:225] [ 4681(1169): 4681(1169)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.118244 355572 usertrap_amd64.go:212] [ 4682(1190): 4682(1190)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.118477 355572 usertrap_amd64.go:122] [ 4682(1190): 4682(1190)] Allocate a new trap: 0xc000bced20 38 D0318 16:20:36.118572 355572 usertrap_amd64.go:225] [ 4682(1190): 4682(1190)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.124205 355572 usertrap_amd64.go:212] [ 4683( 85): 4683( 85)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:36.124350 355572 usertrap_amd64.go:122] [ 4683( 85): 4683( 85)] Allocate a new trap: 0xc00637c8d0 36 D0318 16:20:36.124955 355572 usertrap_amd64.go:225] [ 4683( 85): 4683( 85)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:36.126745 355572 usertrap_amd64.go:212] [ 4684( 747): 4684( 747)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.126925 355572 usertrap_amd64.go:122] [ 4684( 747): 4684( 747)] Allocate a new trap: 0xc0002d30e0 37 D0318 16:20:36.129990 355572 usertrap_amd64.go:225] [ 4684( 747): 4684( 747)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.132603 355572 usertrap_amd64.go:212] [ 4681(1169): 4681(1169)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.132696 355572 usertrap_amd64.go:122] [ 4681(1169): 4681(1169)] Allocate a new trap: 0xc000526ed0 39 D0318 16:20:36.132787 355572 usertrap_amd64.go:225] [ 4681(1169): 4681(1169)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.134443 355572 usertrap_amd64.go:212] [ 4684( 747): 4684( 747)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.134514 355572 usertrap_amd64.go:122] [ 4684( 747): 4684( 747)] Allocate a new trap: 0xc0002d30e0 38 D0318 16:20:36.134646 355572 usertrap_amd64.go:225] [ 4684( 747): 4684( 747)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.136394 355572 usertrap_amd64.go:212] [ 4683( 85): 4683( 85)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:36.136463 355572 usertrap_amd64.go:122] [ 4683( 85): 4683( 85)] Allocate a new trap: 0xc00637c8d0 37 D0318 16:20:36.136540 355572 usertrap_amd64.go:225] [ 4683( 85): 4683( 85)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:36.136748 355572 usertrap_amd64.go:212] [ 4682(1190): 4682(1190)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.136907 355572 usertrap_amd64.go:122] [ 4682(1190): 4682(1190)] Allocate a new trap: 0xc000bced20 39 D0318 16:20:36.136992 355572 usertrap_amd64.go:225] [ 4682(1190): 4682(1190)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.140598 355572 usertrap_amd64.go:212] [ 4681(1169): 4681(1169)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.140699 355572 usertrap_amd64.go:122] [ 4681(1169): 4681(1169)] Allocate a new trap: 0xc000526ed0 40 D0318 16:20:36.140777 355572 usertrap_amd64.go:225] [ 4681(1169): 4681(1169)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.142099 355572 usertrap_amd64.go:212] [ 4681(1169): 4681(1169)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.142164 355572 usertrap_amd64.go:122] [ 4681(1169): 4681(1169)] Allocate a new trap: 0xc000526ed0 41 D0318 16:20:36.142248 355572 usertrap_amd64.go:225] [ 4681(1169): 4681(1169)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.142669 355572 usertrap_amd64.go:212] [ 4681(1169): 4685(1170)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.142768 355572 usertrap_amd64.go:122] [ 4681(1169): 4685(1170)] Allocate a new trap: 0xc000526ed0 42 D0318 16:20:36.142834 355572 usertrap_amd64.go:225] [ 4681(1169): 4685(1170)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.145223 355572 usertrap_amd64.go:212] [ 4681(1169): 4681(1169)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.145317 355572 usertrap_amd64.go:122] [ 4681(1169): 4681(1169)] Allocate a new trap: 0xc000526ed0 43 D0318 16:20:36.145387 355572 usertrap_amd64.go:225] [ 4681(1169): 4681(1169)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.146658 355572 usertrap_amd64.go:212] [ 4682(1190): 4682(1190)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.146720 355572 usertrap_amd64.go:122] [ 4682(1190): 4682(1190)] Allocate a new trap: 0xc000bced20 40 D0318 16:20:36.146828 355572 usertrap_amd64.go:225] [ 4682(1190): 4682(1190)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.148413 355572 usertrap_amd64.go:212] [ 4682(1190): 4682(1190)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.148500 355572 usertrap_amd64.go:122] [ 4682(1190): 4682(1190)] Allocate a new trap: 0xc000bced20 41 D0318 16:20:36.148590 355572 usertrap_amd64.go:225] [ 4682(1190): 4682(1190)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.148834 355572 usertrap_amd64.go:212] [ 4682(1190): 4686(1191)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.148925 355572 usertrap_amd64.go:122] [ 4682(1190): 4686(1191)] Allocate a new trap: 0xc000bced20 42 D0318 16:20:36.148929 355572 task_exit.go:204] [ 4681(1169): 4681(1169)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.149005 355572 usertrap_amd64.go:225] [ 4682(1190): 4686(1191)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.149092 355572 task_signals.go:204] [ 4681(1169): 4685(1170)] Signal 9, PID: 4681, TID: 4685, fault addr: 0x0: terminating thread group D0318 16:20:36.149916 355572 task_exit.go:204] [ 4681(1169): 4685(1170)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.150595 355572 usertrap_amd64.go:212] [ 4683( 85): 4683( 85)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:36.150634 355572 task_exit.go:204] [ 4681(1169): 4681(1169)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.150680 355572 usertrap_amd64.go:122] [ 4683( 85): 4683( 85)] Allocate a new trap: 0xc00637c8d0 38 D0318 16:20:36.150755 355572 usertrap_amd64.go:225] [ 4683( 85): 4683( 85)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:36.150865 355572 usertrap_amd64.go:212] [ 4684( 747): 4684( 747)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.150946 355572 usertrap_amd64.go:122] [ 4684( 747): 4684( 747)] Allocate a new trap: 0xc0002d30e0 39 D0318 16:20:36.151054 355572 usertrap_amd64.go:225] [ 4684( 747): 4684( 747)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.152130 355572 usertrap_amd64.go:212] [ 4682(1190): 4686(1191)] Found the pattern at ip 55ec958b2ae8:sysno 1 D0318 16:20:36.152201 355572 usertrap_amd64.go:122] [ 4682(1190): 4686(1191)] Allocate a new trap: 0xc000bced20 43 D0318 16:20:36.152277 355572 usertrap_amd64.go:225] [ 4682(1190): 4686(1191)] Apply the binary patch addr 55ec958b2ae8 trap addr 66d70 ([184 1 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.155800 355572 task_exit.go:204] [ 4681(1169): 4685(1170)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.155891 355572 task_exit.go:204] [ 4681(1169): 4685(1170)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.155965 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.156140 355572 task_exit.go:204] [ 4681(1169): 4681(1169)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.157140 355572 usertrap_amd64.go:212] [ 4682(1190): 4682(1190)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.157225 355572 usertrap_amd64.go:122] [ 4682(1190): 4682(1190)] Allocate a new trap: 0xc000bced20 44 D0318 16:20:36.157322 355572 usertrap_amd64.go:225] [ 4682(1190): 4682(1190)] Apply the binary patch addr 55ec958b2c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) 16:20:36 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:36.159401 355572 task_exit.go:204] [ 4682(1190): 4682(1190)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.160060 355572 task_signals.go:204] [ 4682(1190): 4686(1191)] Signal 9, PID: 4682, TID: 4686, fault addr: 0x0: terminating thread group D0318 16:20:36.160158 355572 task_exit.go:204] [ 4682(1190): 4682(1190)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.160230 355572 usertrap_amd64.go:212] [ 4683( 85): 4683( 85)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:36.160304 355572 usertrap_amd64.go:122] [ 4683( 85): 4683( 85)] Allocate a new trap: 0xc00637c8d0 39 D0318 16:20:36.160326 355572 task_exit.go:204] [ 4682(1190): 4686(1191)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.160431 355572 usertrap_amd64.go:225] [ 4683( 85): 4683( 85)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:36.160878 355572 usertrap_amd64.go:212] [ 4684( 747): 4684( 747)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.160943 355572 usertrap_amd64.go:122] [ 4684( 747): 4684( 747)] Allocate a new trap: 0xc0002d30e0 40 D0318 16:20:36.161069 355572 usertrap_amd64.go:225] [ 4684( 747): 4684( 747)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.162175 355572 usertrap_amd64.go:212] [ 4683( 85): 4683( 85)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:36.162240 355572 usertrap_amd64.go:122] [ 4683( 85): 4683( 85)] Allocate a new trap: 0xc00637c8d0 40 D0318 16:20:36.162341 355572 usertrap_amd64.go:225] [ 4683( 85): 4683( 85)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:36.162774 355572 usertrap_amd64.go:212] [ 4683( 85): 4687( 86)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:36.162867 355572 usertrap_amd64.go:122] [ 4683( 85): 4687( 86)] Allocate a new trap: 0xc00637c8d0 41 D0318 16:20:36.162969 355572 usertrap_amd64.go:225] [ 4683( 85): 4687( 86)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:36.163582 355572 usertrap_amd64.go:212] [ 4684( 747): 4684( 747)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.163770 355572 usertrap_amd64.go:122] [ 4684( 747): 4684( 747)] Allocate a new trap: 0xc0002d30e0 41 D0318 16:20:36.163925 355572 usertrap_amd64.go:225] [ 4684( 747): 4684( 747)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.164095 355572 usertrap_amd64.go:212] [ 4684( 747): 4688( 748)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.164184 355572 usertrap_amd64.go:122] [ 4684( 747): 4688( 748)] Allocate a new trap: 0xc0002d30e0 42 D0318 16:20:36.164245 355572 usertrap_amd64.go:225] [ 4684( 747): 4688( 748)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.164544 355572 usertrap_amd64.go:212] [ 4683( 85): 4683( 85)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:36.164667 355572 usertrap_amd64.go:122] [ 4683( 85): 4683( 85)] Allocate a new trap: 0xc00637c8d0 42 D0318 16:20:36.164737 355572 usertrap_amd64.go:225] [ 4683( 85): 4683( 85)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:36.165653 355572 task_exit.go:204] [ 4682(1190): 4686(1191)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.165744 355572 task_exit.go:204] [ 4682(1190): 4686(1191)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.165892 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.166135 355572 usertrap_amd64.go:212] [ 4684( 747): 4684( 747)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.166228 355572 usertrap_amd64.go:122] [ 4684( 747): 4684( 747)] Allocate a new trap: 0xc0002d30e0 43 D0318 16:20:36.166315 355572 usertrap_amd64.go:225] [ 4684( 747): 4684( 747)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.166497 355572 task_exit.go:204] [ 4682(1190): 4682(1190)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 3: removexattr(&(0x7f0000000080)='./file1\x00', 0x0) D0318 16:20:36.173755 355572 task_exit.go:204] [ 4683( 85): 4683( 85)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.173885 355572 task_signals.go:204] [ 4683( 85): 4687( 86)] Signal 9, PID: 4683, TID: 4687, fault addr: 0x0: terminating thread group D0318 16:20:36.174424 355572 task_exit.go:204] [ 4683( 85): 4687( 86)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.174559 355572 task_exit.go:204] [ 4683( 85): 4683( 85)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.176452 355572 task_exit.go:204] [ 4684( 747): 4684( 747)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.176655 355572 task_signals.go:204] [ 4684( 747): 4688( 748)] Signal 9, PID: 4684, TID: 4688, fault addr: 0x0: terminating thread group D0318 16:20:36.177124 355572 task_exit.go:204] [ 4684( 747): 4684( 747)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.177438 355572 task_exit.go:204] [ 4684( 747): 4688( 748)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.180462 355572 task_exit.go:204] [ 4683( 85): 4687( 86)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.180542 355572 task_exit.go:204] [ 4683( 85): 4687( 86)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.180636 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:36.180772 355572 task_exit.go:204] [ 4683( 85): 4683( 85)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000040)) D0318 16:20:36.182744 355572 usertrap_amd64.go:212] [ 4689(1171): 4689(1171)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.182856 355572 usertrap_amd64.go:122] [ 4689(1171): 4689(1171)] Allocate a new trap: 0xc000e1cd20 37 D0318 16:20:36.183220 355572 task_exit.go:204] [ 4684( 747): 4688( 748)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.183279 355572 task_exit.go:204] [ 4684( 747): 4688( 748)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.183353 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.183822 355572 usertrap_amd64.go:225] [ 4689(1171): 4689(1171)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.183996 355572 task_exit.go:204] [ 4684( 747): 4684( 747)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 2: execveat(0xffffffffffffffff, &(0x7f0000001000)='./file0\x00', 0x0, 0x0, 0x1100) D0318 16:20:36.188598 355572 usertrap_amd64.go:212] [ 4689(1171): 4689(1171)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.188680 355572 usertrap_amd64.go:122] [ 4689(1171): 4689(1171)] Allocate a new trap: 0xc000e1cd20 38 D0318 16:20:36.188765 355572 usertrap_amd64.go:225] [ 4689(1171): 4689(1171)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.192878 355572 usertrap_amd64.go:212] [ 4690(1192): 4690(1192)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.192983 355572 usertrap_amd64.go:122] [ 4690(1192): 4690(1192)] Allocate a new trap: 0xc0057288a0 37 D0318 16:20:36.193454 355572 usertrap_amd64.go:225] [ 4690(1192): 4690(1192)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.196777 355572 usertrap_amd64.go:212] [ 4690(1192): 4690(1192)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.196844 355572 usertrap_amd64.go:122] [ 4690(1192): 4690(1192)] Allocate a new trap: 0xc0057288a0 38 D0318 16:20:36.196907 355572 usertrap_amd64.go:225] [ 4690(1192): 4690(1192)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.200859 355572 usertrap_amd64.go:212] [ 4689(1171): 4689(1171)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.200994 355572 usertrap_amd64.go:122] [ 4689(1171): 4689(1171)] Allocate a new trap: 0xc000e1cd20 39 D0318 16:20:36.201093 355572 usertrap_amd64.go:225] [ 4689(1171): 4689(1171)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.208676 355572 usertrap_amd64.go:212] [ 4689(1171): 4689(1171)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.208898 355572 usertrap_amd64.go:122] [ 4689(1171): 4689(1171)] Allocate a new trap: 0xc000e1cd20 40 D0318 16:20:36.209014 355572 usertrap_amd64.go:225] [ 4689(1171): 4689(1171)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.209067 355572 usertrap_amd64.go:212] [ 4690(1192): 4690(1192)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.209180 355572 usertrap_amd64.go:122] [ 4690(1192): 4690(1192)] Allocate a new trap: 0xc0057288a0 39 D0318 16:20:36.209304 355572 usertrap_amd64.go:225] [ 4690(1192): 4690(1192)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.210274 355572 usertrap_amd64.go:212] [ 4689(1171): 4689(1171)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.210371 355572 usertrap_amd64.go:122] [ 4689(1171): 4689(1171)] Allocate a new trap: 0xc000e1cd20 41 D0318 16:20:36.210447 355572 usertrap_amd64.go:225] [ 4689(1171): 4689(1171)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.210883 355572 usertrap_amd64.go:212] [ 4689(1171): 4693(1172)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.210957 355572 usertrap_amd64.go:122] [ 4689(1171): 4693(1172)] Allocate a new trap: 0xc000e1cd20 42 D0318 16:20:36.211065 355572 usertrap_amd64.go:225] [ 4689(1171): 4693(1172)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.213794 355572 task_signals.go:309] [ 4689(1171): 4693(1172)] failed to restore from a signal frame: bad address D0318 16:20:36.213890 355572 task_signals.go:470] [ 4689(1171): 4693(1172)] Notified of signal 11 D0318 16:20:36.213992 355572 task_signals.go:220] [ 4689(1171): 4693(1172)] Signal 11: delivering to handler D0318 16:20:36.215364 355572 usertrap_amd64.go:212] [ 4689(1171): 4689(1171)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.215529 355572 usertrap_amd64.go:122] [ 4689(1171): 4689(1171)] Allocate a new trap: 0xc000e1cd20 43 D0318 16:20:36.215644 355572 usertrap_amd64.go:225] [ 4689(1171): 4689(1171)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.216875 355572 usertrap_amd64.go:212] [ 4690(1192): 4690(1192)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.216949 355572 usertrap_amd64.go:122] [ 4690(1192): 4690(1192)] Allocate a new trap: 0xc0057288a0 40 D0318 16:20:36.217032 355572 usertrap_amd64.go:225] [ 4690(1192): 4690(1192)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.217011 355572 usertrap_amd64.go:212] [ 4691( 749): 4691( 749)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.217160 355572 usertrap_amd64.go:122] [ 4691( 749): 4691( 749)] Allocate a new trap: 0xc0008f2cf0 37 D0318 16:20:36.217852 355572 usertrap_amd64.go:225] [ 4691( 749): 4691( 749)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.218611 355572 usertrap_amd64.go:212] [ 4690(1192): 4690(1192)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.218667 355572 usertrap_amd64.go:122] [ 4690(1192): 4690(1192)] Allocate a new trap: 0xc0057288a0 41 D0318 16:20:36.218746 355572 usertrap_amd64.go:225] [ 4690(1192): 4690(1192)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.219117 355572 usertrap_amd64.go:212] [ 4690(1192): 4694(1193)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.219203 355572 usertrap_amd64.go:122] [ 4690(1192): 4694(1193)] Allocate a new trap: 0xc0057288a0 42 D0318 16:20:36.219278 355572 usertrap_amd64.go:225] [ 4690(1192): 4694(1193)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.220454 355572 usertrap_amd64.go:212] [ 4692( 87): 4692( 87)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:36.220581 355572 usertrap_amd64.go:122] [ 4692( 87): 4692( 87)] Allocate a new trap: 0xc0008f2d50 36 D0318 16:20:36.221393 355572 usertrap_amd64.go:212] [ 4690(1192): 4690(1192)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.221637 355572 usertrap_amd64.go:212] [ 4691( 749): 4691( 749)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.221705 355572 usertrap_amd64.go:122] [ 4691( 749): 4691( 749)] Allocate a new trap: 0xc0008f2cf0 38 D0318 16:20:36.221630 355572 usertrap_amd64.go:122] [ 4690(1192): 4690(1192)] Allocate a new trap: 0xc0057288a0 43 D0318 16:20:36.221807 355572 usertrap_amd64.go:225] [ 4691( 749): 4691( 749)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.221820 355572 usertrap_amd64.go:225] [ 4690(1192): 4690(1192)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.222348 355572 usertrap_amd64.go:225] [ 4692( 87): 4692( 87)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:36.222385 355572 task_exit.go:204] [ 4689(1171): 4689(1171)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.222654 355572 task_signals.go:204] [ 4689(1171): 4693(1172)] Signal 9, PID: 4689, TID: 4693, fault addr: 0x0: terminating thread group D0318 16:20:36.223078 355572 task_exit.go:204] [ 4689(1171): 4693(1172)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.223208 355572 task_exit.go:204] [ 4689(1171): 4689(1171)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.225375 355572 usertrap_amd64.go:212] [ 4692( 87): 4692( 87)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:36.225445 355572 usertrap_amd64.go:122] [ 4692( 87): 4692( 87)] Allocate a new trap: 0xc0008f2d50 37 D0318 16:20:36.225517 355572 usertrap_amd64.go:225] [ 4692( 87): 4692( 87)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:36.226549 355572 task_exit.go:204] [ 4690(1192): 4690(1192)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.227265 355572 task_signals.go:204] [ 4690(1192): 4694(1193)] Signal 9, PID: 4690, TID: 4694, fault addr: 0x0: terminating thread group D0318 16:20:36.227297 355572 task_exit.go:204] [ 4690(1192): 4690(1192)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.227548 355572 task_exit.go:204] [ 4690(1192): 4694(1193)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.229234 355572 task_exit.go:204] [ 4689(1171): 4693(1172)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.229296 355572 task_exit.go:204] [ 4689(1171): 4693(1172)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.229378 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.230527 355572 task_exit.go:204] [ 4689(1171): 4689(1171)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x53, 0x0, &(0x7f0000000180)) D0318 16:20:36.232932 355572 task_exit.go:204] [ 4690(1192): 4694(1193)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.233007 355572 task_exit.go:204] [ 4690(1192): 4694(1193)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.233145 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.233249 355572 task_exit.go:204] [ 4690(1192): 4690(1192)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(0x0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:36.237537 355572 usertrap_amd64.go:212] [ 4692( 87): 4692( 87)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:36.237611 355572 usertrap_amd64.go:122] [ 4692( 87): 4692( 87)] Allocate a new trap: 0xc0008f2d50 38 D0318 16:20:36.237690 355572 usertrap_amd64.go:225] [ 4692( 87): 4692( 87)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:36.245657 355572 usertrap_amd64.go:212] [ 4692( 87): 4692( 87)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:36.245722 355572 usertrap_amd64.go:122] [ 4692( 87): 4692( 87)] Allocate a new trap: 0xc0008f2d50 39 D0318 16:20:36.245830 355572 usertrap_amd64.go:225] [ 4692( 87): 4692( 87)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:36.247298 355572 usertrap_amd64.go:212] [ 4692( 87): 4692( 87)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:36.247400 355572 usertrap_amd64.go:212] [ 4691( 749): 4691( 749)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.247453 355572 usertrap_amd64.go:122] [ 4691( 749): 4691( 749)] Allocate a new trap: 0xc0008f2cf0 39 D0318 16:20:36.247418 355572 usertrap_amd64.go:122] [ 4692( 87): 4692( 87)] Allocate a new trap: 0xc0008f2d50 40 D0318 16:20:36.247528 355572 usertrap_amd64.go:225] [ 4691( 749): 4691( 749)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.247546 355572 usertrap_amd64.go:225] [ 4692( 87): 4692( 87)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:36.247910 355572 usertrap_amd64.go:212] [ 4692( 87): 4695( 88)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:36.247961 355572 usertrap_amd64.go:122] [ 4692( 87): 4695( 88)] Allocate a new trap: 0xc0008f2d50 41 D0318 16:20:36.248018 355572 usertrap_amd64.go:225] [ 4692( 87): 4695( 88)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:36.250623 355572 usertrap_amd64.go:212] [ 4692( 87): 4692( 87)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:36.250695 355572 usertrap_amd64.go:122] [ 4692( 87): 4692( 87)] Allocate a new trap: 0xc0008f2d50 42 D0318 16:20:36.250786 355572 usertrap_amd64.go:225] [ 4692( 87): 4692( 87)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:36.254738 355572 usertrap_amd64.go:212] [ 4691( 749): 4691( 749)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.254922 355572 usertrap_amd64.go:122] [ 4691( 749): 4691( 749)] Allocate a new trap: 0xc0008f2cf0 40 D0318 16:20:36.255094 355572 usertrap_amd64.go:225] [ 4691( 749): 4691( 749)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.256588 355572 task_signals.go:204] [ 4692( 87): 4695( 88)] Signal 9, PID: 4692, TID: 4695, fault addr: 0x0: terminating thread group D0318 16:20:36.256716 355572 usertrap_amd64.go:212] [ 4691( 749): 4691( 749)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.256703 355572 task_exit.go:204] [ 4692( 87): 4692( 87)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.256797 355572 usertrap_amd64.go:122] [ 4691( 749): 4691( 749)] Allocate a new trap: 0xc0008f2cf0 41 D0318 16:20:36.256888 355572 usertrap_amd64.go:225] [ 4691( 749): 4691( 749)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.257212 355572 usertrap_amd64.go:212] [ 4691( 749): 4698( 750)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.257303 355572 usertrap_amd64.go:122] [ 4691( 749): 4698( 750)] Allocate a new trap: 0xc0008f2cf0 42 D0318 16:20:36.257383 355572 usertrap_amd64.go:225] [ 4691( 749): 4698( 750)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.257443 355572 task_exit.go:204] [ 4692( 87): 4692( 87)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.257751 355572 task_exit.go:204] [ 4692( 87): 4695( 88)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.259982 355572 usertrap_amd64.go:212] [ 4691( 749): 4691( 749)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.260075 355572 usertrap_amd64.go:122] [ 4691( 749): 4691( 749)] Allocate a new trap: 0xc0008f2cf0 43 D0318 16:20:36.260162 355572 usertrap_amd64.go:225] [ 4691( 749): 4691( 749)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.262120 355572 usertrap_amd64.go:212] [ 4697(1173): 4697(1173)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.262235 355572 usertrap_amd64.go:122] [ 4697(1173): 4697(1173)] Allocate a new trap: 0xc0078f6810 37 D0318 16:20:36.263054 355572 usertrap_amd64.go:225] [ 4697(1173): 4697(1173)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.263242 355572 usertrap_amd64.go:212] [ 4696(1194): 4696(1194)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.263344 355572 usertrap_amd64.go:122] [ 4696(1194): 4696(1194)] Allocate a new trap: 0xc0005270b0 37 D0318 16:20:36.263704 355572 task_exit.go:204] [ 4691( 749): 4691( 749)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.264049 355572 usertrap_amd64.go:225] [ 4696(1194): 4696(1194)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.264884 355572 task_signals.go:204] [ 4691( 749): 4698( 750)] Signal 9, PID: 4691, TID: 4698, fault addr: 0x0: terminating thread group D0318 16:20:36.265488 355572 task_exit.go:204] [ 4691( 749): 4691( 749)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.265728 355572 task_exit.go:204] [ 4692( 87): 4695( 88)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.265789 355572 task_exit.go:204] [ 4692( 87): 4695( 88)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.265879 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:36.266085 355572 task_exit.go:204] [ 4691( 749): 4698( 750)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.266286 355572 task_exit.go:204] [ 4692( 87): 4692( 87)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.267468 355572 usertrap_amd64.go:212] [ 4696(1194): 4696(1194)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.267595 355572 usertrap_amd64.go:122] [ 4696(1194): 4696(1194)] Allocate a new trap: 0xc0005270b0 38 D0318 16:20:36.267712 355572 usertrap_amd64.go:225] [ 4696(1194): 4696(1194)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) 16:20:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) D0318 16:20:36.268436 355572 usertrap_amd64.go:212] [ 4697(1173): 4697(1173)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.268541 355572 usertrap_amd64.go:122] [ 4697(1173): 4697(1173)] Allocate a new trap: 0xc0078f6810 38 D0318 16:20:36.268675 355572 usertrap_amd64.go:225] [ 4697(1173): 4697(1173)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.272527 355572 task_exit.go:204] [ 4691( 749): 4698( 750)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.272711 355572 task_exit.go:204] [ 4691( 749): 4698( 750)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.272840 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.274774 355572 task_exit.go:204] [ 4691( 749): 4691( 749)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) fcntl$lock(r1, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000001, 0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x0) D0318 16:20:36.285475 355572 usertrap_amd64.go:212] [ 4697(1173): 4697(1173)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.285611 355572 usertrap_amd64.go:122] [ 4697(1173): 4697(1173)] Allocate a new trap: 0xc0078f6810 39 D0318 16:20:36.285716 355572 usertrap_amd64.go:225] [ 4697(1173): 4697(1173)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.289232 355572 usertrap_amd64.go:212] [ 4696(1194): 4696(1194)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.289296 355572 usertrap_amd64.go:122] [ 4696(1194): 4696(1194)] Allocate a new trap: 0xc0005270b0 39 D0318 16:20:36.289371 355572 usertrap_amd64.go:225] [ 4696(1194): 4696(1194)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.293889 355572 usertrap_amd64.go:212] [ 4697(1173): 4697(1173)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.293984 355572 usertrap_amd64.go:122] [ 4697(1173): 4697(1173)] Allocate a new trap: 0xc0078f6810 40 D0318 16:20:36.294104 355572 usertrap_amd64.go:225] [ 4697(1173): 4697(1173)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.295836 355572 usertrap_amd64.go:212] [ 4697(1173): 4697(1173)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.295933 355572 usertrap_amd64.go:122] [ 4697(1173): 4697(1173)] Allocate a new trap: 0xc0078f6810 41 D0318 16:20:36.296007 355572 usertrap_amd64.go:225] [ 4697(1173): 4697(1173)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.296179 355572 usertrap_amd64.go:212] [ 4697(1173): 4701(1174)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.296240 355572 usertrap_amd64.go:122] [ 4697(1173): 4701(1174)] Allocate a new trap: 0xc0078f6810 42 D0318 16:20:36.296329 355572 usertrap_amd64.go:225] [ 4697(1173): 4701(1174)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.299206 355572 usertrap_amd64.go:212] [ 4697(1173): 4697(1173)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.299301 355572 usertrap_amd64.go:122] [ 4697(1173): 4697(1173)] Allocate a new trap: 0xc0078f6810 43 D0318 16:20:36.299493 355572 usertrap_amd64.go:225] [ 4697(1173): 4697(1173)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.303243 355572 usertrap_amd64.go:212] [ 4696(1194): 4696(1194)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.303302 355572 usertrap_amd64.go:122] [ 4696(1194): 4696(1194)] Allocate a new trap: 0xc0005270b0 40 D0318 16:20:36.303353 355572 usertrap_amd64.go:225] [ 4696(1194): 4696(1194)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.304693 355572 usertrap_amd64.go:212] [ 4696(1194): 4696(1194)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.304782 355572 usertrap_amd64.go:122] [ 4696(1194): 4696(1194)] Allocate a new trap: 0xc0005270b0 41 D0318 16:20:36.304853 355572 usertrap_amd64.go:225] [ 4696(1194): 4696(1194)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.305346 355572 usertrap_amd64.go:212] [ 4696(1194): 4702(1195)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.305465 355572 usertrap_amd64.go:122] [ 4696(1194): 4702(1195)] Allocate a new trap: 0xc0005270b0 42 D0318 16:20:36.305543 355572 usertrap_amd64.go:225] [ 4696(1194): 4702(1195)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.306057 355572 usertrap_amd64.go:212] [ 4700( 751): 4700( 751)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.306187 355572 usertrap_amd64.go:122] [ 4700( 751): 4700( 751)] Allocate a new trap: 0xc00637c9c0 37 D0318 16:20:36.307141 355572 usertrap_amd64.go:212] [ 4699( 89): 4699( 89)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:36.307091 355572 usertrap_amd64.go:225] [ 4700( 751): 4700( 751)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.307215 355572 usertrap_amd64.go:122] [ 4699( 89): 4699( 89)] Allocate a new trap: 0xc000976c00 36 D0318 16:20:36.307500 355572 task_exit.go:204] [ 4697(1173): 4697(1173)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.307806 355572 task_signals.go:204] [ 4697(1173): 4701(1174)] Signal 9, PID: 4697, TID: 4701, fault addr: 0x0: terminating thread group D0318 16:20:36.308309 355572 usertrap_amd64.go:225] [ 4699( 89): 4699( 89)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:36.308352 355572 task_exit.go:204] [ 4697(1173): 4701(1174)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.308597 355572 task_exit.go:204] [ 4697(1173): 4697(1173)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.308600 355572 task_signals.go:309] [ 4696(1194): 4702(1195)] failed to restore from a signal frame: bad address D0318 16:20:36.308774 355572 task_signals.go:470] [ 4696(1194): 4702(1195)] Notified of signal 11 D0318 16:20:36.308866 355572 task_signals.go:220] [ 4696(1194): 4702(1195)] Signal 11: delivering to handler D0318 16:20:36.310074 355572 usertrap_amd64.go:212] [ 4696(1194): 4696(1194)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.310181 355572 usertrap_amd64.go:122] [ 4696(1194): 4696(1194)] Allocate a new trap: 0xc0005270b0 43 D0318 16:20:36.310283 355572 usertrap_amd64.go:225] [ 4696(1194): 4696(1194)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.311804 355572 usertrap_amd64.go:212] [ 4699( 89): 4699( 89)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:36.311882 355572 usertrap_amd64.go:122] [ 4699( 89): 4699( 89)] Allocate a new trap: 0xc000976c00 37 D0318 16:20:36.312103 355572 usertrap_amd64.go:225] [ 4699( 89): 4699( 89)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:36.312911 355572 usertrap_amd64.go:212] [ 4700( 751): 4700( 751)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.312971 355572 usertrap_amd64.go:122] [ 4700( 751): 4700( 751)] Allocate a new trap: 0xc00637c9c0 38 D0318 16:20:36.313103 355572 usertrap_amd64.go:225] [ 4700( 751): 4700( 751)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.313853 355572 task_exit.go:204] [ 4697(1173): 4701(1174)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.313928 355572 task_exit.go:204] [ 4697(1173): 4701(1174)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.314066 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.314425 355572 task_exit.go:204] [ 4697(1173): 4697(1173)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.315075 355572 task_exit.go:204] [ 4696(1194): 4696(1194)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.315510 355572 task_signals.go:204] [ 4696(1194): 4702(1195)] Signal 9, PID: 4696, TID: 4702, fault addr: 0x0: terminating thread group 16:20:36 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000001140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, 0x0) D0318 16:20:36.316166 355572 task_exit.go:204] [ 4696(1194): 4702(1195)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.316435 355572 task_exit.go:204] [ 4696(1194): 4696(1194)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.321982 355572 task_exit.go:204] [ 4696(1194): 4702(1195)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.322085 355572 task_exit.go:204] [ 4696(1194): 4702(1195)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.322201 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.322608 355572 task_exit.go:204] [ 4696(1194): 4696(1194)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0x8917, 0x0) D0318 16:20:36.328574 355572 usertrap_amd64.go:212] [ 4699( 89): 4699( 89)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:36.328635 355572 usertrap_amd64.go:122] [ 4699( 89): 4699( 89)] Allocate a new trap: 0xc000976c00 38 D0318 16:20:36.328754 355572 usertrap_amd64.go:225] [ 4699( 89): 4699( 89)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:36.330659 355572 usertrap_amd64.go:212] [ 4700( 751): 4700( 751)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.330720 355572 usertrap_amd64.go:122] [ 4700( 751): 4700( 751)] Allocate a new trap: 0xc00637c9c0 39 D0318 16:20:36.330782 355572 usertrap_amd64.go:225] [ 4700( 751): 4700( 751)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.338647 355572 usertrap_amd64.go:212] [ 4699( 89): 4699( 89)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:36.338771 355572 usertrap_amd64.go:122] [ 4699( 89): 4699( 89)] Allocate a new trap: 0xc000976c00 39 D0318 16:20:36.338855 355572 usertrap_amd64.go:225] [ 4699( 89): 4699( 89)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:36.339985 355572 usertrap_amd64.go:212] [ 4700( 751): 4700( 751)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.340159 355572 usertrap_amd64.go:122] [ 4700( 751): 4700( 751)] Allocate a new trap: 0xc00637c9c0 40 D0318 16:20:36.340285 355572 usertrap_amd64.go:225] [ 4700( 751): 4700( 751)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.341573 355572 usertrap_amd64.go:212] [ 4699( 89): 4699( 89)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:36.341644 355572 usertrap_amd64.go:122] [ 4699( 89): 4699( 89)] Allocate a new trap: 0xc000976c00 40 D0318 16:20:36.341773 355572 usertrap_amd64.go:225] [ 4699( 89): 4699( 89)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:36.342331 355572 usertrap_amd64.go:212] [ 4699( 89): 4704( 90)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:36.342419 355572 usertrap_amd64.go:122] [ 4699( 89): 4704( 90)] Allocate a new trap: 0xc000976c00 41 D0318 16:20:36.342589 355572 usertrap_amd64.go:225] [ 4699( 89): 4704( 90)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:36.342898 355572 usertrap_amd64.go:212] [ 4700( 751): 4700( 751)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.343059 355572 usertrap_amd64.go:122] [ 4700( 751): 4700( 751)] Allocate a new trap: 0xc00637c9c0 41 D0318 16:20:36.343194 355572 usertrap_amd64.go:225] [ 4700( 751): 4700( 751)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.343458 355572 usertrap_amd64.go:212] [ 4700( 751): 4705( 752)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.343676 355572 usertrap_amd64.go:122] [ 4700( 751): 4705( 752)] Allocate a new trap: 0xc00637c9c0 42 D0318 16:20:36.343824 355572 usertrap_amd64.go:225] [ 4700( 751): 4705( 752)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.349389 355572 usertrap_amd64.go:212] [ 4700( 751): 4700( 751)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.349462 355572 usertrap_amd64.go:122] [ 4700( 751): 4700( 751)] Allocate a new trap: 0xc00637c9c0 43 D0318 16:20:36.349566 355572 usertrap_amd64.go:225] [ 4700( 751): 4700( 751)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.350818 355572 task_syscall.go:246] [ 4699( 89): 4704( 90)] Syscall 202: killed by seccomp D0318 16:20:36.351135 355572 task_exit.go:204] [ 4699( 89): 4704( 90)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.351498 355572 usertrap_amd64.go:212] [ 4703(1175): 4703(1175)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.351624 355572 usertrap_amd64.go:122] [ 4703(1175): 4703(1175)] Allocate a new trap: 0xc0005271d0 37 D0318 16:20:36.352094 355572 task_exit.go:204] [ 4699( 89): 4704( 90)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.352259 355572 task_exit.go:204] [ 4699( 89): 4704( 90)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.352446 355572 usertrap_amd64.go:225] [ 4703(1175): 4703(1175)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.355741 355572 task_exit.go:204] [ 4700( 751): 4700( 751)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.355961 355572 task_signals.go:204] [ 4700( 751): 4705( 752)] Signal 9, PID: 4700, TID: 4705, fault addr: 0x0: terminating thread group D0318 16:20:36.356169 355572 task_exit.go:204] [ 4700( 751): 4705( 752)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.356738 355572 usertrap_amd64.go:212] [ 4703(1175): 4703(1175)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.356864 355572 usertrap_amd64.go:122] [ 4703(1175): 4703(1175)] Allocate a new trap: 0xc0005271d0 38 D0318 16:20:36.357007 355572 task_exit.go:204] [ 4700( 751): 4700( 751)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.357052 355572 usertrap_amd64.go:225] [ 4703(1175): 4703(1175)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.357900 355572 usertrap_amd64.go:212] [ 4706(1196): 4706(1196)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.358024 355572 usertrap_amd64.go:122] [ 4706(1196): 4706(1196)] Allocate a new trap: 0xc0078f68a0 37 D0318 16:20:36.358752 355572 usertrap_amd64.go:225] [ 4706(1196): 4706(1196)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.362164 355572 usertrap_amd64.go:212] [ 4706(1196): 4706(1196)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.362225 355572 usertrap_amd64.go:122] [ 4706(1196): 4706(1196)] Allocate a new trap: 0xc0078f68a0 38 D0318 16:20:36.362288 355572 usertrap_amd64.go:225] [ 4706(1196): 4706(1196)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.362311 355572 task_exit.go:204] [ 4700( 751): 4705( 752)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.362379 355572 task_exit.go:204] [ 4700( 751): 4705( 752)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.362530 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.363035 355572 task_exit.go:204] [ 4700( 751): 4700( 751)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, 0x0, 0x0, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:36.377567 355572 usertrap_amd64.go:212] [ 4703(1175): 4703(1175)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.377691 355572 usertrap_amd64.go:122] [ 4703(1175): 4703(1175)] Allocate a new trap: 0xc0005271d0 39 D0318 16:20:36.377821 355572 usertrap_amd64.go:225] [ 4703(1175): 4703(1175)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.379373 355572 usertrap_amd64.go:212] [ 4706(1196): 4706(1196)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.379495 355572 usertrap_amd64.go:122] [ 4706(1196): 4706(1196)] Allocate a new trap: 0xc0078f68a0 39 D0318 16:20:36.379598 355572 usertrap_amd64.go:225] [ 4706(1196): 4706(1196)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.386210 355572 usertrap_amd64.go:212] [ 4703(1175): 4703(1175)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.386296 355572 usertrap_amd64.go:122] [ 4703(1175): 4703(1175)] Allocate a new trap: 0xc0005271d0 40 D0318 16:20:36.386381 355572 usertrap_amd64.go:225] [ 4703(1175): 4703(1175)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.388268 355572 usertrap_amd64.go:212] [ 4706(1196): 4706(1196)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.388331 355572 usertrap_amd64.go:212] [ 4703(1175): 4703(1175)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.388408 355572 usertrap_amd64.go:122] [ 4703(1175): 4703(1175)] Allocate a new trap: 0xc0005271d0 41 D0318 16:20:36.388358 355572 usertrap_amd64.go:122] [ 4706(1196): 4706(1196)] Allocate a new trap: 0xc0078f68a0 40 D0318 16:20:36.388517 355572 usertrap_amd64.go:225] [ 4703(1175): 4703(1175)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.388664 355572 usertrap_amd64.go:225] [ 4706(1196): 4706(1196)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.388790 355572 usertrap_amd64.go:212] [ 4703(1175): 4708(1176)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.388856 355572 usertrap_amd64.go:122] [ 4703(1175): 4708(1176)] Allocate a new trap: 0xc0005271d0 42 D0318 16:20:36.389001 355572 usertrap_amd64.go:225] [ 4703(1175): 4708(1176)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.399699 355572 usertrap_amd64.go:212] [ 4706(1196): 4706(1196)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.403260 355572 usertrap_amd64.go:122] [ 4706(1196): 4706(1196)] Allocate a new trap: 0xc0078f68a0 41 D0318 16:20:36.403416 355572 usertrap_amd64.go:225] [ 4706(1196): 4706(1196)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.403773 355572 usertrap_amd64.go:212] [ 4706(1196): 4709(1197)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.403900 355572 usertrap_amd64.go:122] [ 4706(1196): 4709(1197)] Allocate a new trap: 0xc0078f68a0 42 D0318 16:20:36.403983 355572 usertrap_amd64.go:225] [ 4706(1196): 4709(1197)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.404198 355572 task_run.go:306] [ 4703(1175): 4708(1176)] Unhandled user fault: addr=0 ip=562e85ce8ab9 access=r-- sig=11 err=bad address D0318 16:20:36.404378 355572 task_log.go:87] [ 4703(1175): 4708(1176)] Registers: D0318 16:20:36.404490 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Cs = 0000000000000033 D0318 16:20:36.404618 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Ds = 0000000000000000 D0318 16:20:36.404653 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Eflags = 0000000000010283 D0318 16:20:36.404695 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Es = 0000000000000000 D0318 16:20:36.404746 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Fs = 0000000000000000 D0318 16:20:36.404787 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Fs_base = 00007eeec172b6c0 D0318 16:20:36.404839 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Gs = 0000000000000000 D0318 16:20:36.404880 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Gs_base = 0000000000000000 D0318 16:20:36.404937 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Orig_rax = ffffffffffffffff D0318 16:20:36.404966 355572 task_log.go:94] [ 4703(1175): 4708(1176)] R10 = 0000000000000000 D0318 16:20:36.405031 355572 task_log.go:94] [ 4703(1175): 4708(1176)] R11 = 0000000000000000 D0318 16:20:36.405071 355572 task_log.go:94] [ 4703(1175): 4708(1176)] R12 = 0000000020001140 D0318 16:20:36.405122 355572 task_log.go:94] [ 4703(1175): 4708(1176)] R13 = 00007eeec172af40 D0318 16:20:36.405192 355572 task_log.go:94] [ 4703(1175): 4708(1176)] R14 = 0000000000000000 D0318 16:20:36.405242 355572 task_log.go:94] [ 4703(1175): 4708(1176)] R15 = 0000000000000000 D0318 16:20:36.405323 355572 task_log.go:94] [ 4703(1175): 4708(1176)] R8 = 0000000000000000 D0318 16:20:36.405440 355572 task_log.go:94] [ 4703(1175): 4708(1176)] R9 = 0000000000000000 D0318 16:20:36.405499 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Rax = 0000000000000000 D0318 16:20:36.405563 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Rbp = 0000000000000000 D0318 16:20:36.405610 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Rbx = 00007eeec172af80 D0318 16:20:36.405754 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Rcx = 0000000000000000 D0318 16:20:36.405841 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Rdi = 0000000000000000 D0318 16:20:36.405893 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Rdx = 0000000000000000 D0318 16:20:36.405933 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Rip = 0000562e85ce8ab9 D0318 16:20:36.405972 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Rsi = 0000000020001140 D0318 16:20:36.406003 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Rsp = 00007eeec172aef8 D0318 16:20:36.406105 355572 task_log.go:94] [ 4703(1175): 4708(1176)] Ss = 000000000000002b D0318 16:20:36.406246 355572 task_log.go:111] [ 4703(1175): 4708(1176)] Stack: D0318 16:20:36.406394 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172aef0: 00 00 00 00 00 00 00 00 1d 58 ca 85 2e 56 00 00 D0318 16:20:36.406476 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.406520 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.406557 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.406633 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af30: 40 11 00 20 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.406721 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.406816 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.406875 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.406928 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.406969 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407032 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172af90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407088 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172afa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407168 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172afb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407206 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172afc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407282 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172afd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407313 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172afe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407378 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172aff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407409 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407443 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407494 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407555 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407701 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407756 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407812 355572 usertrap_amd64.go:212] [ 4706(1196): 4706(1196)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.407913 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.407942 355572 usertrap_amd64.go:122] [ 4706(1196): 4706(1196)] Allocate a new trap: 0xc0078f68a0 43 D0318 16:20:36.407971 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.408040 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b080: 00 00 00 00 00 00 00 00 80 4f e2 85 2e 56 00 00 D0318 16:20:36.408100 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b090: 7a 34 d4 85 2e 56 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.408032 355572 usertrap_amd64.go:225] [ 4706(1196): 4706(1196)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.408155 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b0a0: 0b 00 00 00 00 00 00 00 80 4f e2 85 2e 56 00 00 D0318 16:20:36.408300 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b0b0: 28 52 4e a9 e9 7e 00 00 a8 4b ca 85 2e 56 00 00 D0318 16:20:36.408426 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b0c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.408543 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b0d0: 00 00 00 00 00 00 00 00 7a 34 d4 85 2e 56 00 00 D0318 16:20:36.408605 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b0e0: 80 4f e2 85 2e 56 00 00 11 7b ca 85 2e 56 00 00 D0318 16:20:36.408708 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b0f0: 80 4f e2 85 2e 56 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.408779 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b100: 37 10 00 00 ff ff ff ff 10 75 de 85 2e 56 00 00 D0318 16:20:36.408876 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b110: 59 00 00 00 00 00 00 00 f1 18 cd 32 00 00 00 00 D0318 16:20:36.408955 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.409011 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.409088 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.409177 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b150: 00 00 00 00 00 00 00 00 88 4f e2 85 2e 56 00 00 D0318 16:20:36.409258 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b160: 80 4f e2 85 2e 56 00 00 8c 4f e2 85 2e 56 00 00 D0318 16:20:36.409322 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b170: 40 51 4e a9 e9 7e 00 00 06 dc ca 85 2e 56 00 00 D0318 16:20:36.409444 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b180: c0 b6 72 c1 ee 7e 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.409501 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b190: b0 ff ff ff ff ff ff ff 3e b5 cc 85 2e 56 00 00 D0318 16:20:36.409573 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b1a0: 00 00 00 00 00 00 00 00 c0 b6 72 c1 ee 7e 00 00 D0318 16:20:36.409633 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b1b0: c0 b6 72 c1 ee 7e 00 00 52 bd 26 11 97 cc b7 04 D0318 16:20:36.409698 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b1c0: b0 ff ff ff ff ff ff ff 0b 00 00 00 00 00 00 00 D0318 16:20:36.409770 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b1d0: 40 51 4e a9 e9 7e 00 00 28 52 4e a9 e9 7e 00 00 D0318 16:20:36.409715 355572 usertrap_amd64.go:212] [ 4707( 753): 4707( 753)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.409927 355572 usertrap_amd64.go:122] [ 4707( 753): 4707( 753)] Allocate a new trap: 0xc000976c30 37 D0318 16:20:36.409829 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b1e0: 52 bd 66 72 72 4e 6a f9 52 bd 44 77 0e c7 ea a8 D0318 16:20:36.410343 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b1f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.410436 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.410529 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b210: 00 00 00 00 00 00 00 00 00 31 bd ca f9 5d 7f 4b D0318 16:20:36.410620 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b220: 00 00 00 00 00 00 00 00 70 b2 cc 85 2e 56 00 00 D0318 16:20:36.410673 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b230: 00 00 00 00 00 00 00 00 ac 2b d2 85 2e 56 00 00 D0318 16:20:36.410732 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.410830 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.410909 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.411010 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.411083 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.411178 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.411266 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b2a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.411329 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b2b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.411397 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b2c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.411473 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b2d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.411388 355572 usertrap_amd64.go:225] [ 4707( 753): 4707( 753)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.411543 355572 task_log.go:128] [ 4703(1175): 4708(1176)] 7eeec172b2e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0318 16:20:36.411649 355572 task_log.go:149] [ 4703(1175): 4708(1176)] Code: D0318 16:20:36.411700 355572 task_log.go:167] [ 4703(1175): 4708(1176)] 562e85ce8a70: c9 48 01 c8 48 29 f8 c3 0f 1f 84 00 00 00 00 00 D0318 16:20:36.411769 355572 task_log.go:167] [ 4703(1175): 4708(1176)] 562e85ce8a80: e9 5b 8c 00 00 0f 1f 00 89 c8 c3 66 2e 0f 1f 84 D0318 16:20:36.411828 355572 task_log.go:167] [ 4703(1175): 4708(1176)] 562e85ce8a90: 00 00 00 00 00 66 2e 0f 1f 84 00 00 00 00 00 90 D0318 16:20:36.411885 355572 task_log.go:167] [ 4703(1175): 4708(1176)] 562e85ce8aa0: 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 D0318 16:20:36.411931 355572 task_log.go:167] [ 4703(1175): 4708(1176)] 562e85ce8ab0: 0f 00 00 0f 87 37 01 00 00 c5 fd 74 0f c5 fd d7 D0318 16:20:36.411976 355572 task_log.go:167] [ 4703(1175): 4708(1176)] 562e85ce8ac0: c1 85 c0 74 5b f3 0f bc c0 c5 f8 77 c3 0f 1f 00 D0318 16:20:36.412041 355572 task_log.go:167] [ 4703(1175): 4708(1176)] 562e85ce8ad0: f3 0f bc c0 29 d7 ff c7 01 f8 c5 f8 77 c3 66 90 D0318 16:20:36.412132 355572 task_log.go:167] [ 4703(1175): 4708(1176)] 562e85ce8ae0: f3 0f bc c0 29 d7 83 c7 21 01 f8 c5 f8 77 c3 90 D0318 16:20:36.412187 355572 task_log.go:71] [ 4703(1175): 4708(1176)] Mappings: VMAs: 00066000-0006b000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2f420000-1b2f460000 rw-s 00000000 00:05 5 /memfd:syz-shared-mem (deleted) 562e85c79000-562e85c9e000 r--p 00000000 00:11 8 /syz-executor 562e85c9e000-562e85d42000 r-xp 00025000 00:11 8 /syz-executor 562e85d42000-562e85df2000 r--p 000c9000 00:11 8 /syz-executor 562e85df2000-562e85dfb000 rw-p 00179000 00:11 8 /syz-executor 562e85e09000-562e86955000 rw-p 00000000 00:00 0 562e86955000-562e86977000 rw-p 00000000 00:00 0 [heap] 7ee9a8ce6000-7ee9a94e6000 rw-p 00000000 00:00 0 [stack] 7eeec1200000-7eeec1600000 r--p 00000000 00:05 4 /memfd:syz-shared-mem (deleted) 7eeec170b000-7eeec170c000 ---p 00000000 00:00 0 7eeec170c000-7eeec172c000 rw-p 00000000 00:00 0 7eeec172c000-7eeec172d000 r--p 00000000 00:00 0 [vvar] 7eeec172d000-7eeec172f000 r-xp 00000000 00:00 0 PMAs: 00066000-00067000 r-xp 1278a000 *pgalloc.MemoryFile 00067000-0006b000 r-xp 12799000 *pgalloc.MemoryFile 20000000-20200000 rwxp 29200000 *pgalloc.MemoryFile 1b2f420000-1b2f460000 rw-s 22a00000 *pgalloc.MemoryFile 562e85c79000-562e85c9e000 r--p 16c2a000 *pgalloc.MemoryFile 562e85c9e000-562e85cba000 r-xs 00025000 *gofer.dentryPlatformFile 562e85cba000-562e85cbb000 r-xp 115fc000 *pgalloc.MemoryFile 562e85cbb000-562e85ccb000 r-xs 00042000 *gofer.dentryPlatformFile 562e85ccb000-562e85ccc000 r-xp 12609000 *pgalloc.MemoryFile 562e85ccc000-562e85cf3000 r-xs 00053000 *gofer.dentryPlatformFile 562e85cf3000-562e85cf4000 r-xp 12981000 *pgalloc.MemoryFile 562e85cf4000-562e85cf5000 r-xp 127f7000 *pgalloc.MemoryFile 562e85cf5000-562e85cf6000 r-xp 127fa000 *pgalloc.MemoryFile 562e85cf6000-562e85cf7000 r-xp 127fc000 *pgalloc.MemoryFile 562e85cf8000-562e85cf9000 r-xp 12786000 *pgalloc.MemoryFile 562e85cf9000-562e85d00000 r-xs 00080000 *gofer.dentryPlatformFile 562e85d00000-562e85d01000 r-xp 0bc4a000 *pgalloc.MemoryFile 562e85d10000-562e85d11000 r-xp 0bcd7000 *pgalloc.MemoryFile 562e85d11000-562e85d22000 r-xs 00098000 *gofer.dentryPlatformFile 562e85d22000-562e85d23000 r-xp 127da000 *pgalloc.MemoryFile 562e85d41000-562e85d42000 r-xp 015ff000 *pgalloc.MemoryFile 562e85d42000-562e85d96000 r--p 17292000 *pgalloc.MemoryFile 562e85d96000-562e85dfb000 rw-p 1a176000 *pgalloc.MemoryFile 562e85e09000-562e86000000 rw-p 29400000 *pgalloc.MemoryFile 562e86800000-562e86955000 rw-p 28744000 *pgalloc.MemoryFile 562e86955000-562e86956000 rw-p 115fe000 *pgalloc.MemoryFile 562e86956000-562e86977000 rw-p 19c87000 *pgalloc.MemoryFile 7ee9a9400000-7ee9a94e2000 r--p 185c6000 *pgalloc.MemoryFile 7ee9a94e2000-7ee9a94e4000 r--p 12ffb000 *pgalloc.MemoryFile 7ee9a94e4000-7ee9a94e6000 rw-p 13034000 *pgalloc.MemoryFile 7eeec1200000-7eeec1600000 r--s 22600000 *pgalloc.MemoryFile 7eeec170c000-7eeec172c000 rw-p 17160000 *pgalloc.MemoryFile 7eeec172c000-7eeec172d000 r--s 00002000 *pgalloc.MemoryFile 7eeec172d000-7eeec172f000 r-xs 00000000 *pgalloc.MemoryFile D0318 16:20:36.413944 355572 task_log.go:73] [ 4703(1175): 4708(1176)] FDTable: fd:2 => name pipe:[7] fd:200 => name /dev/net/tun fd:201 => name / fd:0 => name pipe:[7] fd:1 => name pipe:[7] D0318 16:20:36.414447 355572 task_exit.go:204] [ 4706(1196): 4706(1196)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.414644 355572 task_signals.go:204] [ 4706(1196): 4709(1197)] Signal 9, PID: 4706, TID: 4709, fault addr: 0x0: terminating thread group D0318 16:20:36.414856 355572 task_signals.go:470] [ 4703(1175): 4708(1176)] Notified of signal 11 D0318 16:20:36.415078 355572 task_signals.go:220] [ 4703(1175): 4708(1176)] Signal 11: delivering to handler D0318 16:20:36.415805 355572 usertrap_amd64.go:212] [ 4703(1175): 4703(1175)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.415906 355572 usertrap_amd64.go:122] [ 4703(1175): 4703(1175)] Allocate a new trap: 0xc0005271d0 43 D0318 16:20:36.416026 355572 usertrap_amd64.go:225] [ 4703(1175): 4703(1175)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.416157 355572 task_exit.go:204] [ 4706(1196): 4706(1196)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.416468 355572 task_exit.go:204] [ 4706(1196): 4709(1197)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.418788 355572 usertrap_amd64.go:212] [ 4707( 753): 4707( 753)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.418935 355572 usertrap_amd64.go:122] [ 4707( 753): 4707( 753)] Allocate a new trap: 0xc000976c30 38 D0318 16:20:36.419034 355572 usertrap_amd64.go:225] [ 4707( 753): 4707( 753)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.421964 355572 task_exit.go:204] [ 4706(1196): 4709(1197)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.422091 355572 task_exit.go:204] [ 4706(1196): 4709(1197)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.422245 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.422501 355572 task_exit.go:204] [ 4706(1196): 4706(1196)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.423233 355572 task_exit.go:204] [ 4703(1175): 4703(1175)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.423472 355572 task_signals.go:204] [ 4703(1175): 4708(1176)] Signal 9, PID: 4703, TID: 4708, fault addr: 0x0: terminating thread group D0318 16:20:36.423932 355572 task_exit.go:204] [ 4703(1175): 4703(1175)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.424072 355572 task_exit.go:204] [ 4703(1175): 4708(1176)] Transitioning from exit state TaskExitNone to TaskExitInitiated 16:20:36 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x541b, 0x0) D0318 16:20:36.430206 355572 task_exit.go:204] [ 4703(1175): 4708(1176)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.430279 355572 task_exit.go:204] [ 4703(1175): 4708(1176)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.430395 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.430534 355572 task_exit.go:204] [ 4703(1175): 4703(1175)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x4, 0x0, &(0x7f0000000180)) D0318 16:20:36.440891 355572 usertrap_amd64.go:212] [ 4707( 753): 4707( 753)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.441024 355572 usertrap_amd64.go:122] [ 4707( 753): 4707( 753)] Allocate a new trap: 0xc000976c30 39 D0318 16:20:36.441106 355572 usertrap_amd64.go:225] [ 4707( 753): 4707( 753)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.450307 355572 usertrap_amd64.go:212] [ 4699( 89): 4699( 89)] Found the pattern at ip 55e9c27981ae:sysno 230 D0318 16:20:36.450521 355572 usertrap_amd64.go:122] [ 4699( 89): 4699( 89)] Allocate a new trap: 0xc000976c00 42 D0318 16:20:36.450653 355572 usertrap_amd64.go:225] [ 4699( 89): 4699( 89)] Apply the binary patch addr 55e9c27981ae trap addr 60d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:36.463144 355572 usertrap_amd64.go:212] [ 4707( 753): 4707( 753)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.463246 355572 usertrap_amd64.go:122] [ 4707( 753): 4707( 753)] Allocate a new trap: 0xc000976c30 40 D0318 16:20:36.463326 355572 usertrap_amd64.go:225] [ 4707( 753): 4707( 753)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.465135 355572 usertrap_amd64.go:212] [ 4707( 753): 4707( 753)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.465214 355572 usertrap_amd64.go:122] [ 4707( 753): 4707( 753)] Allocate a new trap: 0xc000976c30 41 D0318 16:20:36.465328 355572 usertrap_amd64.go:225] [ 4707( 753): 4707( 753)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.465482 355572 usertrap_amd64.go:212] [ 4707( 753): 4712( 754)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.465636 355572 usertrap_amd64.go:122] [ 4707( 753): 4712( 754)] Allocate a new trap: 0xc000976c30 42 D0318 16:20:36.465730 355572 usertrap_amd64.go:225] [ 4707( 753): 4712( 754)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.468159 355572 task_signals.go:309] [ 4707( 753): 4712( 754)] failed to restore from a signal frame: bad address D0318 16:20:36.468325 355572 task_signals.go:470] [ 4707( 753): 4712( 754)] Notified of signal 11 D0318 16:20:36.468444 355572 task_signals.go:220] [ 4707( 753): 4712( 754)] Signal 11: delivering to handler D0318 16:20:36.468746 355572 usertrap_amd64.go:212] [ 4710(1198): 4710(1198)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.468860 355572 usertrap_amd64.go:122] [ 4710(1198): 4710(1198)] Allocate a new trap: 0xc00637d1d0 37 D0318 16:20:36.469605 355572 usertrap_amd64.go:225] [ 4710(1198): 4710(1198)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.471536 355572 usertrap_amd64.go:212] [ 4707( 753): 4707( 753)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.471687 355572 usertrap_amd64.go:122] [ 4707( 753): 4707( 753)] Allocate a new trap: 0xc000976c30 43 D0318 16:20:36.471783 355572 usertrap_amd64.go:225] [ 4707( 753): 4707( 753)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.473645 355572 usertrap_amd64.go:212] [ 4710(1198): 4710(1198)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.473810 355572 usertrap_amd64.go:122] [ 4710(1198): 4710(1198)] Allocate a new trap: 0xc00637d1d0 38 D0318 16:20:36.473942 355572 usertrap_amd64.go:225] [ 4710(1198): 4710(1198)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.476357 355572 task_exit.go:204] [ 4707( 753): 4707( 753)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.476631 355572 task_signals.go:204] [ 4707( 753): 4712( 754)] Signal 9, PID: 4707, TID: 4712, fault addr: 0x0: terminating thread group D0318 16:20:36.477103 355572 task_exit.go:204] [ 4707( 753): 4707( 753)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.477310 355572 task_exit.go:204] [ 4707( 753): 4712( 754)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.477700 355572 usertrap_amd64.go:212] [ 4711(1177): 4711(1177)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.477804 355572 usertrap_amd64.go:122] [ 4711(1177): 4711(1177)] Allocate a new trap: 0xc000e1c120 37 D0318 16:20:36.478495 355572 usertrap_amd64.go:225] [ 4711(1177): 4711(1177)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.482761 355572 task_exit.go:204] [ 4707( 753): 4712( 754)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.482855 355572 task_exit.go:204] [ 4707( 753): 4712( 754)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.482960 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.483372 355572 task_exit.go:204] [ 4707( 753): 4707( 753)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 2: io_setup(0x8, &(0x7f0000002800)=0x0) io_submit(r0, 0x0, 0x0) D0318 16:20:36.485815 355572 usertrap_amd64.go:212] [ 4711(1177): 4711(1177)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.485935 355572 usertrap_amd64.go:122] [ 4711(1177): 4711(1177)] Allocate a new trap: 0xc000e1c120 38 D0318 16:20:36.486033 355572 usertrap_amd64.go:225] [ 4711(1177): 4711(1177)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.486313 355572 usertrap_amd64.go:212] [ 4710(1198): 4710(1198)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.486406 355572 usertrap_amd64.go:122] [ 4710(1198): 4710(1198)] Allocate a new trap: 0xc00637d1d0 39 D0318 16:20:36.486503 355572 usertrap_amd64.go:225] [ 4710(1198): 4710(1198)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.494345 355572 usertrap_amd64.go:212] [ 4710(1198): 4710(1198)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.494435 355572 usertrap_amd64.go:122] [ 4710(1198): 4710(1198)] Allocate a new trap: 0xc00637d1d0 40 D0318 16:20:36.494567 355572 usertrap_amd64.go:225] [ 4710(1198): 4710(1198)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.496286 355572 usertrap_amd64.go:212] [ 4710(1198): 4710(1198)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.496366 355572 usertrap_amd64.go:122] [ 4710(1198): 4710(1198)] Allocate a new trap: 0xc00637d1d0 41 D0318 16:20:36.496470 355572 usertrap_amd64.go:225] [ 4710(1198): 4710(1198)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.496679 355572 usertrap_amd64.go:212] [ 4710(1198): 4713(1199)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.496770 355572 usertrap_amd64.go:122] [ 4710(1198): 4713(1199)] Allocate a new trap: 0xc00637d1d0 42 D0318 16:20:36.496870 355572 usertrap_amd64.go:225] [ 4710(1198): 4713(1199)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.497848 355572 usertrap_amd64.go:212] [ 4711(1177): 4711(1177)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.497920 355572 usertrap_amd64.go:122] [ 4711(1177): 4711(1177)] Allocate a new trap: 0xc000e1c120 39 D0318 16:20:36.498003 355572 usertrap_amd64.go:225] [ 4711(1177): 4711(1177)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.498675 355572 usertrap_amd64.go:212] [ 4710(1198): 4710(1198)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.498761 355572 usertrap_amd64.go:122] [ 4710(1198): 4710(1198)] Allocate a new trap: 0xc00637d1d0 43 D0318 16:20:36.498893 355572 usertrap_amd64.go:225] [ 4710(1198): 4710(1198)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.504018 355572 task_signals.go:204] [ 4710(1198): 4713(1199)] Signal 9, PID: 4710, TID: 4713, fault addr: 0x0: terminating thread group D0318 16:20:36.504133 355572 task_exit.go:204] [ 4710(1198): 4713(1199)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.504868 355572 task_exit.go:204] [ 4710(1198): 4710(1198)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.505027 355572 task_exit.go:204] [ 4710(1198): 4713(1199)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.505130 355572 task_exit.go:204] [ 4710(1198): 4713(1199)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.505551 355572 usertrap_amd64.go:212] [ 4711(1177): 4711(1177)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.505622 355572 usertrap_amd64.go:122] [ 4711(1177): 4711(1177)] Allocate a new trap: 0xc000e1c120 40 D0318 16:20:36.505679 355572 usertrap_amd64.go:225] [ 4711(1177): 4711(1177)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.507335 355572 usertrap_amd64.go:212] [ 4711(1177): 4711(1177)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.507397 355572 usertrap_amd64.go:122] [ 4711(1177): 4711(1177)] Allocate a new trap: 0xc000e1c120 41 D0318 16:20:36.507537 355572 usertrap_amd64.go:225] [ 4711(1177): 4711(1177)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.508038 355572 usertrap_amd64.go:212] [ 4711(1177): 4715(1178)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.508113 355572 usertrap_amd64.go:122] [ 4711(1177): 4715(1178)] Allocate a new trap: 0xc000e1c120 42 D0318 16:20:36.508174 355572 usertrap_amd64.go:225] [ 4711(1177): 4715(1178)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.510040 355572 task_exit.go:204] [ 4710(1198): 4710(1198)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.510147 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.510644 355572 usertrap_amd64.go:212] [ 4711(1177): 4711(1177)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.510716 355572 usertrap_amd64.go:122] [ 4711(1177): 4711(1177)] Allocate a new trap: 0xc000e1c120 43 D0318 16:20:36.510807 355572 usertrap_amd64.go:225] [ 4711(1177): 4711(1177)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.513263 355572 task_exit.go:204] [ 4710(1198): 4710(1198)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.514730 355572 task_exit.go:204] [ 4711(1177): 4711(1177)] Transitioning from exit state TaskExitNone to TaskExitInitiated 16:20:36 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, 0x0, 0x0, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:36.515440 355572 usertrap_amd64.go:212] [ 4714( 755): 4714( 755)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.515555 355572 usertrap_amd64.go:122] [ 4714( 755): 4714( 755)] Allocate a new trap: 0xc0057287b0 37 D0318 16:20:36.515578 355572 task_exit.go:204] [ 4711(1177): 4711(1177)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.515500 355572 task_signals.go:204] [ 4711(1177): 4715(1178)] Signal 9, PID: 4711, TID: 4715, fault addr: 0x0: terminating thread group D0318 16:20:36.515821 355572 task_exit.go:204] [ 4711(1177): 4715(1178)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.516300 355572 usertrap_amd64.go:225] [ 4714( 755): 4714( 755)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.519704 355572 usertrap_amd64.go:212] [ 4714( 755): 4714( 755)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.519782 355572 usertrap_amd64.go:122] [ 4714( 755): 4714( 755)] Allocate a new trap: 0xc0057287b0 38 D0318 16:20:36.519905 355572 usertrap_amd64.go:225] [ 4714( 755): 4714( 755)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.520496 355572 task_exit.go:204] [ 4711(1177): 4715(1178)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.520592 355572 task_exit.go:204] [ 4711(1177): 4715(1178)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.520680 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.520781 355572 task_exit.go:204] [ 4711(1177): 4711(1177)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 1: clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x6}, 0x0, &(0x7f0000000100)={r0}, 0x0) D0318 16:20:36.534641 355572 usertrap_amd64.go:212] [ 4714( 755): 4714( 755)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.534705 355572 usertrap_amd64.go:122] [ 4714( 755): 4714( 755)] Allocate a new trap: 0xc0057287b0 39 D0318 16:20:36.534763 355572 usertrap_amd64.go:225] [ 4714( 755): 4714( 755)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.543118 355572 usertrap_amd64.go:212] [ 4714( 755): 4714( 755)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.543216 355572 usertrap_amd64.go:122] [ 4714( 755): 4714( 755)] Allocate a new trap: 0xc0057287b0 40 D0318 16:20:36.543306 355572 usertrap_amd64.go:225] [ 4714( 755): 4714( 755)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.545379 355572 usertrap_amd64.go:212] [ 4714( 755): 4714( 755)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.545562 355572 usertrap_amd64.go:122] [ 4714( 755): 4714( 755)] Allocate a new trap: 0xc0057287b0 41 D0318 16:20:36.545657 355572 usertrap_amd64.go:225] [ 4714( 755): 4714( 755)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.545948 355572 usertrap_amd64.go:212] [ 4714( 755): 4718( 756)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.546055 355572 usertrap_amd64.go:122] [ 4714( 755): 4718( 756)] Allocate a new trap: 0xc0057287b0 42 D0318 16:20:36.546166 355572 usertrap_amd64.go:225] [ 4714( 755): 4718( 756)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.546485 355572 usertrap_amd64.go:212] [ 4716(1200): 4716(1200)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.546583 355572 usertrap_amd64.go:122] [ 4716(1200): 4716(1200)] Allocate a new trap: 0xc0057287e0 37 D0318 16:20:36.547225 355572 usertrap_amd64.go:225] [ 4716(1200): 4716(1200)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.548708 355572 usertrap_amd64.go:212] [ 4714( 755): 4714( 755)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.548775 355572 usertrap_amd64.go:122] [ 4714( 755): 4714( 755)] Allocate a new trap: 0xc0057287b0 43 D0318 16:20:36.548915 355572 usertrap_amd64.go:225] [ 4714( 755): 4714( 755)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.550802 355572 usertrap_amd64.go:212] [ 4716(1200): 4716(1200)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.550873 355572 usertrap_amd64.go:122] [ 4716(1200): 4716(1200)] Allocate a new trap: 0xc0057287e0 38 D0318 16:20:36.550947 355572 usertrap_amd64.go:225] [ 4716(1200): 4716(1200)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.555122 355572 task_exit.go:204] [ 4714( 755): 4714( 755)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.555854 355572 task_signals.go:204] [ 4714( 755): 4718( 756)] Signal 9, PID: 4714, TID: 4718, fault addr: 0x0: terminating thread group D0318 16:20:36.556044 355572 task_exit.go:204] [ 4714( 755): 4718( 756)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.556605 355572 task_exit.go:204] [ 4714( 755): 4714( 755)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.561357 355572 task_exit.go:204] [ 4714( 755): 4718( 756)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.561433 355572 task_exit.go:204] [ 4714( 755): 4718( 756)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.561534 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.562651 355572 task_exit.go:204] [ 4714( 755): 4714( 755)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.563187 355572 usertrap_amd64.go:212] [ 4716(1200): 4716(1200)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.563298 355572 usertrap_amd64.go:122] [ 4716(1200): 4716(1200)] Allocate a new trap: 0xc0057287e0 39 D0318 16:20:36.563380 355572 usertrap_amd64.go:225] [ 4716(1200): 4716(1200)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.564673 355572 usertrap_amd64.go:212] [ 4717(1179): 4717(1179)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.564791 355572 usertrap_amd64.go:122] [ 4717(1179): 4717(1179)] Allocate a new trap: 0xc000e1c360 37 16:20:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./bus\x00') D0318 16:20:36.565406 355572 usertrap_amd64.go:225] [ 4717(1179): 4717(1179)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.568346 355572 usertrap_amd64.go:212] [ 4717(1179): 4717(1179)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.568395 355572 usertrap_amd64.go:122] [ 4717(1179): 4717(1179)] Allocate a new trap: 0xc000e1c360 38 D0318 16:20:36.568460 355572 usertrap_amd64.go:225] [ 4717(1179): 4717(1179)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.570519 355572 usertrap_amd64.go:212] [ 4716(1200): 4716(1200)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.570581 355572 usertrap_amd64.go:122] [ 4716(1200): 4716(1200)] Allocate a new trap: 0xc0057287e0 40 D0318 16:20:36.570647 355572 usertrap_amd64.go:225] [ 4716(1200): 4716(1200)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.572063 355572 usertrap_amd64.go:212] [ 4716(1200): 4716(1200)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.572208 355572 usertrap_amd64.go:122] [ 4716(1200): 4716(1200)] Allocate a new trap: 0xc0057287e0 41 D0318 16:20:36.572429 355572 usertrap_amd64.go:225] [ 4716(1200): 4716(1200)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.572682 355572 usertrap_amd64.go:212] [ 4716(1200): 4719(1201)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.572746 355572 usertrap_amd64.go:122] [ 4716(1200): 4719(1201)] Allocate a new trap: 0xc0057287e0 42 D0318 16:20:36.572916 355572 usertrap_amd64.go:225] [ 4716(1200): 4719(1201)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.575919 355572 task_signals.go:309] [ 4716(1200): 4719(1201)] failed to restore from a signal frame: bad address D0318 16:20:36.576375 355572 task_signals.go:470] [ 4716(1200): 4719(1201)] Notified of signal 11 D0318 16:20:36.576463 355572 task_signals.go:220] [ 4716(1200): 4719(1201)] Signal 11: delivering to handler D0318 16:20:36.580046 355572 usertrap_amd64.go:212] [ 4716(1200): 4716(1200)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.580190 355572 usertrap_amd64.go:122] [ 4716(1200): 4716(1200)] Allocate a new trap: 0xc0057287e0 43 D0318 16:20:36.580274 355572 usertrap_amd64.go:225] [ 4716(1200): 4716(1200)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.583470 355572 usertrap_amd64.go:212] [ 4717(1179): 4717(1179)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.583597 355572 usertrap_amd64.go:122] [ 4717(1179): 4717(1179)] Allocate a new trap: 0xc000e1c360 39 D0318 16:20:36.583731 355572 usertrap_amd64.go:225] [ 4717(1179): 4717(1179)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.585031 355572 task_exit.go:204] [ 4716(1200): 4716(1200)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.585618 355572 task_exit.go:204] [ 4716(1200): 4716(1200)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.585799 355572 task_signals.go:204] [ 4716(1200): 4719(1201)] Signal 9, PID: 4716, TID: 4719, fault addr: 0x0: terminating thread group D0318 16:20:36.585864 355572 task_exit.go:204] [ 4716(1200): 4719(1201)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.590906 355572 task_exit.go:204] [ 4716(1200): 4719(1201)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.590971 355572 task_exit.go:204] [ 4716(1200): 4719(1201)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.591103 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.591364 355572 usertrap_amd64.go:212] [ 4717(1179): 4717(1179)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.591465 355572 usertrap_amd64.go:122] [ 4717(1179): 4717(1179)] Allocate a new trap: 0xc000e1c360 40 D0318 16:20:36.591537 355572 usertrap_amd64.go:225] [ 4717(1179): 4717(1179)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.591963 355572 usertrap_amd64.go:212] [ 4720( 757): 4720( 757)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.592094 355572 usertrap_amd64.go:122] [ 4720( 757): 4720( 757)] Allocate a new trap: 0xc00637d260 37 D0318 16:20:36.592858 355572 usertrap_amd64.go:225] [ 4720( 757): 4720( 757)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.593044 355572 task_exit.go:204] [ 4716(1200): 4716(1200)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.593109 355572 usertrap_amd64.go:212] [ 4717(1179): 4717(1179)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.593186 355572 usertrap_amd64.go:122] [ 4717(1179): 4717(1179)] Allocate a new trap: 0xc000e1c360 41 D0318 16:20:36.593266 355572 usertrap_amd64.go:225] [ 4717(1179): 4717(1179)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.593737 355572 usertrap_amd64.go:212] [ 4717(1179): 4721(1180)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.593807 355572 usertrap_amd64.go:122] [ 4717(1179): 4721(1180)] Allocate a new trap: 0xc000e1c360 42 D0318 16:20:36.593899 355572 usertrap_amd64.go:225] [ 4717(1179): 4721(1180)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) 16:20:36 executing program 3: mknodat$loop(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x79b2487051cdaa24, 0x0) D0318 16:20:36.598239 355572 usertrap_amd64.go:212] [ 4717(1179): 4717(1179)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.598336 355572 usertrap_amd64.go:122] [ 4717(1179): 4717(1179)] Allocate a new trap: 0xc000e1c360 43 D0318 16:20:36.598418 355572 usertrap_amd64.go:225] [ 4717(1179): 4717(1179)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.599522 355572 usertrap_amd64.go:212] [ 4720( 757): 4720( 757)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.599598 355572 usertrap_amd64.go:122] [ 4720( 757): 4720( 757)] Allocate a new trap: 0xc00637d260 38 D0318 16:20:36.599731 355572 usertrap_amd64.go:225] [ 4720( 757): 4720( 757)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.603579 355572 task_exit.go:204] [ 4717(1179): 4717(1179)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.604444 355572 task_signals.go:204] [ 4717(1179): 4721(1180)] Signal 9, PID: 4717, TID: 4721, fault addr: 0x0: terminating thread group D0318 16:20:36.604558 355572 task_exit.go:204] [ 4717(1179): 4717(1179)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.604805 355572 task_exit.go:204] [ 4717(1179): 4721(1180)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.611402 355572 task_exit.go:204] [ 4717(1179): 4721(1180)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.611479 355572 task_exit.go:204] [ 4717(1179): 4721(1180)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.611577 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.611944 355572 task_exit.go:204] [ 4717(1179): 4717(1179)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, 0x0, 0x0, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:36.622575 355572 usertrap_amd64.go:212] [ 4722(1202): 4722(1202)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.622762 355572 usertrap_amd64.go:122] [ 4722(1202): 4722(1202)] Allocate a new trap: 0xc00637d2c0 37 D0318 16:20:36.623501 355572 usertrap_amd64.go:225] [ 4722(1202): 4722(1202)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.624019 355572 usertrap_amd64.go:212] [ 4720( 757): 4720( 757)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.624142 355572 usertrap_amd64.go:122] [ 4720( 757): 4720( 757)] Allocate a new trap: 0xc00637d260 39 D0318 16:20:36.624232 355572 usertrap_amd64.go:225] [ 4720( 757): 4720( 757)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.627720 355572 usertrap_amd64.go:212] [ 4722(1202): 4722(1202)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.627826 355572 usertrap_amd64.go:122] [ 4722(1202): 4722(1202)] Allocate a new trap: 0xc00637d2c0 38 D0318 16:20:36.627948 355572 usertrap_amd64.go:225] [ 4722(1202): 4722(1202)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.632262 355572 usertrap_amd64.go:212] [ 4720( 757): 4720( 757)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.632346 355572 usertrap_amd64.go:122] [ 4720( 757): 4720( 757)] Allocate a new trap: 0xc00637d260 40 D0318 16:20:36.632420 355572 usertrap_amd64.go:225] [ 4720( 757): 4720( 757)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.634204 355572 usertrap_amd64.go:212] [ 4720( 757): 4720( 757)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.634354 355572 usertrap_amd64.go:122] [ 4720( 757): 4720( 757)] Allocate a new trap: 0xc00637d260 41 D0318 16:20:36.634466 355572 usertrap_amd64.go:225] [ 4720( 757): 4720( 757)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.634631 355572 usertrap_amd64.go:212] [ 4720( 757): 4724( 758)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.634711 355572 usertrap_amd64.go:122] [ 4720( 757): 4724( 758)] Allocate a new trap: 0xc00637d260 42 D0318 16:20:36.634786 355572 usertrap_amd64.go:225] [ 4720( 757): 4724( 758)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.637387 355572 usertrap_amd64.go:212] [ 4720( 757): 4720( 757)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.637463 355572 usertrap_amd64.go:122] [ 4720( 757): 4720( 757)] Allocate a new trap: 0xc00637d260 43 D0318 16:20:36.637560 355572 usertrap_amd64.go:225] [ 4720( 757): 4720( 757)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.641155 355572 usertrap_amd64.go:212] [ 4723(1181): 4723(1181)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.641287 355572 usertrap_amd64.go:122] [ 4723(1181): 4723(1181)] Allocate a new trap: 0xc000e1c390 37 D0318 16:20:36.641949 355572 usertrap_amd64.go:225] [ 4723(1181): 4723(1181)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.642543 355572 task_exit.go:204] [ 4720( 757): 4720( 757)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.642844 355572 task_signals.go:204] [ 4720( 757): 4724( 758)] Signal 9, PID: 4720, TID: 4724, fault addr: 0x0: terminating thread group D0318 16:20:36.642995 355572 task_exit.go:204] [ 4720( 757): 4724( 758)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.642845 355572 usertrap_amd64.go:212] [ 4722(1202): 4722(1202)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.643116 355572 usertrap_amd64.go:122] [ 4722(1202): 4722(1202)] Allocate a new trap: 0xc00637d2c0 39 D0318 16:20:36.643249 355572 usertrap_amd64.go:225] [ 4722(1202): 4722(1202)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.643878 355572 task_exit.go:204] [ 4720( 757): 4724( 758)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.643958 355572 task_exit.go:204] [ 4720( 757): 4724( 758)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.647520 355572 usertrap_amd64.go:212] [ 4723(1181): 4723(1181)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.647654 355572 usertrap_amd64.go:122] [ 4723(1181): 4723(1181)] Allocate a new trap: 0xc000e1c390 38 D0318 16:20:36.647783 355572 usertrap_amd64.go:225] [ 4723(1181): 4723(1181)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.648409 355572 task_exit.go:204] [ 4720( 757): 4720( 757)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.648536 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.649427 355572 task_exit.go:204] [ 4720( 757): 4720( 757)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 2: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) D0318 16:20:36.652695 355572 usertrap_amd64.go:212] [ 4722(1202): 4722(1202)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.652893 355572 usertrap_amd64.go:122] [ 4722(1202): 4722(1202)] Allocate a new trap: 0xc00637d2c0 40 D0318 16:20:36.653129 355572 usertrap_amd64.go:225] [ 4722(1202): 4722(1202)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.654979 355572 usertrap_amd64.go:212] [ 4722(1202): 4722(1202)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.655106 355572 usertrap_amd64.go:122] [ 4722(1202): 4722(1202)] Allocate a new trap: 0xc00637d2c0 41 D0318 16:20:36.655333 355572 usertrap_amd64.go:225] [ 4722(1202): 4722(1202)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.655649 355572 usertrap_amd64.go:212] [ 4722(1202): 4725(1203)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.655723 355572 usertrap_amd64.go:122] [ 4722(1202): 4725(1203)] Allocate a new trap: 0xc00637d2c0 42 D0318 16:20:36.655822 355572 usertrap_amd64.go:225] [ 4722(1202): 4725(1203)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.657694 355572 usertrap_amd64.go:212] [ 4722(1202): 4722(1202)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.657749 355572 usertrap_amd64.go:122] [ 4722(1202): 4722(1202)] Allocate a new trap: 0xc00637d2c0 43 D0318 16:20:36.657818 355572 usertrap_amd64.go:225] [ 4722(1202): 4722(1202)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.661782 355572 usertrap_amd64.go:212] [ 4723(1181): 4723(1181)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.661755 355572 task_signals.go:204] [ 4722(1202): 4725(1203)] Signal 9, PID: 4722, TID: 4725, fault addr: 0x0: terminating thread group D0318 16:20:36.661841 355572 usertrap_amd64.go:122] [ 4723(1181): 4723(1181)] Allocate a new trap: 0xc000e1c390 39 D0318 16:20:36.661798 355572 task_exit.go:204] [ 4722(1202): 4722(1202)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.661902 355572 usertrap_amd64.go:225] [ 4723(1181): 4723(1181)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.662483 355572 task_exit.go:204] [ 4722(1202): 4725(1203)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.662612 355572 task_exit.go:204] [ 4722(1202): 4722(1202)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.668461 355572 task_exit.go:204] [ 4722(1202): 4725(1203)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.668561 355572 task_exit.go:204] [ 4722(1202): 4725(1203)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.668697 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.668818 355572 task_exit.go:204] [ 4722(1202): 4722(1202)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.670137 355572 usertrap_amd64.go:212] [ 4723(1181): 4723(1181)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.670217 355572 usertrap_amd64.go:122] [ 4723(1181): 4723(1181)] Allocate a new trap: 0xc000e1c390 40 D0318 16:20:36.670298 355572 usertrap_amd64.go:225] [ 4723(1181): 4723(1181)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) 16:20:36 executing program 3: request_key(&(0x7f0000000180)='id_resolver\x00', 0x0, 0x0, 0x0) D0318 16:20:36.672171 355572 usertrap_amd64.go:212] [ 4723(1181): 4723(1181)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.672286 355572 usertrap_amd64.go:122] [ 4723(1181): 4723(1181)] Allocate a new trap: 0xc000e1c390 41 D0318 16:20:36.672367 355572 usertrap_amd64.go:225] [ 4723(1181): 4723(1181)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.672522 355572 usertrap_amd64.go:212] [ 4723(1181): 4726(1182)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.672603 355572 usertrap_amd64.go:122] [ 4723(1181): 4726(1182)] Allocate a new trap: 0xc000e1c390 42 D0318 16:20:36.672693 355572 usertrap_amd64.go:225] [ 4723(1181): 4726(1182)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.674423 355572 task_signals.go:309] [ 4723(1181): 4726(1182)] failed to restore from a signal frame: bad address D0318 16:20:36.674547 355572 task_signals.go:470] [ 4723(1181): 4726(1182)] Notified of signal 11 D0318 16:20:36.674640 355572 task_signals.go:220] [ 4723(1181): 4726(1182)] Signal 11: delivering to handler D0318 16:20:36.677118 355572 usertrap_amd64.go:212] [ 4723(1181): 4723(1181)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.677218 355572 usertrap_amd64.go:122] [ 4723(1181): 4723(1181)] Allocate a new trap: 0xc000e1c390 43 D0318 16:20:36.677303 355572 usertrap_amd64.go:225] [ 4723(1181): 4723(1181)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.682643 355572 task_exit.go:204] [ 4723(1181): 4723(1181)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.682703 355572 usertrap_amd64.go:212] [ 4727( 759): 4727( 759)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.682796 355572 usertrap_amd64.go:122] [ 4727( 759): 4727( 759)] Allocate a new trap: 0xc005e160f0 37 D0318 16:20:36.682848 355572 task_signals.go:204] [ 4723(1181): 4726(1182)] Signal 9, PID: 4723, TID: 4726, fault addr: 0x0: terminating thread group D0318 16:20:36.682965 355572 task_exit.go:204] [ 4723(1181): 4726(1182)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.683759 355572 usertrap_amd64.go:225] [ 4727( 759): 4727( 759)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.684072 355572 task_exit.go:204] [ 4723(1181): 4723(1181)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.687789 355572 usertrap_amd64.go:212] [ 4727( 759): 4727( 759)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.687863 355572 usertrap_amd64.go:122] [ 4727( 759): 4727( 759)] Allocate a new trap: 0xc005e160f0 38 D0318 16:20:36.687985 355572 usertrap_amd64.go:225] [ 4727( 759): 4727( 759)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.689321 355572 task_exit.go:204] [ 4723(1181): 4726(1182)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.689390 355572 task_exit.go:204] [ 4723(1181): 4726(1182)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.689524 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.689646 355572 task_exit.go:204] [ 4723(1181): 4723(1181)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x890d, 0x0) D0318 16:20:36.702437 355572 usertrap_amd64.go:212] [ 4728(1204): 4728(1204)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.702576 355572 usertrap_amd64.go:122] [ 4728(1204): 4728(1204)] Allocate a new trap: 0xc005d56090 37 D0318 16:20:36.703253 355572 usertrap_amd64.go:225] [ 4728(1204): 4728(1204)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.706211 355572 usertrap_amd64.go:212] [ 4728(1204): 4728(1204)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.706290 355572 usertrap_amd64.go:122] [ 4728(1204): 4728(1204)] Allocate a new trap: 0xc005d56090 38 D0318 16:20:36.706382 355572 usertrap_amd64.go:225] [ 4728(1204): 4728(1204)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.710042 355572 usertrap_amd64.go:212] [ 4727( 759): 4727( 759)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.710139 355572 usertrap_amd64.go:122] [ 4727( 759): 4727( 759)] Allocate a new trap: 0xc005e160f0 39 D0318 16:20:36.710257 355572 usertrap_amd64.go:225] [ 4727( 759): 4727( 759)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.718541 355572 usertrap_amd64.go:212] [ 4727( 759): 4727( 759)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.718633 355572 usertrap_amd64.go:122] [ 4727( 759): 4727( 759)] Allocate a new trap: 0xc005e160f0 40 D0318 16:20:36.718701 355572 usertrap_amd64.go:225] [ 4727( 759): 4727( 759)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.720297 355572 usertrap_amd64.go:212] [ 4727( 759): 4727( 759)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.720394 355572 usertrap_amd64.go:122] [ 4727( 759): 4727( 759)] Allocate a new trap: 0xc005e160f0 41 D0318 16:20:36.720485 355572 usertrap_amd64.go:225] [ 4727( 759): 4727( 759)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.720733 355572 usertrap_amd64.go:212] [ 4727( 759): 4730( 760)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.720820 355572 usertrap_amd64.go:122] [ 4727( 759): 4730( 760)] Allocate a new trap: 0xc005e160f0 42 D0318 16:20:36.721007 355572 usertrap_amd64.go:225] [ 4727( 759): 4730( 760)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.721809 355572 usertrap_amd64.go:212] [ 4729(1183): 4729(1183)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.721906 355572 usertrap_amd64.go:122] [ 4729(1183): 4729(1183)] Allocate a new trap: 0xc005728a20 37 D0318 16:20:36.722410 355572 usertrap_amd64.go:212] [ 4727( 759): 4727( 759)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.722438 355572 usertrap_amd64.go:225] [ 4729(1183): 4729(1183)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.722480 355572 usertrap_amd64.go:122] [ 4727( 759): 4727( 759)] Allocate a new trap: 0xc005e160f0 43 D0318 16:20:36.722572 355572 usertrap_amd64.go:225] [ 4727( 759): 4727( 759)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.724414 355572 usertrap_amd64.go:212] [ 4728(1204): 4728(1204)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.724481 355572 usertrap_amd64.go:122] [ 4728(1204): 4728(1204)] Allocate a new trap: 0xc005d56090 39 D0318 16:20:36.724546 355572 usertrap_amd64.go:225] [ 4728(1204): 4728(1204)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.726414 355572 usertrap_amd64.go:212] [ 4729(1183): 4729(1183)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.726560 355572 usertrap_amd64.go:122] [ 4729(1183): 4729(1183)] Allocate a new trap: 0xc005728a20 38 D0318 16:20:36.726667 355572 usertrap_amd64.go:225] [ 4729(1183): 4729(1183)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.729012 355572 task_exit.go:204] [ 4727( 759): 4727( 759)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.729475 355572 task_signals.go:204] [ 4727( 759): 4730( 760)] Signal 9, PID: 4727, TID: 4730, fault addr: 0x0: terminating thread group D0318 16:20:36.729624 355572 task_exit.go:204] [ 4727( 759): 4730( 760)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.730303 355572 task_exit.go:204] [ 4727( 759): 4727( 759)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.735923 355572 usertrap_amd64.go:212] [ 4728(1204): 4728(1204)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.736065 355572 usertrap_amd64.go:122] [ 4728(1204): 4728(1204)] Allocate a new trap: 0xc005d56090 40 D0318 16:20:36.736212 355572 usertrap_amd64.go:225] [ 4728(1204): 4728(1204)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.736412 355572 task_exit.go:204] [ 4727( 759): 4730( 760)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.736491 355572 task_exit.go:204] [ 4727( 759): 4730( 760)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.736620 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.738119 355572 task_exit.go:204] [ 4727( 759): 4727( 759)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.738202 355572 usertrap_amd64.go:212] [ 4728(1204): 4728(1204)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.738284 355572 usertrap_amd64.go:122] [ 4728(1204): 4728(1204)] Allocate a new trap: 0xc005d56090 41 D0318 16:20:36.738370 355572 usertrap_amd64.go:225] [ 4728(1204): 4728(1204)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.739135 355572 usertrap_amd64.go:212] [ 4728(1204): 4731(1205)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.739244 355572 usertrap_amd64.go:122] [ 4728(1204): 4731(1205)] Allocate a new trap: 0xc005d56090 42 D0318 16:20:36.739375 355572 usertrap_amd64.go:225] [ 4728(1204): 4731(1205)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) 16:20:36 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}], 0x1, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:36.741565 355572 usertrap_amd64.go:212] [ 4728(1204): 4728(1204)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.741698 355572 usertrap_amd64.go:122] [ 4728(1204): 4728(1204)] Allocate a new trap: 0xc005d56090 43 D0318 16:20:36.741887 355572 usertrap_amd64.go:225] [ 4728(1204): 4728(1204)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.745842 355572 task_exit.go:204] [ 4728(1204): 4728(1204)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.746458 355572 task_signals.go:204] [ 4728(1204): 4731(1205)] Signal 9, PID: 4728, TID: 4731, fault addr: 0x0: terminating thread group D0318 16:20:36.746556 355572 task_exit.go:204] [ 4728(1204): 4728(1204)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.746684 355572 task_exit.go:204] [ 4728(1204): 4731(1205)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.747504 355572 usertrap_amd64.go:212] [ 4729(1183): 4729(1183)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.747585 355572 usertrap_amd64.go:122] [ 4729(1183): 4729(1183)] Allocate a new trap: 0xc005728a20 39 D0318 16:20:36.747754 355572 usertrap_amd64.go:225] [ 4729(1183): 4729(1183)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.752490 355572 task_exit.go:204] [ 4728(1204): 4731(1205)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.752570 355572 task_exit.go:204] [ 4728(1204): 4731(1205)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.752711 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.753218 355572 task_exit.go:204] [ 4728(1204): 4728(1204)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 3: openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x591181, 0x0) D0318 16:20:36.755709 355572 usertrap_amd64.go:212] [ 4729(1183): 4729(1183)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.755839 355572 usertrap_amd64.go:122] [ 4729(1183): 4729(1183)] Allocate a new trap: 0xc005728a20 40 D0318 16:20:36.755965 355572 usertrap_amd64.go:225] [ 4729(1183): 4729(1183)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.757862 355572 usertrap_amd64.go:212] [ 4729(1183): 4729(1183)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.757928 355572 usertrap_amd64.go:122] [ 4729(1183): 4729(1183)] Allocate a new trap: 0xc005728a20 41 D0318 16:20:36.757998 355572 usertrap_amd64.go:225] [ 4729(1183): 4729(1183)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.758520 355572 usertrap_amd64.go:212] [ 4729(1183): 4732(1184)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.758624 355572 usertrap_amd64.go:122] [ 4729(1183): 4732(1184)] Allocate a new trap: 0xc005728a20 42 D0318 16:20:36.758711 355572 usertrap_amd64.go:225] [ 4729(1183): 4732(1184)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.761432 355572 usertrap_amd64.go:212] [ 4729(1183): 4729(1183)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.761523 355572 usertrap_amd64.go:122] [ 4729(1183): 4729(1183)] Allocate a new trap: 0xc005728a20 43 D0318 16:20:36.761606 355572 usertrap_amd64.go:225] [ 4729(1183): 4729(1183)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.768535 355572 task_exit.go:204] [ 4729(1183): 4729(1183)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.769294 355572 task_signals.go:204] [ 4729(1183): 4732(1184)] Signal 9, PID: 4729, TID: 4732, fault addr: 0x0: terminating thread group D0318 16:20:36.769456 355572 task_exit.go:204] [ 4729(1183): 4729(1183)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.769586 355572 task_exit.go:204] [ 4729(1183): 4732(1184)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.776221 355572 task_exit.go:204] [ 4729(1183): 4732(1184)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.776335 355572 task_exit.go:204] [ 4729(1183): 4732(1184)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.776440 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.776629 355572 task_exit.go:204] [ 4729(1183): 4729(1183)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 1: io_setup(0x8, &(0x7f0000002800)=0x0) io_submit(r0, 0x1, &(0x7f0000003ec0)=[0x0]) D0318 16:20:36.779141 355572 usertrap_amd64.go:212] [ 4733( 761): 4733( 761)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.779251 355572 usertrap_amd64.go:122] [ 4733( 761): 4733( 761)] Allocate a new trap: 0xc000e1c450 37 D0318 16:20:36.779904 355572 usertrap_amd64.go:225] [ 4733( 761): 4733( 761)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.784503 355572 usertrap_amd64.go:212] [ 4733( 761): 4733( 761)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.784625 355572 usertrap_amd64.go:122] [ 4733( 761): 4733( 761)] Allocate a new trap: 0xc000e1c450 38 D0318 16:20:36.784707 355572 usertrap_amd64.go:225] [ 4733( 761): 4733( 761)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.787110 355572 usertrap_amd64.go:212] [ 4734(1206): 4734(1206)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.787274 355572 usertrap_amd64.go:122] [ 4734(1206): 4734(1206)] Allocate a new trap: 0xc000e1c480 37 D0318 16:20:36.787991 355572 usertrap_amd64.go:225] [ 4734(1206): 4734(1206)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.791283 355572 usertrap_amd64.go:212] [ 4734(1206): 4734(1206)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.791348 355572 usertrap_amd64.go:122] [ 4734(1206): 4734(1206)] Allocate a new trap: 0xc000e1c480 38 D0318 16:20:36.791423 355572 usertrap_amd64.go:225] [ 4734(1206): 4734(1206)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.799472 355572 usertrap_amd64.go:212] [ 4733( 761): 4733( 761)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.799530 355572 usertrap_amd64.go:122] [ 4733( 761): 4733( 761)] Allocate a new trap: 0xc000e1c450 39 D0318 16:20:36.799691 355572 usertrap_amd64.go:225] [ 4733( 761): 4733( 761)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.803420 355572 usertrap_amd64.go:212] [ 4734(1206): 4734(1206)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.803534 355572 usertrap_amd64.go:122] [ 4734(1206): 4734(1206)] Allocate a new trap: 0xc000e1c480 39 D0318 16:20:36.803703 355572 usertrap_amd64.go:225] [ 4734(1206): 4734(1206)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.807454 355572 usertrap_amd64.go:212] [ 4733( 761): 4733( 761)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.807531 355572 usertrap_amd64.go:122] [ 4733( 761): 4733( 761)] Allocate a new trap: 0xc000e1c450 40 D0318 16:20:36.807672 355572 usertrap_amd64.go:225] [ 4733( 761): 4733( 761)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.809368 355572 usertrap_amd64.go:212] [ 4733( 761): 4733( 761)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.809466 355572 usertrap_amd64.go:122] [ 4733( 761): 4733( 761)] Allocate a new trap: 0xc000e1c450 41 D0318 16:20:36.809708 355572 usertrap_amd64.go:225] [ 4733( 761): 4733( 761)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.809901 355572 usertrap_amd64.go:212] [ 4733( 761): 4736( 762)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.809986 355572 usertrap_amd64.go:122] [ 4733( 761): 4736( 762)] Allocate a new trap: 0xc000e1c450 42 D0318 16:20:36.810108 355572 usertrap_amd64.go:225] [ 4733( 761): 4736( 762)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.812483 355572 usertrap_amd64.go:212] [ 4734(1206): 4734(1206)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.812665 355572 usertrap_amd64.go:122] [ 4734(1206): 4734(1206)] Allocate a new trap: 0xc000e1c480 40 D0318 16:20:36.812836 355572 usertrap_amd64.go:225] [ 4734(1206): 4734(1206)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.812976 355572 task_signals.go:309] [ 4733( 761): 4736( 762)] failed to restore from a signal frame: bad address D0318 16:20:36.813174 355572 task_signals.go:470] [ 4733( 761): 4736( 762)] Notified of signal 11 D0318 16:20:36.813268 355572 task_signals.go:220] [ 4733( 761): 4736( 762)] Signal 11: delivering to handler D0318 16:20:36.814533 355572 usertrap_amd64.go:212] [ 4734(1206): 4734(1206)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.814593 355572 usertrap_amd64.go:122] [ 4734(1206): 4734(1206)] Allocate a new trap: 0xc000e1c480 41 D0318 16:20:36.814680 355572 usertrap_amd64.go:225] [ 4734(1206): 4734(1206)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.815194 355572 usertrap_amd64.go:212] [ 4733( 761): 4733( 761)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.815255 355572 usertrap_amd64.go:122] [ 4733( 761): 4733( 761)] Allocate a new trap: 0xc000e1c450 43 D0318 16:20:36.815399 355572 usertrap_amd64.go:225] [ 4733( 761): 4733( 761)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.816159 355572 usertrap_amd64.go:212] [ 4734(1206): 4737(1207)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.816253 355572 usertrap_amd64.go:122] [ 4734(1206): 4737(1207)] Allocate a new trap: 0xc000e1c480 42 D0318 16:20:36.816184 355572 usertrap_amd64.go:212] [ 4735(1185): 4735(1185)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.816428 355572 usertrap_amd64.go:122] [ 4735(1185): 4735(1185)] Allocate a new trap: 0xc000526240 37 D0318 16:20:36.816406 355572 usertrap_amd64.go:225] [ 4734(1206): 4737(1207)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.817189 355572 usertrap_amd64.go:225] [ 4735(1185): 4735(1185)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.818446 355572 usertrap_amd64.go:212] [ 4734(1206): 4734(1206)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.818555 355572 usertrap_amd64.go:122] [ 4734(1206): 4734(1206)] Allocate a new trap: 0xc000e1c480 43 D0318 16:20:36.818664 355572 usertrap_amd64.go:225] [ 4734(1206): 4734(1206)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.819969 355572 task_exit.go:204] [ 4733( 761): 4733( 761)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.820178 355572 task_signals.go:204] [ 4733( 761): 4736( 762)] Signal 9, PID: 4733, TID: 4736, fault addr: 0x0: terminating thread group D0318 16:20:36.820297 355572 usertrap_amd64.go:212] [ 4735(1185): 4735(1185)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.820386 355572 usertrap_amd64.go:122] [ 4735(1185): 4735(1185)] Allocate a new trap: 0xc000526240 38 D0318 16:20:36.820502 355572 usertrap_amd64.go:225] [ 4735(1185): 4735(1185)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.820755 355572 task_exit.go:204] [ 4733( 761): 4733( 761)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.820900 355572 task_exit.go:204] [ 4733( 761): 4736( 762)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.825900 355572 task_signals.go:204] [ 4734(1206): 4737(1207)] Signal 9, PID: 4734, TID: 4737, fault addr: 0x0: terminating thread group D0318 16:20:36.826008 355572 task_exit.go:204] [ 4733( 761): 4736( 762)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.826102 355572 task_exit.go:204] [ 4733( 761): 4736( 762)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.826267 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.826493 355572 task_exit.go:204] [ 4734(1206): 4734(1206)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.826634 355572 task_exit.go:204] [ 4734(1206): 4737(1207)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.826911 355572 task_exit.go:204] [ 4733( 761): 4733( 761)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.827846 355572 task_exit.go:204] [ 4734(1206): 4737(1207)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.827928 355572 task_exit.go:204] [ 4734(1206): 4737(1207)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0xc, 0x0, &(0x7f0000000180)) D0318 16:20:36.832796 355572 task_exit.go:204] [ 4734(1206): 4734(1206)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.832906 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.833922 355572 task_exit.go:204] [ 4734(1206): 4734(1206)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.835277 355572 usertrap_amd64.go:212] [ 4735(1185): 4735(1185)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.835352 355572 usertrap_amd64.go:122] [ 4735(1185): 4735(1185)] Allocate a new trap: 0xc000526240 39 D0318 16:20:36.835440 355572 usertrap_amd64.go:225] [ 4735(1185): 4735(1185)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) 16:20:36 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}], 0x1, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:36.843653 355572 usertrap_amd64.go:212] [ 4735(1185): 4735(1185)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.843740 355572 usertrap_amd64.go:122] [ 4735(1185): 4735(1185)] Allocate a new trap: 0xc000526240 40 D0318 16:20:36.843843 355572 usertrap_amd64.go:225] [ 4735(1185): 4735(1185)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.845579 355572 usertrap_amd64.go:212] [ 4735(1185): 4735(1185)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.845636 355572 usertrap_amd64.go:122] [ 4735(1185): 4735(1185)] Allocate a new trap: 0xc000526240 41 D0318 16:20:36.845739 355572 usertrap_amd64.go:225] [ 4735(1185): 4735(1185)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.846390 355572 usertrap_amd64.go:212] [ 4735(1185): 4738(1186)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.846548 355572 usertrap_amd64.go:122] [ 4735(1185): 4738(1186)] Allocate a new trap: 0xc000526240 42 D0318 16:20:36.846793 355572 usertrap_amd64.go:225] [ 4735(1185): 4738(1186)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.849660 355572 usertrap_amd64.go:212] [ 4735(1185): 4735(1185)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.849746 355572 usertrap_amd64.go:122] [ 4735(1185): 4735(1185)] Allocate a new trap: 0xc000526240 43 D0318 16:20:36.849836 355572 usertrap_amd64.go:225] [ 4735(1185): 4735(1185)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.855470 355572 task_exit.go:204] [ 4735(1185): 4735(1185)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.855765 355572 task_signals.go:204] [ 4735(1185): 4738(1186)] Signal 9, PID: 4735, TID: 4738, fault addr: 0x0: terminating thread group D0318 16:20:36.856280 355572 task_exit.go:204] [ 4735(1185): 4735(1185)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.856375 355572 task_exit.go:204] [ 4735(1185): 4738(1186)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.861956 355572 task_exit.go:204] [ 4735(1185): 4738(1186)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.862073 355572 task_exit.go:204] [ 4735(1185): 4738(1186)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.862195 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.862261 355572 usertrap_amd64.go:212] [ 4739( 763): 4739( 763)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.862388 355572 task_exit.go:204] [ 4735(1185): 4735(1185)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.862468 355572 usertrap_amd64.go:122] [ 4739( 763): 4739( 763)] Allocate a new trap: 0xc0009760c0 37 D0318 16:20:36.863221 355572 usertrap_amd64.go:212] [ 4740(1208): 4740(1208)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.863441 355572 usertrap_amd64.go:225] [ 4739( 763): 4739( 763)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.863455 355572 usertrap_amd64.go:122] [ 4740(1208): 4740(1208)] Allocate a new trap: 0xc005e161e0 37 16:20:36 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@empty, @random="3814891e39c1", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "595ee6", 0x30, 0x3a, 0x0, @dev, @private2, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, 'c\x00M', 0x0, 0x0, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}}, 0x0) D0318 16:20:36.864569 355572 usertrap_amd64.go:225] [ 4740(1208): 4740(1208)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.867572 355572 usertrap_amd64.go:212] [ 4739( 763): 4739( 763)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.867753 355572 usertrap_amd64.go:212] [ 4740(1208): 4740(1208)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.867746 355572 usertrap_amd64.go:122] [ 4739( 763): 4739( 763)] Allocate a new trap: 0xc0009760c0 38 D0318 16:20:36.867796 355572 usertrap_amd64.go:122] [ 4740(1208): 4740(1208)] Allocate a new trap: 0xc005e161e0 38 D0318 16:20:36.867845 355572 usertrap_amd64.go:225] [ 4740(1208): 4740(1208)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.867861 355572 usertrap_amd64.go:225] [ 4739( 763): 4739( 763)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.881370 355572 usertrap_amd64.go:212] [ 4739( 763): 4739( 763)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.881497 355572 usertrap_amd64.go:122] [ 4739( 763): 4739( 763)] Allocate a new trap: 0xc0009760c0 39 D0318 16:20:36.881623 355572 usertrap_amd64.go:225] [ 4739( 763): 4739( 763)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.885186 355572 usertrap_amd64.go:212] [ 4740(1208): 4740(1208)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.885313 355572 usertrap_amd64.go:122] [ 4740(1208): 4740(1208)] Allocate a new trap: 0xc005e161e0 39 D0318 16:20:36.885448 355572 usertrap_amd64.go:225] [ 4740(1208): 4740(1208)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.889589 355572 usertrap_amd64.go:212] [ 4739( 763): 4739( 763)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.889746 355572 usertrap_amd64.go:122] [ 4739( 763): 4739( 763)] Allocate a new trap: 0xc0009760c0 40 D0318 16:20:36.889846 355572 usertrap_amd64.go:225] [ 4739( 763): 4739( 763)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.889830 355572 usertrap_amd64.go:212] [ 4741(1187): 4741(1187)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.890086 355572 usertrap_amd64.go:122] [ 4741(1187): 4741(1187)] Allocate a new trap: 0xc00637d3b0 37 D0318 16:20:36.890831 355572 usertrap_amd64.go:225] [ 4741(1187): 4741(1187)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.891464 355572 usertrap_amd64.go:212] [ 4739( 763): 4739( 763)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.891555 355572 usertrap_amd64.go:122] [ 4739( 763): 4739( 763)] Allocate a new trap: 0xc0009760c0 41 D0318 16:20:36.891669 355572 usertrap_amd64.go:225] [ 4739( 763): 4739( 763)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.891994 355572 usertrap_amd64.go:212] [ 4739( 763): 4742( 764)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.892079 355572 usertrap_amd64.go:122] [ 4739( 763): 4742( 764)] Allocate a new trap: 0xc0009760c0 42 D0318 16:20:36.892338 355572 usertrap_amd64.go:225] [ 4739( 763): 4742( 764)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.894333 355572 usertrap_amd64.go:212] [ 4741(1187): 4741(1187)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.894424 355572 usertrap_amd64.go:122] [ 4741(1187): 4741(1187)] Allocate a new trap: 0xc00637d3b0 38 D0318 16:20:36.894564 355572 usertrap_amd64.go:225] [ 4741(1187): 4741(1187)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.894963 355572 usertrap_amd64.go:212] [ 4740(1208): 4740(1208)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.895054 355572 usertrap_amd64.go:122] [ 4740(1208): 4740(1208)] Allocate a new trap: 0xc005e161e0 40 D0318 16:20:36.895133 355572 usertrap_amd64.go:225] [ 4740(1208): 4740(1208)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.896930 355572 usertrap_amd64.go:212] [ 4740(1208): 4740(1208)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.897016 355572 usertrap_amd64.go:122] [ 4740(1208): 4740(1208)] Allocate a new trap: 0xc005e161e0 41 D0318 16:20:36.897120 355572 usertrap_amd64.go:212] [ 4739( 763): 4739( 763)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.897139 355572 usertrap_amd64.go:225] [ 4740(1208): 4740(1208)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.897178 355572 usertrap_amd64.go:122] [ 4739( 763): 4739( 763)] Allocate a new trap: 0xc0009760c0 43 D0318 16:20:36.897284 355572 usertrap_amd64.go:212] [ 4740(1208): 4743(1209)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.897289 355572 usertrap_amd64.go:225] [ 4739( 763): 4739( 763)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.897389 355572 usertrap_amd64.go:122] [ 4740(1208): 4743(1209)] Allocate a new trap: 0xc005e161e0 42 D0318 16:20:36.897461 355572 usertrap_amd64.go:225] [ 4740(1208): 4743(1209)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.900357 355572 task_signals.go:309] [ 4740(1208): 4743(1209)] failed to restore from a signal frame: bad address D0318 16:20:36.900495 355572 task_signals.go:470] [ 4740(1208): 4743(1209)] Notified of signal 11 D0318 16:20:36.900584 355572 task_signals.go:220] [ 4740(1208): 4743(1209)] Signal 11: delivering to handler D0318 16:20:36.902057 355572 usertrap_amd64.go:212] [ 4740(1208): 4740(1208)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.902153 355572 usertrap_amd64.go:122] [ 4740(1208): 4740(1208)] Allocate a new trap: 0xc005e161e0 43 D0318 16:20:36.902235 355572 usertrap_amd64.go:225] [ 4740(1208): 4740(1208)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.902646 355572 task_exit.go:204] [ 4739( 763): 4739( 763)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.902785 355572 task_signals.go:204] [ 4739( 763): 4742( 764)] Signal 9, PID: 4739, TID: 4742, fault addr: 0x0: terminating thread group D0318 16:20:36.902943 355572 task_exit.go:204] [ 4739( 763): 4742( 764)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.903888 355572 task_exit.go:204] [ 4739( 763): 4742( 764)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.903952 355572 task_exit.go:204] [ 4739( 763): 4742( 764)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.908581 355572 task_exit.go:204] [ 4740(1208): 4740(1208)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.908744 355572 usertrap_amd64.go:212] [ 4741(1187): 4741(1187)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.908816 355572 task_signals.go:204] [ 4740(1208): 4743(1209)] Signal 9, PID: 4740, TID: 4743, fault addr: 0x0: terminating thread group D0318 16:20:36.908887 355572 usertrap_amd64.go:122] [ 4741(1187): 4741(1187)] Allocate a new trap: 0xc00637d3b0 39 D0318 16:20:36.908983 355572 usertrap_amd64.go:225] [ 4741(1187): 4741(1187)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.909372 355572 task_exit.go:204] [ 4740(1208): 4740(1208)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.909869 355572 task_exit.go:204] [ 4740(1208): 4743(1209)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.910272 355572 task_exit.go:204] [ 4739( 763): 4739( 763)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.910370 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.911377 355572 task_exit.go:204] [ 4739( 763): 4739( 763)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 2: sigaltstack(&(0x7f00000004c0)={0x0}, 0x0) D0318 16:20:36.914967 355572 task_exit.go:204] [ 4740(1208): 4743(1209)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.915063 355572 task_exit.go:204] [ 4740(1208): 4743(1209)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.915159 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.915726 355572 task_exit.go:204] [ 4740(1208): 4740(1208)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 3: shmat(0x0, &(0x7f0000800000/0x800000)=nil, 0x0) D0318 16:20:36.919426 355572 usertrap_amd64.go:212] [ 4741(1187): 4741(1187)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:36.919542 355572 usertrap_amd64.go:122] [ 4741(1187): 4741(1187)] Allocate a new trap: 0xc00637d3b0 40 D0318 16:20:36.919663 355572 usertrap_amd64.go:225] [ 4741(1187): 4741(1187)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.921462 355572 usertrap_amd64.go:212] [ 4741(1187): 4741(1187)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:36.921538 355572 usertrap_amd64.go:122] [ 4741(1187): 4741(1187)] Allocate a new trap: 0xc00637d3b0 41 D0318 16:20:36.921807 355572 usertrap_amd64.go:225] [ 4741(1187): 4741(1187)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.922043 355572 usertrap_amd64.go:212] [ 4741(1187): 4744(1188)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:36.922124 355572 usertrap_amd64.go:122] [ 4741(1187): 4744(1188)] Allocate a new trap: 0xc00637d3b0 42 D0318 16:20:36.922225 355572 usertrap_amd64.go:225] [ 4741(1187): 4744(1188)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.923188 355572 usertrap_amd64.go:212] [ 4741(1187): 4744(1188)] Found the pattern at ip 562e85cf5ae8:sysno 1 D0318 16:20:36.923247 355572 usertrap_amd64.go:122] [ 4741(1187): 4744(1188)] Allocate a new trap: 0xc00637d3b0 43 D0318 16:20:36.923332 355572 usertrap_amd64.go:225] [ 4741(1187): 4744(1188)] Apply the binary patch addr 562e85cf5ae8 trap addr 66d70 ([184 1 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.927583 355572 usertrap_amd64.go:212] [ 4741(1187): 4741(1187)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:36.927739 355572 usertrap_amd64.go:122] [ 4741(1187): 4741(1187)] Allocate a new trap: 0xc00637d3b0 44 D0318 16:20:36.927857 355572 usertrap_amd64.go:225] [ 4741(1187): 4741(1187)] Apply the binary patch addr 562e85cf5c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:36.931365 355572 task_exit.go:204] [ 4741(1187): 4741(1187)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.932084 355572 task_signals.go:204] [ 4741(1187): 4744(1188)] Signal 9, PID: 4741, TID: 4744, fault addr: 0x0: terminating thread group D0318 16:20:36.932175 355572 task_exit.go:204] [ 4741(1187): 4741(1187)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.932307 355572 task_exit.go:204] [ 4741(1187): 4744(1188)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.938471 355572 task_exit.go:204] [ 4741(1187): 4744(1188)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.938570 355572 task_exit.go:204] [ 4741(1187): 4744(1188)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.938674 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:36.938755 355572 task_exit.go:204] [ 4741(1187): 4741(1187)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 1: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}], 0x1, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:36.942339 355572 usertrap_amd64.go:212] [ 4745( 765): 4745( 765)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:36.942457 355572 usertrap_amd64.go:122] [ 4745( 765): 4745( 765)] Allocate a new trap: 0xc005e16270 37 D0318 16:20:36.943202 355572 usertrap_amd64.go:225] [ 4745( 765): 4745( 765)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:36.947268 355572 usertrap_amd64.go:212] [ 4746(1210): 4746(1210)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:36.947430 355572 usertrap_amd64.go:122] [ 4746(1210): 4746(1210)] Allocate a new trap: 0xc005e16300 37 D0318 16:20:36.948155 355572 usertrap_amd64.go:225] [ 4746(1210): 4746(1210)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.948528 355572 usertrap_amd64.go:212] [ 4745( 765): 4745( 765)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:36.948609 355572 usertrap_amd64.go:122] [ 4745( 765): 4745( 765)] Allocate a new trap: 0xc005e16270 38 D0318 16:20:36.948761 355572 usertrap_amd64.go:225] [ 4745( 765): 4745( 765)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:36.951136 355572 usertrap_amd64.go:212] [ 4746(1210): 4746(1210)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:36.951232 355572 usertrap_amd64.go:122] [ 4746(1210): 4746(1210)] Allocate a new trap: 0xc005e16300 38 D0318 16:20:36.951331 355572 usertrap_amd64.go:225] [ 4746(1210): 4746(1210)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.962330 355572 usertrap_amd64.go:212] [ 4745( 765): 4745( 765)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:36.962439 355572 usertrap_amd64.go:212] [ 4746(1210): 4746(1210)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:36.962555 355572 usertrap_amd64.go:122] [ 4745( 765): 4745( 765)] Allocate a new trap: 0xc005e16270 39 D0318 16:20:36.962699 355572 usertrap_amd64.go:122] [ 4746(1210): 4746(1210)] Allocate a new trap: 0xc005e16300 39 D0318 16:20:36.962841 355572 usertrap_amd64.go:225] [ 4746(1210): 4746(1210)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:36.962908 355572 usertrap_amd64.go:225] [ 4745( 765): 4745( 765)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:36.970689 355572 usertrap_amd64.go:212] [ 4746(1210): 4746(1210)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:36.970787 355572 usertrap_amd64.go:122] [ 4746(1210): 4746(1210)] Allocate a new trap: 0xc005e16300 40 D0318 16:20:36.970853 355572 usertrap_amd64.go:225] [ 4746(1210): 4746(1210)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:36.972317 355572 usertrap_amd64.go:212] [ 4746(1210): 4746(1210)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:36.972406 355572 usertrap_amd64.go:122] [ 4746(1210): 4746(1210)] Allocate a new trap: 0xc005e16300 41 D0318 16:20:36.972499 355572 usertrap_amd64.go:225] [ 4746(1210): 4746(1210)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:36.972969 355572 usertrap_amd64.go:212] [ 4746(1210): 4748(1211)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:36.973058 355572 usertrap_amd64.go:122] [ 4746(1210): 4748(1211)] Allocate a new trap: 0xc005e16300 42 D0318 16:20:36.973159 355572 usertrap_amd64.go:225] [ 4746(1210): 4748(1211)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:36.974700 355572 usertrap_amd64.go:212] [ 4746(1210): 4746(1210)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:36.974789 355572 usertrap_amd64.go:122] [ 4746(1210): 4746(1210)] Allocate a new trap: 0xc005e16300 43 D0318 16:20:36.974884 355572 usertrap_amd64.go:225] [ 4746(1210): 4746(1210)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:36.975674 355572 usertrap_amd64.go:212] [ 4745( 765): 4745( 765)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:36.975746 355572 usertrap_amd64.go:122] [ 4745( 765): 4745( 765)] Allocate a new trap: 0xc005e16270 40 D0318 16:20:36.975885 355572 usertrap_amd64.go:225] [ 4745( 765): 4745( 765)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:36.976608 355572 usertrap_amd64.go:212] [ 4747(1189): 4747(1189)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:36.976721 355572 usertrap_amd64.go:122] [ 4747(1189): 4747(1189)] Allocate a new trap: 0xc005d560f0 37 D0318 16:20:36.977416 355572 usertrap_amd64.go:212] [ 4745( 765): 4745( 765)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:36.977489 355572 usertrap_amd64.go:122] [ 4745( 765): 4745( 765)] Allocate a new trap: 0xc005e16270 41 D0318 16:20:36.977613 355572 usertrap_amd64.go:225] [ 4745( 765): 4745( 765)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:36.977691 355572 usertrap_amd64.go:225] [ 4747(1189): 4747(1189)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:36.978346 355572 usertrap_amd64.go:212] [ 4745( 765): 4749( 766)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:36.978419 355572 usertrap_amd64.go:122] [ 4745( 765): 4749( 766)] Allocate a new trap: 0xc005e16270 42 D0318 16:20:36.978538 355572 usertrap_amd64.go:225] [ 4745( 765): 4749( 766)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:36.980300 355572 usertrap_amd64.go:212] [ 4745( 765): 4745( 765)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:36.980426 355572 usertrap_amd64.go:122] [ 4745( 765): 4745( 765)] Allocate a new trap: 0xc005e16270 43 D0318 16:20:36.980528 355572 usertrap_amd64.go:225] [ 4745( 765): 4745( 765)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:36.981013 355572 usertrap_amd64.go:212] [ 4747(1189): 4747(1189)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:36.981099 355572 usertrap_amd64.go:122] [ 4747(1189): 4747(1189)] Allocate a new trap: 0xc005d560f0 38 D0318 16:20:36.981156 355572 usertrap_amd64.go:225] [ 4747(1189): 4747(1189)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:36.981796 355572 task_exit.go:204] [ 4746(1210): 4746(1210)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.982607 355572 task_signals.go:204] [ 4746(1210): 4748(1211)] Signal 9, PID: 4746, TID: 4748, fault addr: 0x0: terminating thread group D0318 16:20:36.982737 355572 task_exit.go:204] [ 4746(1210): 4748(1211)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.983034 355572 task_exit.go:204] [ 4746(1210): 4746(1210)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.985187 355572 task_exit.go:204] [ 4745( 765): 4745( 765)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.985358 355572 task_signals.go:204] [ 4745( 765): 4749( 766)] Signal 9, PID: 4745, TID: 4749, fault addr: 0x0: terminating thread group D0318 16:20:36.985973 355572 task_exit.go:204] [ 4745( 765): 4749( 766)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:36.986486 355572 task_exit.go:204] [ 4745( 765): 4745( 765)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.987950 355572 task_exit.go:204] [ 4746(1210): 4748(1211)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.988117 355572 task_exit.go:204] [ 4746(1210): 4748(1211)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.988250 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:36.988520 355572 task_exit.go:204] [ 4746(1210): 4746(1210)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 3: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='!^-[\x00', 0x0) D0318 16:20:36.990886 355572 task_exit.go:204] [ 4745( 765): 4749( 766)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:36.990955 355572 task_exit.go:204] [ 4745( 765): 4749( 766)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:36.991062 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:36.991443 355572 task_exit.go:204] [ 4745( 765): 4745( 765)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x2, 0x0, &(0x7f0000000180)) D0318 16:20:36.994439 355572 usertrap_amd64.go:212] [ 4747(1189): 4747(1189)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:36.994529 355572 usertrap_amd64.go:122] [ 4747(1189): 4747(1189)] Allocate a new trap: 0xc005d560f0 39 D0318 16:20:36.994709 355572 usertrap_amd64.go:225] [ 4747(1189): 4747(1189)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.002564 355572 usertrap_amd64.go:212] [ 4747(1189): 4747(1189)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.002656 355572 usertrap_amd64.go:122] [ 4747(1189): 4747(1189)] Allocate a new trap: 0xc005d560f0 40 D0318 16:20:37.002764 355572 usertrap_amd64.go:225] [ 4747(1189): 4747(1189)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.004355 355572 usertrap_amd64.go:212] [ 4747(1189): 4747(1189)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.004420 355572 usertrap_amd64.go:122] [ 4747(1189): 4747(1189)] Allocate a new trap: 0xc005d560f0 41 D0318 16:20:37.004499 355572 usertrap_amd64.go:225] [ 4747(1189): 4747(1189)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.005144 355572 usertrap_amd64.go:212] [ 4747(1189): 4750(1190)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.005246 355572 usertrap_amd64.go:122] [ 4747(1189): 4750(1190)] Allocate a new trap: 0xc005d560f0 42 D0318 16:20:37.005334 355572 usertrap_amd64.go:225] [ 4747(1189): 4750(1190)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.008789 355572 task_signals.go:309] [ 4747(1189): 4750(1190)] failed to restore from a signal frame: bad address D0318 16:20:37.008984 355572 task_signals.go:470] [ 4747(1189): 4750(1190)] Notified of signal 11 D0318 16:20:37.009176 355572 task_signals.go:220] [ 4747(1189): 4750(1190)] Signal 11: delivering to handler D0318 16:20:37.011004 355572 usertrap_amd64.go:212] [ 4747(1189): 4747(1189)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.011088 355572 usertrap_amd64.go:122] [ 4747(1189): 4747(1189)] Allocate a new trap: 0xc005d560f0 43 D0318 16:20:37.011154 355572 usertrap_amd64.go:225] [ 4747(1189): 4747(1189)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.016580 355572 task_exit.go:204] [ 4747(1189): 4747(1189)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.017213 355572 task_signals.go:204] [ 4747(1189): 4750(1190)] Signal 9, PID: 4747, TID: 4750, fault addr: 0x0: terminating thread group D0318 16:20:37.017351 355572 task_exit.go:204] [ 4747(1189): 4750(1190)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.017631 355572 task_exit.go:204] [ 4747(1189): 4747(1189)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.017936 355572 usertrap_amd64.go:212] [ 4751(1212): 4751(1212)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:37.018025 355572 usertrap_amd64.go:122] [ 4751(1212): 4751(1212)] Allocate a new trap: 0xc000dc6150 37 D0318 16:20:37.018552 355572 usertrap_amd64.go:225] [ 4751(1212): 4751(1212)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.022793 355572 usertrap_amd64.go:212] [ 4751(1212): 4751(1212)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:37.022851 355572 usertrap_amd64.go:122] [ 4751(1212): 4751(1212)] Allocate a new trap: 0xc000dc6150 38 D0318 16:20:37.022881 355572 task_exit.go:204] [ 4747(1189): 4750(1190)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.022941 355572 usertrap_amd64.go:225] [ 4751(1212): 4751(1212)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.022982 355572 task_exit.go:204] [ 4747(1189): 4750(1190)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.023092 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.023307 355572 task_exit.go:204] [ 4747(1189): 4747(1189)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 1: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) D0318 16:20:37.028514 355572 usertrap_amd64.go:212] [ 4752( 767): 4752( 767)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.028623 355572 usertrap_amd64.go:122] [ 4752( 767): 4752( 767)] Allocate a new trap: 0xc000e1c4b0 37 D0318 16:20:37.029226 355572 usertrap_amd64.go:225] [ 4752( 767): 4752( 767)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.034001 355572 usertrap_amd64.go:212] [ 4752( 767): 4752( 767)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.034094 355572 usertrap_amd64.go:122] [ 4752( 767): 4752( 767)] Allocate a new trap: 0xc000e1c4b0 38 D0318 16:20:37.034151 355572 usertrap_amd64.go:225] [ 4752( 767): 4752( 767)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.038119 355572 usertrap_amd64.go:212] [ 4751(1212): 4751(1212)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:37.038187 355572 usertrap_amd64.go:122] [ 4751(1212): 4751(1212)] Allocate a new trap: 0xc000dc6150 39 D0318 16:20:37.038268 355572 usertrap_amd64.go:225] [ 4751(1212): 4751(1212)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.045849 355572 usertrap_amd64.go:212] [ 4751(1212): 4751(1212)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:37.045998 355572 usertrap_amd64.go:122] [ 4751(1212): 4751(1212)] Allocate a new trap: 0xc000dc6150 40 D0318 16:20:37.046215 355572 usertrap_amd64.go:225] [ 4751(1212): 4751(1212)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.047901 355572 usertrap_amd64.go:212] [ 4751(1212): 4751(1212)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:37.048018 355572 usertrap_amd64.go:122] [ 4751(1212): 4751(1212)] Allocate a new trap: 0xc000dc6150 41 D0318 16:20:37.048193 355572 usertrap_amd64.go:225] [ 4751(1212): 4751(1212)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.048717 355572 usertrap_amd64.go:212] [ 4751(1212): 4754(1213)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:37.048787 355572 usertrap_amd64.go:122] [ 4751(1212): 4754(1213)] Allocate a new trap: 0xc000dc6150 42 D0318 16:20:37.048862 355572 usertrap_amd64.go:225] [ 4751(1212): 4754(1213)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.049206 355572 usertrap_amd64.go:212] [ 4752( 767): 4752( 767)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.049370 355572 usertrap_amd64.go:122] [ 4752( 767): 4752( 767)] Allocate a new trap: 0xc000e1c4b0 39 D0318 16:20:37.049486 355572 usertrap_amd64.go:225] [ 4752( 767): 4752( 767)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.055686 355572 usertrap_amd64.go:212] [ 4752( 767): 4752( 767)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.055893 355572 usertrap_amd64.go:122] [ 4752( 767): 4752( 767)] Allocate a new trap: 0xc000e1c4b0 40 D0318 16:20:37.056010 355572 usertrap_amd64.go:225] [ 4752( 767): 4752( 767)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.056616 355572 usertrap_amd64.go:212] [ 4753(1191): 4753(1191)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.056722 355572 usertrap_amd64.go:122] [ 4753(1191): 4753(1191)] Allocate a new trap: 0xc000dc6180 37 D0318 16:20:37.056789 355572 usertrap_amd64.go:212] [ 4751(1212): 4751(1212)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:37.056849 355572 usertrap_amd64.go:122] [ 4751(1212): 4751(1212)] Allocate a new trap: 0xc000dc6150 43 D0318 16:20:37.056906 355572 usertrap_amd64.go:225] [ 4751(1212): 4751(1212)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.057455 355572 usertrap_amd64.go:225] [ 4753(1191): 4753(1191)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.057842 355572 usertrap_amd64.go:212] [ 4752( 767): 4752( 767)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.057918 355572 usertrap_amd64.go:122] [ 4752( 767): 4752( 767)] Allocate a new trap: 0xc000e1c4b0 41 D0318 16:20:37.057986 355572 usertrap_amd64.go:225] [ 4752( 767): 4752( 767)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.058244 355572 usertrap_amd64.go:212] [ 4752( 767): 4755( 768)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.058344 355572 usertrap_amd64.go:122] [ 4752( 767): 4755( 768)] Allocate a new trap: 0xc000e1c4b0 42 D0318 16:20:37.058438 355572 usertrap_amd64.go:225] [ 4752( 767): 4755( 768)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.061246 355572 task_exit.go:204] [ 4751(1212): 4751(1212)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.061943 355572 task_signals.go:204] [ 4751(1212): 4754(1213)] Signal 9, PID: 4751, TID: 4754, fault addr: 0x0: terminating thread group D0318 16:20:37.061991 355572 task_exit.go:204] [ 4751(1212): 4751(1212)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.062026 355572 usertrap_amd64.go:212] [ 4752( 767): 4752( 767)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.062098 355572 task_exit.go:204] [ 4751(1212): 4754(1213)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.062089 355572 usertrap_amd64.go:122] [ 4752( 767): 4752( 767)] Allocate a new trap: 0xc000e1c4b0 43 D0318 16:20:37.062212 355572 usertrap_amd64.go:225] [ 4752( 767): 4752( 767)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.063113 355572 usertrap_amd64.go:212] [ 4753(1191): 4753(1191)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.063198 355572 usertrap_amd64.go:122] [ 4753(1191): 4753(1191)] Allocate a new trap: 0xc000dc6180 38 D0318 16:20:37.063302 355572 usertrap_amd64.go:225] [ 4753(1191): 4753(1191)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.066941 355572 task_signals.go:204] [ 4752( 767): 4755( 768)] Signal 9, PID: 4752, TID: 4755, fault addr: 0x0: terminating thread group D0318 16:20:37.067012 355572 task_exit.go:204] [ 4752( 767): 4752( 767)] Transitioning from exit state TaskExitNone to TaskExitInitiated I0318 16:20:37.067200 355572 watchdog.go:295] Watchdog starting loop, tasks: 72, discount: 0s D0318 16:20:37.067263 355572 task_exit.go:204] [ 4752( 767): 4755( 768)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.068240 355572 task_exit.go:204] [ 4752( 767): 4755( 768)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.068300 355572 task_exit.go:204] [ 4752( 767): 4755( 768)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.068934 355572 task_exit.go:204] [ 4751(1212): 4754(1213)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.068990 355572 task_exit.go:204] [ 4751(1212): 4754(1213)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.069170 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:37.069570 355572 task_exit.go:204] [ 4751(1212): 4751(1212)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{}], 0x1, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:37.073745 355572 task_exit.go:204] [ 4752( 767): 4752( 767)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.073845 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.074104 355572 task_exit.go:204] [ 4752( 767): 4752( 767)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8914, &(0x7f00000008c0)={'batadv_slave_1\x00'}) D0318 16:20:37.077561 355572 usertrap_amd64.go:212] [ 4753(1191): 4753(1191)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.077629 355572 usertrap_amd64.go:122] [ 4753(1191): 4753(1191)] Allocate a new trap: 0xc000dc6180 39 D0318 16:20:37.077716 355572 usertrap_amd64.go:225] [ 4753(1191): 4753(1191)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.085445 355572 usertrap_amd64.go:212] [ 4753(1191): 4753(1191)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.085532 355572 usertrap_amd64.go:122] [ 4753(1191): 4753(1191)] Allocate a new trap: 0xc000dc6180 40 D0318 16:20:37.085620 355572 usertrap_amd64.go:225] [ 4753(1191): 4753(1191)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.087034 355572 usertrap_amd64.go:212] [ 4753(1191): 4753(1191)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.087087 355572 usertrap_amd64.go:122] [ 4753(1191): 4753(1191)] Allocate a new trap: 0xc000dc6180 41 D0318 16:20:37.087143 355572 usertrap_amd64.go:225] [ 4753(1191): 4753(1191)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.087874 355572 usertrap_amd64.go:212] [ 4753(1191): 4756(1192)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.087989 355572 usertrap_amd64.go:122] [ 4753(1191): 4756(1192)] Allocate a new trap: 0xc000dc6180 42 D0318 16:20:37.088071 355572 usertrap_amd64.go:225] [ 4753(1191): 4756(1192)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.089709 355572 usertrap_amd64.go:212] [ 4753(1191): 4753(1191)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.089773 355572 usertrap_amd64.go:122] [ 4753(1191): 4753(1191)] Allocate a new trap: 0xc000dc6180 43 D0318 16:20:37.089848 355572 usertrap_amd64.go:225] [ 4753(1191): 4753(1191)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.095414 355572 task_exit.go:204] [ 4753(1191): 4753(1191)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.095587 355572 task_signals.go:204] [ 4753(1191): 4756(1192)] Signal 9, PID: 4753, TID: 4756, fault addr: 0x0: terminating thread group D0318 16:20:37.096142 355572 task_exit.go:204] [ 4753(1191): 4753(1191)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.096322 355572 task_exit.go:204] [ 4753(1191): 4756(1192)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.098953 355572 usertrap_amd64.go:212] [ 4757(1214): 4757(1214)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:37.099132 355572 usertrap_amd64.go:122] [ 4757(1214): 4757(1214)] Allocate a new trap: 0xc005d561b0 37 D0318 16:20:37.099792 355572 usertrap_amd64.go:225] [ 4757(1214): 4757(1214)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.101701 355572 task_exit.go:204] [ 4753(1191): 4756(1192)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.101790 355572 task_exit.go:204] [ 4753(1191): 4756(1192)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.101890 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.102046 355572 task_exit.go:204] [ 4753(1191): 4753(1191)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.102451 355572 usertrap_amd64.go:212] [ 4758( 769): 4758( 769)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.102530 355572 usertrap_amd64.go:122] [ 4758( 769): 4758( 769)] Allocate a new trap: 0xc0009762a0 37 16:20:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000340), 0x4) D0318 16:20:37.103297 355572 usertrap_amd64.go:225] [ 4758( 769): 4758( 769)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.105183 355572 usertrap_amd64.go:212] [ 4757(1214): 4757(1214)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:37.105272 355572 usertrap_amd64.go:122] [ 4757(1214): 4757(1214)] Allocate a new trap: 0xc005d561b0 38 D0318 16:20:37.105400 355572 usertrap_amd64.go:225] [ 4757(1214): 4757(1214)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.107118 355572 usertrap_amd64.go:212] [ 4758( 769): 4758( 769)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.107302 355572 usertrap_amd64.go:122] [ 4758( 769): 4758( 769)] Allocate a new trap: 0xc0009762a0 38 D0318 16:20:37.107407 355572 usertrap_amd64.go:225] [ 4758( 769): 4758( 769)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.119534 355572 usertrap_amd64.go:212] [ 4757(1214): 4757(1214)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:37.119666 355572 usertrap_amd64.go:122] [ 4757(1214): 4757(1214)] Allocate a new trap: 0xc005d561b0 39 D0318 16:20:37.119807 355572 usertrap_amd64.go:225] [ 4757(1214): 4757(1214)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.122865 355572 usertrap_amd64.go:212] [ 4758( 769): 4758( 769)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.122947 355572 usertrap_amd64.go:122] [ 4758( 769): 4758( 769)] Allocate a new trap: 0xc0009762a0 39 D0318 16:20:37.123049 355572 usertrap_amd64.go:225] [ 4758( 769): 4758( 769)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.127710 355572 usertrap_amd64.go:212] [ 4757(1214): 4757(1214)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:37.127984 355572 usertrap_amd64.go:122] [ 4757(1214): 4757(1214)] Allocate a new trap: 0xc005d561b0 40 D0318 16:20:37.128099 355572 usertrap_amd64.go:225] [ 4757(1214): 4757(1214)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.129571 355572 usertrap_amd64.go:212] [ 4757(1214): 4757(1214)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:37.129716 355572 usertrap_amd64.go:122] [ 4757(1214): 4757(1214)] Allocate a new trap: 0xc005d561b0 41 D0318 16:20:37.129920 355572 usertrap_amd64.go:225] [ 4757(1214): 4757(1214)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.130170 355572 usertrap_amd64.go:212] [ 4757(1214): 4760(1215)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:37.130292 355572 usertrap_amd64.go:122] [ 4757(1214): 4760(1215)] Allocate a new trap: 0xc005d561b0 42 D0318 16:20:37.130682 355572 usertrap_amd64.go:225] [ 4757(1214): 4760(1215)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.132160 355572 usertrap_amd64.go:212] [ 4758( 769): 4758( 769)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.132311 355572 usertrap_amd64.go:122] [ 4758( 769): 4758( 769)] Allocate a new trap: 0xc0009762a0 40 D0318 16:20:37.132569 355572 usertrap_amd64.go:225] [ 4758( 769): 4758( 769)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.132621 355572 usertrap_amd64.go:212] [ 4759(1193): 4759(1193)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.133008 355572 usertrap_amd64.go:122] [ 4759(1193): 4759(1193)] Allocate a new trap: 0xc005728ae0 37 D0318 16:20:37.133551 355572 task_signals.go:309] [ 4757(1214): 4760(1215)] failed to restore from a signal frame: bad address D0318 16:20:37.133712 355572 usertrap_amd64.go:225] [ 4759(1193): 4759(1193)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.133968 355572 task_signals.go:470] [ 4757(1214): 4760(1215)] Notified of signal 11 D0318 16:20:37.134095 355572 task_signals.go:220] [ 4757(1214): 4760(1215)] Signal 11: delivering to handler D0318 16:20:37.134182 355572 usertrap_amd64.go:212] [ 4758( 769): 4758( 769)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.134240 355572 usertrap_amd64.go:122] [ 4758( 769): 4758( 769)] Allocate a new trap: 0xc0009762a0 41 D0318 16:20:37.134386 355572 usertrap_amd64.go:225] [ 4758( 769): 4758( 769)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.134593 355572 usertrap_amd64.go:212] [ 4758( 769): 4761( 770)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.134687 355572 usertrap_amd64.go:122] [ 4758( 769): 4761( 770)] Allocate a new trap: 0xc0009762a0 42 D0318 16:20:37.134841 355572 usertrap_amd64.go:225] [ 4758( 769): 4761( 770)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.135641 355572 usertrap_amd64.go:212] [ 4757(1214): 4757(1214)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:37.135707 355572 usertrap_amd64.go:122] [ 4757(1214): 4757(1214)] Allocate a new trap: 0xc005d561b0 43 D0318 16:20:37.135773 355572 usertrap_amd64.go:225] [ 4757(1214): 4757(1214)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.137273 355572 usertrap_amd64.go:212] [ 4758( 769): 4758( 769)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.137379 355572 usertrap_amd64.go:122] [ 4758( 769): 4758( 769)] Allocate a new trap: 0xc0009762a0 43 D0318 16:20:37.137457 355572 usertrap_amd64.go:225] [ 4758( 769): 4758( 769)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.141354 355572 task_exit.go:204] [ 4757(1214): 4757(1214)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.141534 355572 task_signals.go:204] [ 4757(1214): 4760(1215)] Signal 9, PID: 4757, TID: 4760, fault addr: 0x0: terminating thread group D0318 16:20:37.141887 355572 task_exit.go:204] [ 4757(1214): 4760(1215)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.142492 355572 task_exit.go:204] [ 4757(1214): 4757(1214)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.143810 355572 task_exit.go:204] [ 4758( 769): 4758( 769)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.144049 355572 task_signals.go:204] [ 4758( 769): 4761( 770)] Signal 9, PID: 4758, TID: 4761, fault addr: 0x0: terminating thread group D0318 16:20:37.144723 355572 task_exit.go:204] [ 4758( 769): 4761( 770)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.145123 355572 usertrap_amd64.go:212] [ 4759(1193): 4759(1193)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.145081 355572 task_exit.go:204] [ 4758( 769): 4758( 769)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.145208 355572 usertrap_amd64.go:122] [ 4759(1193): 4759(1193)] Allocate a new trap: 0xc005728ae0 38 D0318 16:20:37.145368 355572 usertrap_amd64.go:225] [ 4759(1193): 4759(1193)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.150099 355572 task_exit.go:204] [ 4757(1214): 4760(1215)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.150216 355572 task_exit.go:204] [ 4757(1214): 4760(1215)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.150390 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:37.150542 355572 task_exit.go:204] [ 4757(1214): 4757(1214)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.151839 355572 task_exit.go:204] [ 4758( 769): 4761( 770)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.151968 355572 task_exit.go:204] [ 4758( 769): 4761( 770)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8915, &(0x7f00000001c0)) D0318 16:20:37.152087 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.152267 355572 task_exit.go:204] [ 4758( 769): 4758( 769)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.157732 355572 usertrap_amd64.go:212] [ 4699( 89): 4699( 89)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.157828 355572 usertrap_amd64.go:122] [ 4699( 89): 4699( 89)] Allocate a new trap: 0xc000976c00 43 D0318 16:20:37.157937 355572 usertrap_amd64.go:225] [ 4699( 89): 4699( 89)] Apply the binary patch addr 55e9c276bc93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 16:20:37.160553 355572 usertrap_amd64.go:212] [ 4759(1193): 4759(1193)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.160701 355572 usertrap_amd64.go:122] [ 4759(1193): 4759(1193)] Allocate a new trap: 0xc005728ae0 39 D0318 16:20:37.160902 355572 usertrap_amd64.go:225] [ 4759(1193): 4759(1193)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.164232 355572 task_exit.go:204] [ 4699( 89): 4699( 89)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.169360 355572 task_exit.go:204] [ 4699( 89): 4699( 89)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.169477 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.169706 355572 task_exit.go:204] [ 4699( 89): 4699( 89)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) sendmmsg$inet(r0, &(0x7f0000001b80)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000240)='!', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000600)="c4", 0x1}], 0x1}}], 0x2, 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000100)="6521769a2023ee2e98356f2cdabbec88e41df6e42b1d4ba5687525d1aeec499b2368980cc08015692ceddf30f4abd3c298a2d54c421d788f2449ba31d0fde8774cc01a169bf5a985212de77566ab648a0128167f882431fef234846db3a208", 0x5f}, {&(0x7f0000000180)="9246f9d24b6b3092f3c553ad4805212b366d28e55a4b35a12f5244f4234b277fdb452a05b9b1415107879bbc39b91d1139c50a093d7b86885063610fabc10712966c1b1bc3bef9aaf127df7f091b5b600e86f88b05409eb95b30a2549dba927cfc8663c0ceac4333372b4ca5f4833644101be1700de44fcd069ec6de557bbbe8e448afb406f20f8d59ff9a57f22b243b99e535fc322624bb", 0x98}, {&(0x7f0000000240)="9efd6638fd3ea09f7177cb09bbfdc6155741218f5ad57e5448659b872f399fe2f0ef8e38bbd418e5ba72a0e61fa4699a9841833f42e537bd3998ddf474f13e3b3686b256f388714580bd716e4ed24fcabdf2f117c348e340fd934d3655b9a5f8bb047cdee8836a4773da802a273805eb45c87370118c4ae380a1cc1acd83a6920976fbf940e25b04ae8dc8e1ed3768e1b269ac4fae814fad61e071ddf9dd1471233f6f9a640a056deec9481349f1bd95bd4c9a6c", 0xb4}, {&(0x7f0000000300)="0822947dfbecc98c34dc602ca916c3d3ba05d8e60ad980703fbc2f73cdc1a94f52fabdb4320f756b82f11cdfb4df48506f3c367dcc1ce77de56e8a348df94fa75a4f45dadca4cef3e61a43c170e59996e2a30b232ee0251f9318fd27e96a8ace5f8fbf6d4817f65d6c1256c7d26d0eaf9c567d8ba5bcaeff382f12", 0x7b}], 0x4) 16:20:37 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{}], 0x1, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:37.174773 355572 usertrap_amd64.go:212] [ 4759(1193): 4759(1193)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.174917 355572 usertrap_amd64.go:122] [ 4759(1193): 4759(1193)] Allocate a new trap: 0xc005728ae0 40 D0318 16:20:37.175085 355572 usertrap_amd64.go:225] [ 4759(1193): 4759(1193)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.176500 355572 usertrap_amd64.go:212] [ 4759(1193): 4759(1193)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.176587 355572 usertrap_amd64.go:122] [ 4759(1193): 4759(1193)] Allocate a new trap: 0xc005728ae0 41 D0318 16:20:37.176704 355572 usertrap_amd64.go:225] [ 4759(1193): 4759(1193)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.176911 355572 usertrap_amd64.go:212] [ 4759(1193): 4762(1194)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.176990 355572 usertrap_amd64.go:122] [ 4759(1193): 4762(1194)] Allocate a new trap: 0xc005728ae0 42 D0318 16:20:37.177103 355572 usertrap_amd64.go:225] [ 4759(1193): 4762(1194)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.180726 355572 usertrap_amd64.go:212] [ 4759(1193): 4759(1193)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.180813 355572 usertrap_amd64.go:122] [ 4759(1193): 4759(1193)] Allocate a new trap: 0xc005728ae0 43 D0318 16:20:37.180902 355572 usertrap_amd64.go:225] [ 4759(1193): 4759(1193)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.185915 355572 task_exit.go:204] [ 4759(1193): 4759(1193)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.186067 355572 task_signals.go:204] [ 4759(1193): 4762(1194)] Signal 9, PID: 4759, TID: 4762, fault addr: 0x0: terminating thread group D0318 16:20:37.186220 355572 task_exit.go:204] [ 4759(1193): 4762(1194)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.186942 355572 task_exit.go:204] [ 4759(1193): 4759(1193)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.190900 355572 usertrap_amd64.go:212] [ 4763(1216): 4763(1216)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:37.191033 355572 usertrap_amd64.go:122] [ 4763(1216): 4763(1216)] Allocate a new trap: 0xc000526570 37 D0318 16:20:37.192557 355572 usertrap_amd64.go:225] [ 4763(1216): 4763(1216)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.192987 355572 task_exit.go:204] [ 4759(1193): 4762(1194)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.193156 355572 task_exit.go:204] [ 4759(1193): 4762(1194)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.193348 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.193657 355572 task_exit.go:204] [ 4759(1193): 4759(1193)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.193939 355572 usertrap_amd64.go:212] [ 4764( 771): 4764( 771)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.194185 355572 usertrap_amd64.go:122] [ 4764( 771): 4764( 771)] Allocate a new trap: 0xc000dc61b0 37 D0318 16:20:37.194828 355572 usertrap_amd64.go:225] [ 4764( 771): 4764( 771)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) 16:20:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8982, 0x0) D0318 16:20:37.198859 355572 usertrap_amd64.go:212] [ 4763(1216): 4763(1216)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:37.198930 355572 usertrap_amd64.go:122] [ 4763(1216): 4763(1216)] Allocate a new trap: 0xc000526570 38 D0318 16:20:37.199037 355572 usertrap_amd64.go:225] [ 4763(1216): 4763(1216)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.204061 355572 usertrap_amd64.go:212] [ 4764( 771): 4764( 771)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.204133 355572 usertrap_amd64.go:122] [ 4764( 771): 4764( 771)] Allocate a new trap: 0xc000dc61b0 38 D0318 16:20:37.204200 355572 usertrap_amd64.go:225] [ 4764( 771): 4764( 771)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.210500 355572 usertrap_amd64.go:212] [ 4765( 91): 4765( 91)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.210603 355572 usertrap_amd64.go:122] [ 4765( 91): 4765( 91)] Allocate a new trap: 0xc005e16390 36 D0318 16:20:37.211247 355572 usertrap_amd64.go:225] [ 4765( 91): 4765( 91)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.213963 355572 usertrap_amd64.go:212] [ 4765( 91): 4765( 91)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.214030 355572 usertrap_amd64.go:122] [ 4765( 91): 4765( 91)] Allocate a new trap: 0xc005e16390 37 D0318 16:20:37.214298 355572 usertrap_amd64.go:225] [ 4765( 91): 4765( 91)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.223838 355572 usertrap_amd64.go:212] [ 4766(1195): 4766(1195)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.223968 355572 usertrap_amd64.go:122] [ 4766(1195): 4766(1195)] Allocate a new trap: 0xc005e163c0 37 D0318 16:20:37.224598 355572 usertrap_amd64.go:225] [ 4766(1195): 4766(1195)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.224754 355572 usertrap_amd64.go:212] [ 4764( 771): 4764( 771)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.224921 355572 usertrap_amd64.go:122] [ 4764( 771): 4764( 771)] Allocate a new trap: 0xc000dc61b0 39 D0318 16:20:37.225120 355572 usertrap_amd64.go:225] [ 4764( 771): 4764( 771)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.227266 355572 usertrap_amd64.go:212] [ 4765( 91): 4765( 91)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.227387 355572 usertrap_amd64.go:122] [ 4765( 91): 4765( 91)] Allocate a new trap: 0xc005e16390 38 D0318 16:20:37.227512 355572 usertrap_amd64.go:225] [ 4765( 91): 4765( 91)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.228586 355572 usertrap_amd64.go:212] [ 4766(1195): 4766(1195)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.228668 355572 usertrap_amd64.go:122] [ 4766(1195): 4766(1195)] Allocate a new trap: 0xc005e163c0 38 D0318 16:20:37.228775 355572 usertrap_amd64.go:225] [ 4766(1195): 4766(1195)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.229681 355572 usertrap_amd64.go:212] [ 4763(1216): 4763(1216)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:37.229778 355572 usertrap_amd64.go:122] [ 4763(1216): 4763(1216)] Allocate a new trap: 0xc000526570 39 D0318 16:20:37.229899 355572 usertrap_amd64.go:225] [ 4763(1216): 4763(1216)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.233966 355572 usertrap_amd64.go:212] [ 4764( 771): 4764( 771)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.234147 355572 usertrap_amd64.go:122] [ 4764( 771): 4764( 771)] Allocate a new trap: 0xc000dc61b0 40 D0318 16:20:37.234349 355572 usertrap_amd64.go:225] [ 4764( 771): 4764( 771)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.235985 355572 usertrap_amd64.go:212] [ 4764( 771): 4764( 771)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.236051 355572 usertrap_amd64.go:122] [ 4764( 771): 4764( 771)] Allocate a new trap: 0xc000dc61b0 41 D0318 16:20:37.236132 355572 usertrap_amd64.go:225] [ 4764( 771): 4764( 771)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.236821 355572 usertrap_amd64.go:212] [ 4764( 771): 4767( 772)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.236982 355572 usertrap_amd64.go:122] [ 4764( 771): 4767( 772)] Allocate a new trap: 0xc000dc61b0 42 D0318 16:20:37.237138 355572 usertrap_amd64.go:225] [ 4764( 771): 4767( 772)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.238980 355572 usertrap_amd64.go:212] [ 4765( 91): 4765( 91)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.239110 355572 usertrap_amd64.go:122] [ 4765( 91): 4765( 91)] Allocate a new trap: 0xc005e16390 39 D0318 16:20:37.239313 355572 usertrap_amd64.go:225] [ 4765( 91): 4765( 91)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.241252 355572 usertrap_amd64.go:212] [ 4765( 91): 4765( 91)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.241246 355572 usertrap_amd64.go:212] [ 4766(1195): 4766(1195)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.241341 355572 usertrap_amd64.go:122] [ 4766(1195): 4766(1195)] Allocate a new trap: 0xc005e163c0 39 D0318 16:20:37.241345 355572 usertrap_amd64.go:122] [ 4765( 91): 4765( 91)] Allocate a new trap: 0xc005e16390 40 D0318 16:20:37.241430 355572 usertrap_amd64.go:225] [ 4765( 91): 4765( 91)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.241440 355572 usertrap_amd64.go:225] [ 4766(1195): 4766(1195)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.241851 355572 usertrap_amd64.go:212] [ 4765( 91): 4768( 92)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.241988 355572 usertrap_amd64.go:122] [ 4765( 91): 4768( 92)] Allocate a new trap: 0xc005e16390 41 D0318 16:20:37.242126 355572 usertrap_amd64.go:225] [ 4765( 91): 4768( 92)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:37.242514 355572 usertrap_amd64.go:212] [ 4763(1216): 4763(1216)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:37.242574 355572 usertrap_amd64.go:122] [ 4763(1216): 4763(1216)] Allocate a new trap: 0xc000526570 40 D0318 16:20:37.242663 355572 usertrap_amd64.go:225] [ 4763(1216): 4763(1216)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.243352 355572 task_signals.go:309] [ 4764( 771): 4767( 772)] failed to restore from a signal frame: bad address D0318 16:20:37.243974 355572 task_signals.go:470] [ 4764( 771): 4767( 772)] Notified of signal 11 D0318 16:20:37.244104 355572 task_signals.go:220] [ 4764( 771): 4767( 772)] Signal 11: delivering to handler D0318 16:20:37.244702 355572 usertrap_amd64.go:212] [ 4763(1216): 4763(1216)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:37.244771 355572 usertrap_amd64.go:122] [ 4763(1216): 4763(1216)] Allocate a new trap: 0xc000526570 41 D0318 16:20:37.244835 355572 usertrap_amd64.go:225] [ 4763(1216): 4763(1216)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.245051 355572 usertrap_amd64.go:212] [ 4763(1216): 4769(1217)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:37.245121 355572 usertrap_amd64.go:122] [ 4763(1216): 4769(1217)] Allocate a new trap: 0xc000526570 42 D0318 16:20:37.245228 355572 usertrap_amd64.go:225] [ 4763(1216): 4769(1217)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.245698 355572 usertrap_amd64.go:212] [ 4764( 771): 4764( 771)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.245772 355572 usertrap_amd64.go:122] [ 4764( 771): 4764( 771)] Allocate a new trap: 0xc000dc61b0 43 D0318 16:20:37.245832 355572 usertrap_amd64.go:225] [ 4764( 771): 4764( 771)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.248754 355572 usertrap_amd64.go:212] [ 4763(1216): 4763(1216)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:37.248819 355572 usertrap_amd64.go:122] [ 4763(1216): 4763(1216)] Allocate a new trap: 0xc000526570 43 D0318 16:20:37.248894 355572 usertrap_amd64.go:225] [ 4763(1216): 4763(1216)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.249429 355572 usertrap_amd64.go:212] [ 4765( 91): 4765( 91)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.249502 355572 usertrap_amd64.go:122] [ 4765( 91): 4765( 91)] Allocate a new trap: 0xc005e16390 42 D0318 16:20:37.249582 355572 usertrap_amd64.go:225] [ 4765( 91): 4765( 91)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:37.250771 355572 usertrap_amd64.go:212] [ 4766(1195): 4766(1195)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.250827 355572 usertrap_amd64.go:122] [ 4766(1195): 4766(1195)] Allocate a new trap: 0xc005e163c0 40 D0318 16:20:37.251065 355572 usertrap_amd64.go:225] [ 4766(1195): 4766(1195)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.252762 355572 usertrap_amd64.go:212] [ 4766(1195): 4766(1195)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.252825 355572 usertrap_amd64.go:122] [ 4766(1195): 4766(1195)] Allocate a new trap: 0xc005e163c0 41 D0318 16:20:37.252892 355572 usertrap_amd64.go:225] [ 4766(1195): 4766(1195)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.253103 355572 task_exit.go:204] [ 4764( 771): 4764( 771)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.253439 355572 usertrap_amd64.go:212] [ 4766(1195): 4770(1196)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.253546 355572 usertrap_amd64.go:122] [ 4766(1195): 4770(1196)] Allocate a new trap: 0xc005e163c0 42 D0318 16:20:37.253647 355572 usertrap_amd64.go:225] [ 4766(1195): 4770(1196)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.253731 355572 task_signals.go:204] [ 4764( 771): 4767( 772)] Signal 9, PID: 4764, TID: 4767, fault addr: 0x0: terminating thread group D0318 16:20:37.253747 355572 task_signals.go:204] [ 4763(1216): 4769(1217)] Signal 9, PID: 4763, TID: 4769, fault addr: 0x0: terminating thread group D0318 16:20:37.253835 355572 task_exit.go:204] [ 4764( 771): 4764( 771)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.254011 355572 task_exit.go:204] [ 4763(1216): 4763(1216)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.254671 355572 task_exit.go:204] [ 4764( 771): 4767( 772)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.254971 355572 task_exit.go:204] [ 4763(1216): 4769(1217)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.255336 355572 task_exit.go:204] [ 4763(1216): 4763(1216)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.255840 355572 usertrap_amd64.go:212] [ 4766(1195): 4766(1195)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.255937 355572 usertrap_amd64.go:122] [ 4766(1195): 4766(1195)] Allocate a new trap: 0xc005e163c0 43 D0318 16:20:37.256041 355572 usertrap_amd64.go:225] [ 4766(1195): 4766(1195)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.261034 355572 task_exit.go:204] [ 4763(1216): 4769(1217)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.261116 355572 task_exit.go:204] [ 4763(1216): 4769(1217)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.261186 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:37.261701 355572 task_signals.go:204] [ 4766(1195): 4770(1196)] Signal 9, PID: 4766, TID: 4770, fault addr: 0x0: terminating thread group D0318 16:20:37.261819 355572 task_exit.go:204] [ 4764( 771): 4767( 772)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.261898 355572 task_exit.go:204] [ 4764( 771): 4767( 772)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.262017 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.262113 355572 task_exit.go:204] [ 4764( 771): 4764( 771)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.262227 355572 task_exit.go:204] [ 4763(1216): 4763(1216)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.262381 355572 task_exit.go:204] [ 4766(1195): 4766(1195)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.262622 355572 task_exit.go:204] [ 4766(1195): 4770(1196)] Transitioning from exit state TaskExitNone to TaskExitInitiated 16:20:37 executing program 2: request_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='!^-[\x00', 0x0) D0318 16:20:37.263393 355572 task_exit.go:204] [ 4766(1195): 4766(1195)] Transitioning from exit state TaskExitInitiated to TaskExitZombie 16:20:37 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{}], 0x1, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:37.267859 355572 task_exit.go:204] [ 4765( 91): 4765( 91)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.268032 355572 task_signals.go:204] [ 4765( 91): 4768( 92)] Signal 9, PID: 4765, TID: 4768, fault addr: 0x0: terminating thread group D0318 16:20:37.268149 355572 task_exit.go:204] [ 4765( 91): 4768( 92)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.268709 355572 task_exit.go:204] [ 4766(1195): 4770(1196)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.268791 355572 task_exit.go:204] [ 4766(1195): 4770(1196)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.268924 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.269039 355572 task_exit.go:204] [ 4766(1195): 4766(1195)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.269360 355572 task_exit.go:204] [ 4765( 91): 4765( 91)] Transitioning from exit state TaskExitInitiated to TaskExitZombie 16:20:37 executing program 1: getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) D0318 16:20:37.273564 355572 task_exit.go:204] [ 4765( 91): 4768( 92)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.273653 355572 task_exit.go:204] [ 4765( 91): 4768( 92)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.273739 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.274460 355572 task_exit.go:204] [ 4765( 91): 4765( 91)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x40049409, &(0x7f00000001c0)) D0318 16:20:37.293325 355572 usertrap_amd64.go:212] [ 4772( 773): 4772( 773)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.293461 355572 usertrap_amd64.go:122] [ 4772( 773): 4772( 773)] Allocate a new trap: 0xc005e16420 37 D0318 16:20:37.294138 355572 usertrap_amd64.go:225] [ 4772( 773): 4772( 773)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.295119 355572 usertrap_amd64.go:212] [ 4771(1218): 4771(1218)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:37.295211 355572 usertrap_amd64.go:122] [ 4771(1218): 4771(1218)] Allocate a new trap: 0xc0078f6540 37 D0318 16:20:37.295896 355572 usertrap_amd64.go:225] [ 4771(1218): 4771(1218)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.297785 355572 usertrap_amd64.go:212] [ 4772( 773): 4772( 773)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.297858 355572 usertrap_amd64.go:122] [ 4772( 773): 4772( 773)] Allocate a new trap: 0xc005e16420 38 D0318 16:20:37.297930 355572 usertrap_amd64.go:225] [ 4772( 773): 4772( 773)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.299553 355572 usertrap_amd64.go:212] [ 4774( 93): 4774( 93)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.299706 355572 usertrap_amd64.go:122] [ 4774( 93): 4774( 93)] Allocate a new trap: 0xc0078f6570 36 D0318 16:20:37.300487 355572 usertrap_amd64.go:225] [ 4774( 93): 4774( 93)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.302630 355572 usertrap_amd64.go:212] [ 4771(1218): 4771(1218)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:37.302718 355572 usertrap_amd64.go:122] [ 4771(1218): 4771(1218)] Allocate a new trap: 0xc0078f6540 38 D0318 16:20:37.302785 355572 usertrap_amd64.go:225] [ 4771(1218): 4771(1218)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.304042 355572 usertrap_amd64.go:212] [ 4774( 93): 4774( 93)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.304117 355572 usertrap_amd64.go:122] [ 4774( 93): 4774( 93)] Allocate a new trap: 0xc0078f6570 37 D0318 16:20:37.304216 355572 usertrap_amd64.go:225] [ 4774( 93): 4774( 93)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.306546 355572 usertrap_amd64.go:212] [ 4773(1197): 4773(1197)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.306739 355572 usertrap_amd64.go:122] [ 4773(1197): 4773(1197)] Allocate a new trap: 0xc005e16450 37 D0318 16:20:37.307474 355572 usertrap_amd64.go:225] [ 4773(1197): 4773(1197)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.311739 355572 usertrap_amd64.go:212] [ 4773(1197): 4773(1197)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.311838 355572 usertrap_amd64.go:122] [ 4773(1197): 4773(1197)] Allocate a new trap: 0xc005e16450 38 D0318 16:20:37.311929 355572 usertrap_amd64.go:225] [ 4773(1197): 4773(1197)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.313444 355572 usertrap_amd64.go:212] [ 4772( 773): 4772( 773)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.313507 355572 usertrap_amd64.go:122] [ 4772( 773): 4772( 773)] Allocate a new trap: 0xc005e16420 39 D0318 16:20:37.313599 355572 usertrap_amd64.go:225] [ 4772( 773): 4772( 773)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.314867 355572 usertrap_amd64.go:212] [ 4771(1218): 4771(1218)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:37.314946 355572 usertrap_amd64.go:122] [ 4771(1218): 4771(1218)] Allocate a new trap: 0xc0078f6540 39 D0318 16:20:37.315046 355572 usertrap_amd64.go:225] [ 4771(1218): 4771(1218)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.321634 355572 usertrap_amd64.go:212] [ 4774( 93): 4774( 93)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.321714 355572 usertrap_amd64.go:122] [ 4774( 93): 4774( 93)] Allocate a new trap: 0xc0078f6570 38 D0318 16:20:37.321803 355572 usertrap_amd64.go:225] [ 4774( 93): 4774( 93)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.322540 355572 usertrap_amd64.go:212] [ 4772( 773): 4772( 773)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.322623 355572 usertrap_amd64.go:122] [ 4772( 773): 4772( 773)] Allocate a new trap: 0xc005e16420 40 D0318 16:20:37.322707 355572 usertrap_amd64.go:225] [ 4772( 773): 4772( 773)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.324095 355572 usertrap_amd64.go:212] [ 4771(1218): 4771(1218)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:37.324215 355572 usertrap_amd64.go:122] [ 4771(1218): 4771(1218)] Allocate a new trap: 0xc0078f6540 40 D0318 16:20:37.324223 355572 usertrap_amd64.go:212] [ 4772( 773): 4772( 773)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.324299 355572 usertrap_amd64.go:122] [ 4772( 773): 4772( 773)] Allocate a new trap: 0xc005e16420 41 D0318 16:20:37.324291 355572 usertrap_amd64.go:225] [ 4771(1218): 4771(1218)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.324409 355572 usertrap_amd64.go:225] [ 4772( 773): 4772( 773)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.324608 355572 usertrap_amd64.go:212] [ 4772( 773): 4775( 774)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.324671 355572 usertrap_amd64.go:122] [ 4772( 773): 4775( 774)] Allocate a new trap: 0xc005e16420 42 D0318 16:20:37.324738 355572 usertrap_amd64.go:225] [ 4772( 773): 4775( 774)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.325815 355572 usertrap_amd64.go:212] [ 4772( 773): 4772( 773)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.325920 355572 usertrap_amd64.go:122] [ 4772( 773): 4772( 773)] Allocate a new trap: 0xc005e16420 43 D0318 16:20:37.325997 355572 usertrap_amd64.go:225] [ 4772( 773): 4772( 773)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.326085 355572 usertrap_amd64.go:212] [ 4771(1218): 4771(1218)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:37.326175 355572 usertrap_amd64.go:122] [ 4771(1218): 4771(1218)] Allocate a new trap: 0xc0078f6540 41 D0318 16:20:37.326265 355572 usertrap_amd64.go:225] [ 4771(1218): 4771(1218)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.326596 355572 usertrap_amd64.go:212] [ 4771(1218): 4776(1219)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:37.326667 355572 usertrap_amd64.go:122] [ 4771(1218): 4776(1219)] Allocate a new trap: 0xc0078f6540 42 D0318 16:20:37.326795 355572 usertrap_amd64.go:225] [ 4771(1218): 4776(1219)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.326872 355572 usertrap_amd64.go:212] [ 4773(1197): 4773(1197)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.327317 355572 usertrap_amd64.go:122] [ 4773(1197): 4773(1197)] Allocate a new trap: 0xc005e16450 39 D0318 16:20:37.327717 355572 usertrap_amd64.go:225] [ 4773(1197): 4773(1197)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.331495 355572 task_signals.go:309] [ 4771(1218): 4776(1219)] failed to restore from a signal frame: bad address D0318 16:20:37.331688 355572 task_signals.go:470] [ 4771(1218): 4776(1219)] Notified of signal 11 D0318 16:20:37.331799 355572 task_signals.go:220] [ 4771(1218): 4776(1219)] Signal 11: delivering to handler D0318 16:20:37.333193 355572 usertrap_amd64.go:212] [ 4771(1218): 4771(1218)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:37.333262 355572 usertrap_amd64.go:122] [ 4771(1218): 4771(1218)] Allocate a new trap: 0xc0078f6540 43 D0318 16:20:37.333346 355572 usertrap_amd64.go:225] [ 4771(1218): 4771(1218)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.334001 355572 task_exit.go:204] [ 4772( 773): 4772( 773)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.334210 355572 task_signals.go:204] [ 4772( 773): 4775( 774)] Signal 9, PID: 4772, TID: 4775, fault addr: 0x0: terminating thread group D0318 16:20:37.334863 355572 task_exit.go:204] [ 4772( 773): 4775( 774)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.335088 355572 task_exit.go:204] [ 4772( 773): 4772( 773)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.335726 355572 usertrap_amd64.go:212] [ 4774( 93): 4774( 93)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.335816 355572 usertrap_amd64.go:122] [ 4774( 93): 4774( 93)] Allocate a new trap: 0xc0078f6570 39 D0318 16:20:37.335883 355572 usertrap_amd64.go:225] [ 4774( 93): 4774( 93)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.337361 355572 usertrap_amd64.go:212] [ 4774( 93): 4774( 93)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.337424 355572 usertrap_amd64.go:122] [ 4774( 93): 4774( 93)] Allocate a new trap: 0xc0078f6570 40 D0318 16:20:37.337533 355572 usertrap_amd64.go:225] [ 4774( 93): 4774( 93)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.337882 355572 usertrap_amd64.go:212] [ 4773(1197): 4773(1197)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.337875 355572 usertrap_amd64.go:212] [ 4774( 93): 4777( 94)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.337953 355572 usertrap_amd64.go:122] [ 4773(1197): 4773(1197)] Allocate a new trap: 0xc005e16450 40 D0318 16:20:37.338015 355572 usertrap_amd64.go:122] [ 4774( 93): 4777( 94)] Allocate a new trap: 0xc0078f6570 41 D0318 16:20:37.338135 355572 usertrap_amd64.go:225] [ 4774( 93): 4777( 94)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:37.338111 355572 usertrap_amd64.go:225] [ 4773(1197): 4773(1197)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.339742 355572 task_signals.go:204] [ 4771(1218): 4776(1219)] Signal 9, PID: 4771, TID: 4776, fault addr: 0x0: terminating thread group D0318 16:20:37.339953 355572 usertrap_amd64.go:212] [ 4773(1197): 4773(1197)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.340033 355572 usertrap_amd64.go:122] [ 4773(1197): 4773(1197)] Allocate a new trap: 0xc005e16450 41 D0318 16:20:37.340096 355572 task_exit.go:204] [ 4771(1218): 4771(1218)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.340138 355572 usertrap_amd64.go:225] [ 4773(1197): 4773(1197)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.340203 355572 usertrap_amd64.go:212] [ 4774( 93): 4774( 93)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.340356 355572 task_exit.go:204] [ 4771(1218): 4776(1219)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.340417 355572 usertrap_amd64.go:212] [ 4773(1197): 4778(1198)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.340500 355572 usertrap_amd64.go:122] [ 4773(1197): 4778(1198)] Allocate a new trap: 0xc005e16450 42 D0318 16:20:37.340394 355572 usertrap_amd64.go:122] [ 4774( 93): 4774( 93)] Allocate a new trap: 0xc0078f6570 42 D0318 16:20:37.340632 355572 usertrap_amd64.go:225] [ 4773(1197): 4778(1198)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.340700 355572 usertrap_amd64.go:225] [ 4774( 93): 4774( 93)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:37.340996 355572 task_exit.go:204] [ 4772( 773): 4775( 774)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.341066 355572 task_exit.go:204] [ 4772( 773): 4775( 774)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.341193 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.341316 355572 task_exit.go:204] [ 4772( 773): 4772( 773)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.342023 355572 task_exit.go:204] [ 4771(1218): 4776(1219)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.342088 355572 task_exit.go:204] [ 4771(1218): 4776(1219)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.342335 355572 usertrap_amd64.go:212] [ 4773(1197): 4773(1197)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.342407 355572 usertrap_amd64.go:122] [ 4773(1197): 4773(1197)] Allocate a new trap: 0xc005e16450 43 D0318 16:20:37.342465 355572 usertrap_amd64.go:225] [ 4773(1197): 4773(1197)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) 16:20:37 executing program 2: sigaltstack(&(0x7f0000000040)={&(0x7f0000000000)=""/11, 0x2, 0xb}, 0x0) D0318 16:20:37.346980 355572 task_exit.go:204] [ 4771(1218): 4771(1218)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.347100 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:37.347174 355572 task_signals.go:204] [ 4773(1197): 4778(1198)] Signal 9, PID: 4773, TID: 4778, fault addr: 0x0: terminating thread group D0318 16:20:37.347217 355572 task_exit.go:204] [ 4771(1218): 4771(1218)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.347528 355572 task_exit.go:204] [ 4773(1197): 4773(1197)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.347742 355572 task_exit.go:204] [ 4773(1197): 4778(1198)] Transitioning from exit state TaskExitNone to TaskExitInitiated 16:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x5421, &(0x7f00000001c0)) D0318 16:20:37.348389 355572 task_signals.go:204] [ 4774( 93): 4777( 94)] Signal 9, PID: 4774, TID: 4777, fault addr: 0x0: terminating thread group D0318 16:20:37.348399 355572 task_exit.go:204] [ 4774( 93): 4774( 93)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.348626 355572 task_exit.go:204] [ 4774( 93): 4777( 94)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.349482 355572 task_exit.go:204] [ 4773(1197): 4773(1197)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.349717 355572 task_exit.go:204] [ 4774( 93): 4777( 94)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.349772 355572 task_exit.go:204] [ 4774( 93): 4777( 94)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.354820 355572 task_exit.go:204] [ 4774( 93): 4774( 93)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.355000 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.355110 355572 task_exit.go:204] [ 4773(1197): 4778(1198)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.355181 355572 task_exit.go:204] [ 4773(1197): 4778(1198)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.355303 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.355494 355572 task_exit.go:204] [ 4774( 93): 4774( 93)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.356960 355572 task_exit.go:204] [ 4773(1197): 4773(1197)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 0: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) 16:20:37 executing program 1: syz_emit_ethernet(0x32, &(0x7f00000000c0)={@remote, @broadcast, @val, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @local}, @info_reply}}}}, 0x0) D0318 16:20:37.371030 355572 usertrap_amd64.go:212] [ 4779( 775): 4779( 775)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.371268 355572 usertrap_amd64.go:122] [ 4779( 775): 4779( 775)] Allocate a new trap: 0xc005728c90 37 D0318 16:20:37.372124 355572 usertrap_amd64.go:225] [ 4779( 775): 4779( 775)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.375718 355572 usertrap_amd64.go:212] [ 4779( 775): 4779( 775)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.375792 355572 usertrap_amd64.go:122] [ 4779( 775): 4779( 775)] Allocate a new trap: 0xc005728c90 38 D0318 16:20:37.375860 355572 usertrap_amd64.go:225] [ 4779( 775): 4779( 775)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.376270 355572 usertrap_amd64.go:212] [ 4780(1220): 4780(1220)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:37.376380 355572 usertrap_amd64.go:122] [ 4780(1220): 4780(1220)] Allocate a new trap: 0xc005d56270 37 D0318 16:20:37.377080 355572 usertrap_amd64.go:225] [ 4780(1220): 4780(1220)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.384322 355572 usertrap_amd64.go:212] [ 4780(1220): 4780(1220)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:37.384415 355572 usertrap_amd64.go:122] [ 4780(1220): 4780(1220)] Allocate a new trap: 0xc005d56270 38 D0318 16:20:37.384513 355572 usertrap_amd64.go:225] [ 4780(1220): 4780(1220)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.391978 355572 usertrap_amd64.go:212] [ 4779( 775): 4779( 775)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.392063 355572 usertrap_amd64.go:122] [ 4779( 775): 4779( 775)] Allocate a new trap: 0xc005728c90 39 D0318 16:20:37.392165 355572 usertrap_amd64.go:225] [ 4779( 775): 4779( 775)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.393195 355572 usertrap_amd64.go:212] [ 4782( 95): 4782( 95)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.393298 355572 usertrap_amd64.go:122] [ 4782( 95): 4782( 95)] Allocate a new trap: 0xc005e164b0 36 D0318 16:20:37.393953 355572 usertrap_amd64.go:225] [ 4782( 95): 4782( 95)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.395877 355572 usertrap_amd64.go:212] [ 4781(1199): 4781(1199)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.396039 355572 usertrap_amd64.go:122] [ 4781(1199): 4781(1199)] Allocate a new trap: 0xc0078f66c0 37 D0318 16:20:37.396807 355572 usertrap_amd64.go:225] [ 4781(1199): 4781(1199)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.398042 355572 usertrap_amd64.go:212] [ 4780(1220): 4780(1220)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:37.398119 355572 usertrap_amd64.go:122] [ 4780(1220): 4780(1220)] Allocate a new trap: 0xc005d56270 39 D0318 16:20:37.398226 355572 usertrap_amd64.go:225] [ 4780(1220): 4780(1220)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.398800 355572 usertrap_amd64.go:212] [ 4782( 95): 4782( 95)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.398867 355572 usertrap_amd64.go:122] [ 4782( 95): 4782( 95)] Allocate a new trap: 0xc005e164b0 37 D0318 16:20:37.399000 355572 usertrap_amd64.go:225] [ 4782( 95): 4782( 95)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.399848 355572 usertrap_amd64.go:212] [ 4779( 775): 4779( 775)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.399919 355572 usertrap_amd64.go:122] [ 4779( 775): 4779( 775)] Allocate a new trap: 0xc005728c90 40 D0318 16:20:37.399987 355572 usertrap_amd64.go:225] [ 4779( 775): 4779( 775)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.400358 355572 usertrap_amd64.go:212] [ 4781(1199): 4781(1199)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.400438 355572 usertrap_amd64.go:122] [ 4781(1199): 4781(1199)] Allocate a new trap: 0xc0078f66c0 38 D0318 16:20:37.400505 355572 usertrap_amd64.go:225] [ 4781(1199): 4781(1199)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.401618 355572 usertrap_amd64.go:212] [ 4779( 775): 4779( 775)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.401689 355572 usertrap_amd64.go:122] [ 4779( 775): 4779( 775)] Allocate a new trap: 0xc005728c90 41 D0318 16:20:37.401770 355572 usertrap_amd64.go:225] [ 4779( 775): 4779( 775)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.402214 355572 usertrap_amd64.go:212] [ 4779( 775): 4783( 776)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.402277 355572 usertrap_amd64.go:122] [ 4779( 775): 4783( 776)] Allocate a new trap: 0xc005728c90 42 D0318 16:20:37.402343 355572 usertrap_amd64.go:225] [ 4779( 775): 4783( 776)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.404570 355572 usertrap_amd64.go:212] [ 4779( 775): 4779( 775)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.404643 355572 usertrap_amd64.go:122] [ 4779( 775): 4779( 775)] Allocate a new trap: 0xc005728c90 43 D0318 16:20:37.404746 355572 usertrap_amd64.go:225] [ 4779( 775): 4779( 775)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.412592 355572 task_exit.go:204] [ 4779( 775): 4779( 775)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.413406 355572 task_signals.go:204] [ 4779( 775): 4783( 776)] Signal 9, PID: 4779, TID: 4783, fault addr: 0x0: terminating thread group D0318 16:20:37.413508 355572 task_exit.go:204] [ 4779( 775): 4783( 776)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.413540 355572 usertrap_amd64.go:212] [ 4780(1220): 4780(1220)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:37.413626 355572 usertrap_amd64.go:122] [ 4780(1220): 4780(1220)] Allocate a new trap: 0xc005d56270 40 D0318 16:20:37.413705 355572 usertrap_amd64.go:225] [ 4780(1220): 4780(1220)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.413771 355572 task_exit.go:204] [ 4779( 775): 4779( 775)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.415092 355572 usertrap_amd64.go:212] [ 4782( 95): 4782( 95)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.415181 355572 usertrap_amd64.go:122] [ 4782( 95): 4782( 95)] Allocate a new trap: 0xc005e164b0 38 D0318 16:20:37.415303 355572 usertrap_amd64.go:225] [ 4782( 95): 4782( 95)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.415346 355572 usertrap_amd64.go:212] [ 4780(1220): 4780(1220)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:37.415403 355572 usertrap_amd64.go:122] [ 4780(1220): 4780(1220)] Allocate a new trap: 0xc005d56270 41 D0318 16:20:37.415682 355572 usertrap_amd64.go:225] [ 4780(1220): 4780(1220)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.416180 355572 usertrap_amd64.go:212] [ 4780(1220): 4784(1221)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:37.416279 355572 usertrap_amd64.go:122] [ 4780(1220): 4784(1221)] Allocate a new trap: 0xc005d56270 42 D0318 16:20:37.416378 355572 usertrap_amd64.go:225] [ 4780(1220): 4784(1221)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.416901 355572 usertrap_amd64.go:212] [ 4781(1199): 4781(1199)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.416977 355572 usertrap_amd64.go:122] [ 4781(1199): 4781(1199)] Allocate a new trap: 0xc0078f66c0 39 D0318 16:20:37.417088 355572 usertrap_amd64.go:225] [ 4781(1199): 4781(1199)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.419507 355572 task_exit.go:204] [ 4779( 775): 4783( 776)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.419689 355572 task_exit.go:204] [ 4779( 775): 4783( 776)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.419848 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.420079 355572 task_exit.go:204] [ 4779( 775): 4779( 775)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) D0318 16:20:37.424579 355572 usertrap_amd64.go:212] [ 4781(1199): 4781(1199)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.424720 355572 usertrap_amd64.go:122] [ 4781(1199): 4781(1199)] Allocate a new trap: 0xc0078f66c0 40 D0318 16:20:37.424839 355572 usertrap_amd64.go:225] [ 4781(1199): 4781(1199)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.426797 355572 usertrap_amd64.go:212] [ 4780(1220): 4780(1220)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:37.426865 355572 usertrap_amd64.go:122] [ 4780(1220): 4780(1220)] Allocate a new trap: 0xc005d56270 43 D0318 16:20:37.426961 355572 usertrap_amd64.go:225] [ 4780(1220): 4780(1220)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.427199 355572 usertrap_amd64.go:212] [ 4781(1199): 4781(1199)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.427290 355572 usertrap_amd64.go:122] [ 4781(1199): 4781(1199)] Allocate a new trap: 0xc0078f66c0 41 D0318 16:20:37.427401 355572 usertrap_amd64.go:225] [ 4781(1199): 4781(1199)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.427701 355572 usertrap_amd64.go:212] [ 4781(1199): 4785(1200)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.427808 355572 usertrap_amd64.go:122] [ 4781(1199): 4785(1200)] Allocate a new trap: 0xc0078f66c0 42 D0318 16:20:37.427937 355572 usertrap_amd64.go:225] [ 4781(1199): 4785(1200)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.429235 355572 usertrap_amd64.go:212] [ 4782( 95): 4782( 95)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.429328 355572 usertrap_amd64.go:122] [ 4782( 95): 4782( 95)] Allocate a new trap: 0xc005e164b0 39 D0318 16:20:37.429415 355572 usertrap_amd64.go:225] [ 4782( 95): 4782( 95)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.429415 355572 usertrap_amd64.go:212] [ 4781(1199): 4785(1200)] Found the pattern at ip 562e85cf5ae8:sysno 1 D0318 16:20:37.429553 355572 usertrap_amd64.go:122] [ 4781(1199): 4785(1200)] Allocate a new trap: 0xc0078f66c0 43 D0318 16:20:37.429799 355572 usertrap_amd64.go:225] [ 4781(1199): 4785(1200)] Apply the binary patch addr 562e85cf5ae8 trap addr 66d70 ([184 1 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.431090 355572 usertrap_amd64.go:212] [ 4782( 95): 4782( 95)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.431195 355572 usertrap_amd64.go:122] [ 4782( 95): 4782( 95)] Allocate a new trap: 0xc005e164b0 40 D0318 16:20:37.431291 355572 usertrap_amd64.go:225] [ 4782( 95): 4782( 95)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.431468 355572 usertrap_amd64.go:212] [ 4782( 95): 4786( 96)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.431545 355572 usertrap_amd64.go:122] [ 4782( 95): 4786( 96)] Allocate a new trap: 0xc005e164b0 41 D0318 16:20:37.431712 355572 usertrap_amd64.go:225] [ 4782( 95): 4786( 96)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:37.433541 355572 usertrap_amd64.go:212] [ 4781(1199): 4781(1199)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.433624 355572 usertrap_amd64.go:122] [ 4781(1199): 4781(1199)] Allocate a new trap: 0xc0078f66c0 44 D0318 16:20:37.433720 355572 usertrap_amd64.go:225] [ 4781(1199): 4781(1199)] Apply the binary patch addr 562e85cf5c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:37.434153 355572 task_signals.go:309] [ 4782( 95): 4786( 96)] failed to restore from a signal frame: bad address D0318 16:20:37.434332 355572 task_signals.go:470] [ 4782( 95): 4786( 96)] Notified of signal 11 D0318 16:20:37.434400 355572 task_signals.go:220] [ 4782( 95): 4786( 96)] Signal 11: delivering to handler D0318 16:20:37.435378 355572 task_exit.go:204] [ 4780(1220): 4780(1220)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.436204 355572 task_signals.go:204] [ 4780(1220): 4784(1221)] Signal 9, PID: 4780, TID: 4784, fault addr: 0x0: terminating thread group D0318 16:20:37.436485 355572 task_exit.go:204] [ 4780(1220): 4780(1220)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.436887 355572 task_signals.go:204] [ 4781(1199): 4785(1200)] Signal 9, PID: 4781, TID: 4785, fault addr: 0x0: terminating thread group D0318 16:20:37.436933 355572 usertrap_amd64.go:212] [ 4782( 95): 4782( 95)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.437221 355572 usertrap_amd64.go:122] [ 4782( 95): 4782( 95)] Allocate a new trap: 0xc005e164b0 42 D0318 16:20:37.437331 355572 usertrap_amd64.go:225] [ 4782( 95): 4782( 95)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:37.437062 355572 task_exit.go:204] [ 4781(1199): 4785(1200)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.437524 355572 task_exit.go:204] [ 4781(1199): 4781(1199)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.438230 355572 task_exit.go:204] [ 4780(1220): 4784(1221)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.438531 355572 task_exit.go:204] [ 4781(1199): 4781(1199)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.444323 355572 task_exit.go:204] [ 4780(1220): 4784(1221)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.444419 355572 task_exit.go:204] [ 4780(1220): 4784(1221)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.444512 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:37.444691 355572 task_exit.go:204] [ 4782( 95): 4782( 95)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.444683 355572 task_signals.go:204] [ 4782( 95): 4786( 96)] Signal 9, PID: 4782, TID: 4786, fault addr: 0x0: terminating thread group D0318 16:20:37.444857 355572 task_exit.go:204] [ 4782( 95): 4786( 96)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.445678 355572 task_exit.go:204] [ 4782( 95): 4786( 96)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.445759 355572 task_exit.go:204] [ 4782( 95): 4786( 96)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.446518 355572 task_exit.go:204] [ 4781(1199): 4785(1200)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.446618 355572 task_exit.go:204] [ 4781(1199): 4785(1200)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.446722 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.446822 355572 task_exit.go:204] [ 4781(1199): 4781(1199)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.446999 355572 task_exit.go:204] [ 4780(1220): 4780(1220)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x18, 0x0, &(0x7f0000000180)) 16:20:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)) D0318 16:20:37.450916 355572 task_exit.go:204] [ 4782( 95): 4782( 95)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.451041 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.451138 355572 task_exit.go:204] [ 4782( 95): 4782( 95)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 0: syz_emit_ethernet(0x68, &(0x7f0000000000)={@link_local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f53a04", 0x32, 0x3a, 0x0, @empty, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "508359", 0x0, 0x3c, 0x0, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], "25be"}}}}}}}, 0x0) D0318 16:20:37.453176 355572 usertrap_amd64.go:212] [ 4787( 777): 4787( 777)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.453329 355572 usertrap_amd64.go:122] [ 4787( 777): 4787( 777)] Allocate a new trap: 0xc0002d2420 37 D0318 16:20:37.454283 355572 usertrap_amd64.go:225] [ 4787( 777): 4787( 777)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.457738 355572 usertrap_amd64.go:212] [ 4787( 777): 4787( 777)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.457805 355572 usertrap_amd64.go:122] [ 4787( 777): 4787( 777)] Allocate a new trap: 0xc0002d2420 38 D0318 16:20:37.457878 355572 usertrap_amd64.go:225] [ 4787( 777): 4787( 777)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.475508 355572 usertrap_amd64.go:212] [ 4787( 777): 4787( 777)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.475739 355572 usertrap_amd64.go:122] [ 4787( 777): 4787( 777)] Allocate a new trap: 0xc0002d2420 39 D0318 16:20:37.476008 355572 usertrap_amd64.go:225] [ 4787( 777): 4787( 777)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.482154 355572 usertrap_amd64.go:212] [ 4790( 97): 4790( 97)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.482236 355572 usertrap_amd64.go:122] [ 4790( 97): 4790( 97)] Allocate a new trap: 0xc002100300 36 D0318 16:20:37.482805 355572 usertrap_amd64.go:225] [ 4790( 97): 4790( 97)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.483425 355572 usertrap_amd64.go:212] [ 4787( 777): 4787( 777)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.483516 355572 usertrap_amd64.go:122] [ 4787( 777): 4787( 777)] Allocate a new trap: 0xc0002d2420 40 D0318 16:20:37.483648 355572 usertrap_amd64.go:225] [ 4787( 777): 4787( 777)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.485668 355572 usertrap_amd64.go:212] [ 4787( 777): 4787( 777)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.485756 355572 usertrap_amd64.go:122] [ 4787( 777): 4787( 777)] Allocate a new trap: 0xc0002d2420 41 D0318 16:20:37.485820 355572 usertrap_amd64.go:212] [ 4790( 97): 4790( 97)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.485838 355572 usertrap_amd64.go:225] [ 4787( 777): 4787( 777)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.485898 355572 usertrap_amd64.go:122] [ 4790( 97): 4790( 97)] Allocate a new trap: 0xc002100300 37 D0318 16:20:37.485994 355572 usertrap_amd64.go:225] [ 4790( 97): 4790( 97)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.486050 355572 usertrap_amd64.go:212] [ 4787( 777): 4791( 778)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.486096 355572 usertrap_amd64.go:122] [ 4787( 777): 4791( 778)] Allocate a new trap: 0xc0002d2420 42 D0318 16:20:37.486210 355572 usertrap_amd64.go:225] [ 4787( 777): 4791( 778)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.488472 355572 usertrap_amd64.go:212] [ 4787( 777): 4787( 777)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.488579 355572 usertrap_amd64.go:122] [ 4787( 777): 4787( 777)] Allocate a new trap: 0xc0002d2420 43 D0318 16:20:37.488728 355572 usertrap_amd64.go:225] [ 4787( 777): 4787( 777)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.491216 355572 usertrap_amd64.go:212] [ 4788(1222): 4788(1222)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:37.491292 355572 usertrap_amd64.go:122] [ 4788(1222): 4788(1222)] Allocate a new trap: 0xc000976570 37 D0318 16:20:37.491932 355572 usertrap_amd64.go:225] [ 4788(1222): 4788(1222)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.494834 355572 usertrap_amd64.go:212] [ 4789(1201): 4789(1201)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.495086 355572 usertrap_amd64.go:122] [ 4789(1201): 4789(1201)] Allocate a new trap: 0xc000dc6c90 37 D0318 16:20:37.495416 355572 usertrap_amd64.go:212] [ 4788(1222): 4788(1222)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:37.495502 355572 usertrap_amd64.go:122] [ 4788(1222): 4788(1222)] Allocate a new trap: 0xc000976570 38 D0318 16:20:37.495590 355572 usertrap_amd64.go:225] [ 4788(1222): 4788(1222)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.496170 355572 task_exit.go:204] [ 4787( 777): 4787( 777)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.496558 355572 usertrap_amd64.go:225] [ 4789(1201): 4789(1201)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.496923 355572 task_signals.go:204] [ 4787( 777): 4791( 778)] Signal 9, PID: 4787, TID: 4791, fault addr: 0x0: terminating thread group D0318 16:20:37.497063 355572 task_exit.go:204] [ 4787( 777): 4787( 777)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.497306 355572 task_exit.go:204] [ 4787( 777): 4791( 778)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.500936 355572 usertrap_amd64.go:212] [ 4789(1201): 4789(1201)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.501086 355572 usertrap_amd64.go:122] [ 4789(1201): 4789(1201)] Allocate a new trap: 0xc000dc6c90 38 D0318 16:20:37.501191 355572 usertrap_amd64.go:225] [ 4789(1201): 4789(1201)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.502039 355572 usertrap_amd64.go:212] [ 4790( 97): 4790( 97)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.502121 355572 usertrap_amd64.go:122] [ 4790( 97): 4790( 97)] Allocate a new trap: 0xc002100300 38 D0318 16:20:37.502200 355572 usertrap_amd64.go:225] [ 4790( 97): 4790( 97)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.502479 355572 task_exit.go:204] [ 4787( 777): 4791( 778)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.502597 355572 task_exit.go:204] [ 4787( 777): 4791( 778)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.502710 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.503083 355572 task_exit.go:204] [ 4787( 777): 4787( 777)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 2: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:37.510383 355572 usertrap_amd64.go:212] [ 4790( 97): 4790( 97)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.510477 355572 usertrap_amd64.go:122] [ 4790( 97): 4790( 97)] Allocate a new trap: 0xc002100300 39 D0318 16:20:37.510547 355572 usertrap_amd64.go:225] [ 4790( 97): 4790( 97)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.512021 355572 usertrap_amd64.go:212] [ 4790( 97): 4790( 97)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.512100 355572 usertrap_amd64.go:122] [ 4790( 97): 4790( 97)] Allocate a new trap: 0xc002100300 40 D0318 16:20:37.512101 355572 usertrap_amd64.go:212] [ 4788(1222): 4788(1222)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:37.512149 355572 usertrap_amd64.go:225] [ 4790( 97): 4790( 97)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.512171 355572 usertrap_amd64.go:122] [ 4788(1222): 4788(1222)] Allocate a new trap: 0xc000976570 39 D0318 16:20:37.512269 355572 usertrap_amd64.go:225] [ 4788(1222): 4788(1222)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.512525 355572 usertrap_amd64.go:212] [ 4790( 97): 4792( 98)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.512599 355572 usertrap_amd64.go:122] [ 4790( 97): 4792( 98)] Allocate a new trap: 0xc002100300 41 D0318 16:20:37.512683 355572 usertrap_amd64.go:225] [ 4790( 97): 4792( 98)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:37.513639 355572 usertrap_amd64.go:212] [ 4789(1201): 4789(1201)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.513739 355572 usertrap_amd64.go:122] [ 4789(1201): 4789(1201)] Allocate a new trap: 0xc000dc6c90 39 D0318 16:20:37.513755 355572 usertrap_amd64.go:212] [ 4790( 97): 4792( 98)] Found the pattern at ip 55e9c276bae8:sysno 1 D0318 16:20:37.513824 355572 usertrap_amd64.go:225] [ 4789(1201): 4789(1201)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.513811 355572 usertrap_amd64.go:122] [ 4790( 97): 4792( 98)] Allocate a new trap: 0xc002100300 42 D0318 16:20:37.514032 355572 usertrap_amd64.go:225] [ 4790( 97): 4792( 98)] Apply the binary patch addr 55e9c276bae8 trap addr 60d20 ([184 1 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:37.518445 355572 usertrap_amd64.go:212] [ 4790( 97): 4790( 97)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.518551 355572 usertrap_amd64.go:122] [ 4790( 97): 4790( 97)] Allocate a new trap: 0xc002100300 43 D0318 16:20:37.518629 355572 usertrap_amd64.go:225] [ 4790( 97): 4790( 97)] Apply the binary patch addr 55e9c276bc93 trap addr 60d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 13 6 0]) D0318 16:20:37.520114 355572 usertrap_amd64.go:212] [ 4788(1222): 4788(1222)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:37.520179 355572 usertrap_amd64.go:122] [ 4788(1222): 4788(1222)] Allocate a new trap: 0xc000976570 40 D0318 16:20:37.520274 355572 usertrap_amd64.go:225] [ 4788(1222): 4788(1222)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.522692 355572 task_signals.go:204] [ 4790( 97): 4792( 98)] Signal 9, PID: 4790, TID: 4792, fault addr: 0x0: terminating thread group D0318 16:20:37.522942 355572 usertrap_amd64.go:212] [ 4789(1201): 4789(1201)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.522971 355572 task_exit.go:204] [ 4790( 97): 4790( 97)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.523021 355572 usertrap_amd64.go:122] [ 4789(1201): 4789(1201)] Allocate a new trap: 0xc000dc6c90 40 D0318 16:20:37.522948 355572 usertrap_amd64.go:212] [ 4788(1222): 4788(1222)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:37.523101 355572 usertrap_amd64.go:225] [ 4789(1201): 4789(1201)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.523175 355572 usertrap_amd64.go:122] [ 4788(1222): 4788(1222)] Allocate a new trap: 0xc000976570 41 D0318 16:20:37.523197 355572 task_exit.go:204] [ 4790( 97): 4792( 98)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.523270 355572 usertrap_amd64.go:225] [ 4788(1222): 4788(1222)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.523568 355572 usertrap_amd64.go:212] [ 4788(1222): 4793(1223)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:37.523700 355572 usertrap_amd64.go:122] [ 4788(1222): 4793(1223)] Allocate a new trap: 0xc000976570 42 D0318 16:20:37.523805 355572 usertrap_amd64.go:225] [ 4788(1222): 4793(1223)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.525368 355572 task_exit.go:204] [ 4790( 97): 4790( 97)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.525571 355572 usertrap_amd64.go:212] [ 4789(1201): 4789(1201)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.525670 355572 usertrap_amd64.go:122] [ 4789(1201): 4789(1201)] Allocate a new trap: 0xc000dc6c90 41 D0318 16:20:37.525770 355572 usertrap_amd64.go:225] [ 4789(1201): 4789(1201)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.526254 355572 usertrap_amd64.go:212] [ 4789(1201): 4795(1202)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.526331 355572 usertrap_amd64.go:122] [ 4789(1201): 4795(1202)] Allocate a new trap: 0xc000dc6c90 42 D0318 16:20:37.526434 355572 usertrap_amd64.go:225] [ 4789(1201): 4795(1202)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.527232 355572 usertrap_amd64.go:212] [ 4788(1222): 4788(1222)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:37.527312 355572 usertrap_amd64.go:122] [ 4788(1222): 4788(1222)] Allocate a new trap: 0xc000976570 43 D0318 16:20:37.527417 355572 usertrap_amd64.go:225] [ 4788(1222): 4788(1222)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.528987 355572 task_exit.go:204] [ 4790( 97): 4792( 98)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.529150 355572 task_exit.go:204] [ 4790( 97): 4792( 98)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.529258 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.529680 355572 task_exit.go:204] [ 4790( 97): 4790( 97)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.529757 355572 usertrap_amd64.go:212] [ 4789(1201): 4789(1201)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.529808 355572 usertrap_amd64.go:122] [ 4789(1201): 4789(1201)] Allocate a new trap: 0xc000dc6c90 43 D0318 16:20:37.529876 355572 usertrap_amd64.go:225] [ 4789(1201): 4789(1201)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) 16:20:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x89a1, &(0x7f00000001c0)) D0318 16:20:37.532412 355572 usertrap_amd64.go:212] [ 4794( 779): 4794( 779)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.532544 355572 usertrap_amd64.go:122] [ 4794( 779): 4794( 779)] Allocate a new trap: 0xc000dc6db0 37 D0318 16:20:37.533221 355572 usertrap_amd64.go:225] [ 4794( 779): 4794( 779)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.534631 355572 task_exit.go:204] [ 4788(1222): 4788(1222)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.534926 355572 task_signals.go:204] [ 4788(1222): 4793(1223)] Signal 9, PID: 4788, TID: 4793, fault addr: 0x0: terminating thread group D0318 16:20:37.535587 355572 task_exit.go:204] [ 4788(1222): 4793(1223)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.535912 355572 task_exit.go:204] [ 4788(1222): 4788(1222)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.535879 355572 task_signals.go:204] [ 4789(1201): 4795(1202)] Signal 9, PID: 4789, TID: 4795, fault addr: 0x0: terminating thread group D0318 16:20:37.536048 355572 task_exit.go:204] [ 4789(1201): 4795(1202)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.536166 355572 task_exit.go:204] [ 4789(1201): 4789(1201)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.536948 355572 task_exit.go:204] [ 4789(1201): 4795(1202)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.537041 355572 task_exit.go:204] [ 4789(1201): 4795(1202)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.537204 355572 usertrap_amd64.go:212] [ 4794( 779): 4794( 779)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.537272 355572 usertrap_amd64.go:122] [ 4794( 779): 4794( 779)] Allocate a new trap: 0xc000dc6db0 38 D0318 16:20:37.537343 355572 usertrap_amd64.go:225] [ 4794( 779): 4794( 779)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.541294 355572 task_exit.go:204] [ 4788(1222): 4793(1223)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.541366 355572 task_exit.go:204] [ 4788(1222): 4793(1223)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.541491 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:37.542180 355572 task_exit.go:204] [ 4789(1201): 4789(1201)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.542314 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.542448 355572 task_exit.go:204] [ 4788(1222): 4788(1222)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.542750 355572 task_exit.go:204] [ 4789(1201): 4789(1201)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 16:20:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x891c, &(0x7f00000001c0)) D0318 16:20:37.553359 355572 usertrap_amd64.go:212] [ 4794( 779): 4794( 779)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.553447 355572 usertrap_amd64.go:122] [ 4794( 779): 4794( 779)] Allocate a new trap: 0xc000dc6db0 39 D0318 16:20:37.553527 355572 usertrap_amd64.go:225] [ 4794( 779): 4794( 779)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.556038 355572 usertrap_amd64.go:212] [ 4796( 99): 4796( 99)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.556170 355572 usertrap_amd64.go:122] [ 4796( 99): 4796( 99)] Allocate a new trap: 0xc000dc6e10 36 D0318 16:20:37.556786 355572 usertrap_amd64.go:225] [ 4796( 99): 4796( 99)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.559582 355572 usertrap_amd64.go:212] [ 4796( 99): 4796( 99)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.559708 355572 usertrap_amd64.go:122] [ 4796( 99): 4796( 99)] Allocate a new trap: 0xc000dc6e10 37 D0318 16:20:37.559788 355572 usertrap_amd64.go:225] [ 4796( 99): 4796( 99)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.560841 355572 usertrap_amd64.go:212] [ 4794( 779): 4794( 779)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.560959 355572 usertrap_amd64.go:122] [ 4794( 779): 4794( 779)] Allocate a new trap: 0xc000dc6db0 40 D0318 16:20:37.561031 355572 usertrap_amd64.go:225] [ 4794( 779): 4794( 779)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.562834 355572 usertrap_amd64.go:212] [ 4794( 779): 4794( 779)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.562924 355572 usertrap_amd64.go:122] [ 4794( 779): 4794( 779)] Allocate a new trap: 0xc000dc6db0 41 D0318 16:20:37.563034 355572 usertrap_amd64.go:225] [ 4794( 779): 4794( 779)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.563287 355572 usertrap_amd64.go:212] [ 4794( 779): 4799( 780)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.563376 355572 usertrap_amd64.go:122] [ 4794( 779): 4799( 780)] Allocate a new trap: 0xc000dc6db0 42 D0318 16:20:37.563491 355572 usertrap_amd64.go:225] [ 4794( 779): 4799( 780)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.566007 355572 task_signals.go:309] [ 4794( 779): 4799( 780)] failed to restore from a signal frame: bad address D0318 16:20:37.566142 355572 task_signals.go:470] [ 4794( 779): 4799( 780)] Notified of signal 11 D0318 16:20:37.566246 355572 task_signals.go:220] [ 4794( 779): 4799( 780)] Signal 11: delivering to handler D0318 16:20:37.567570 355572 usertrap_amd64.go:212] [ 4794( 779): 4794( 779)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.567688 355572 usertrap_amd64.go:122] [ 4794( 779): 4794( 779)] Allocate a new trap: 0xc000dc6db0 43 D0318 16:20:37.567806 355572 usertrap_amd64.go:225] [ 4794( 779): 4794( 779)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.568811 355572 usertrap_amd64.go:212] [ 4797(1224): 4797(1224)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:37.568898 355572 usertrap_amd64.go:122] [ 4797(1224): 4797(1224)] Allocate a new trap: 0xc005d56300 37 D0318 16:20:37.569487 355572 usertrap_amd64.go:225] [ 4797(1224): 4797(1224)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.570623 355572 usertrap_amd64.go:212] [ 4796( 99): 4796( 99)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.570701 355572 usertrap_amd64.go:122] [ 4796( 99): 4796( 99)] Allocate a new trap: 0xc000dc6e10 38 D0318 16:20:37.570762 355572 usertrap_amd64.go:225] [ 4796( 99): 4796( 99)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.571954 355572 usertrap_amd64.go:212] [ 4798(1203): 4798(1203)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.572057 355572 usertrap_amd64.go:122] [ 4798(1203): 4798(1203)] Allocate a new trap: 0xc0078f6840 37 D0318 16:20:37.572782 355572 usertrap_amd64.go:225] [ 4798(1203): 4798(1203)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.572969 355572 task_exit.go:204] [ 4794( 779): 4794( 779)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.573166 355572 task_signals.go:204] [ 4794( 779): 4799( 780)] Signal 9, PID: 4794, TID: 4799, fault addr: 0x0: terminating thread group D0318 16:20:37.573417 355572 usertrap_amd64.go:212] [ 4797(1224): 4797(1224)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:37.573545 355572 usertrap_amd64.go:122] [ 4797(1224): 4797(1224)] Allocate a new trap: 0xc005d56300 38 D0318 16:20:37.573626 355572 usertrap_amd64.go:225] [ 4797(1224): 4797(1224)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.573691 355572 task_exit.go:204] [ 4794( 779): 4799( 780)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.574239 355572 task_exit.go:204] [ 4794( 779): 4794( 779)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.577866 355572 usertrap_amd64.go:212] [ 4796( 99): 4796( 99)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.577941 355572 usertrap_amd64.go:122] [ 4796( 99): 4796( 99)] Allocate a new trap: 0xc000dc6e10 39 D0318 16:20:37.578030 355572 usertrap_amd64.go:225] [ 4796( 99): 4796( 99)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.578317 355572 task_exit.go:204] [ 4794( 779): 4799( 780)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.578380 355572 task_exit.go:204] [ 4794( 779): 4799( 780)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.578512 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.579796 355572 task_exit.go:204] [ 4794( 779): 4794( 779)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.579917 355572 usertrap_amd64.go:212] [ 4796( 99): 4796( 99)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.580006 355572 usertrap_amd64.go:122] [ 4796( 99): 4796( 99)] Allocate a new trap: 0xc000dc6e10 40 D0318 16:20:37.580135 355572 usertrap_amd64.go:225] [ 4796( 99): 4796( 99)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.580336 355572 usertrap_amd64.go:212] [ 4796( 99): 4800( 100)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.580493 355572 usertrap_amd64.go:122] [ 4796( 99): 4800( 100)] Allocate a new trap: 0xc000dc6e10 41 D0318 16:20:37.580625 355572 usertrap_amd64.go:225] [ 4796( 99): 4800( 100)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) 16:20:37 executing program 2: pipe(&(0x7f0000000380)={0xffffffffffffffff}) inotify_rm_watch(r0, 0x0) D0318 16:20:37.582285 355572 usertrap_amd64.go:212] [ 4796( 99): 4796( 99)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.582357 355572 usertrap_amd64.go:122] [ 4796( 99): 4796( 99)] Allocate a new trap: 0xc000dc6e10 42 D0318 16:20:37.582436 355572 usertrap_amd64.go:212] [ 4798(1203): 4798(1203)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.582446 355572 usertrap_amd64.go:225] [ 4796( 99): 4796( 99)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:37.582491 355572 usertrap_amd64.go:122] [ 4798(1203): 4798(1203)] Allocate a new trap: 0xc0078f6840 38 D0318 16:20:37.582587 355572 usertrap_amd64.go:225] [ 4798(1203): 4798(1203)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.586721 355572 usertrap_amd64.go:212] [ 4797(1224): 4797(1224)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:37.586809 355572 usertrap_amd64.go:122] [ 4797(1224): 4797(1224)] Allocate a new trap: 0xc005d56300 39 D0318 16:20:37.586906 355572 usertrap_amd64.go:225] [ 4797(1224): 4797(1224)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.587835 355572 task_exit.go:204] [ 4796( 99): 4796( 99)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.588511 355572 task_exit.go:204] [ 4796( 99): 4796( 99)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.588529 355572 task_signals.go:204] [ 4796( 99): 4800( 100)] Signal 9, PID: 4796, TID: 4800, fault addr: 0x0: terminating thread group D0318 16:20:37.588767 355572 task_exit.go:204] [ 4796( 99): 4800( 100)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.595367 355572 usertrap_amd64.go:212] [ 4797(1224): 4797(1224)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:37.595464 355572 usertrap_amd64.go:122] [ 4797(1224): 4797(1224)] Allocate a new trap: 0xc005d56300 40 D0318 16:20:37.595549 355572 usertrap_amd64.go:212] [ 4798(1203): 4798(1203)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.595549 355572 usertrap_amd64.go:225] [ 4797(1224): 4797(1224)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.595594 355572 usertrap_amd64.go:122] [ 4798(1203): 4798(1203)] Allocate a new trap: 0xc0078f6840 39 D0318 16:20:37.595713 355572 usertrap_amd64.go:225] [ 4798(1203): 4798(1203)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.597095 355572 task_exit.go:204] [ 4796( 99): 4800( 100)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.597202 355572 task_exit.go:204] [ 4796( 99): 4800( 100)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.597305 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.597116 355572 usertrap_amd64.go:212] [ 4797(1224): 4797(1224)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:37.597379 355572 task_exit.go:204] [ 4796( 99): 4796( 99)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.597442 355572 usertrap_amd64.go:122] [ 4797(1224): 4797(1224)] Allocate a new trap: 0xc005d56300 41 D0318 16:20:37.597543 355572 usertrap_amd64.go:225] [ 4797(1224): 4797(1224)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.597743 355572 usertrap_amd64.go:212] [ 4797(1224): 4801(1225)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:37.597819 355572 usertrap_amd64.go:122] [ 4797(1224): 4801(1225)] Allocate a new trap: 0xc005d56300 42 D0318 16:20:37.597922 355572 usertrap_amd64.go:225] [ 4797(1224): 4801(1225)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) 16:20:37 executing program 0: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) D0318 16:20:37.601155 355572 usertrap_amd64.go:212] [ 4797(1224): 4797(1224)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:37.601234 355572 usertrap_amd64.go:122] [ 4797(1224): 4797(1224)] Allocate a new trap: 0xc005d56300 43 D0318 16:20:37.601372 355572 usertrap_amd64.go:225] [ 4797(1224): 4797(1224)] Apply the binary patch addr 55ec958b2c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.603329 355572 usertrap_amd64.go:212] [ 4798(1203): 4798(1203)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.603409 355572 usertrap_amd64.go:122] [ 4798(1203): 4798(1203)] Allocate a new trap: 0xc0078f6840 40 D0318 16:20:37.603488 355572 usertrap_amd64.go:225] [ 4798(1203): 4798(1203)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.604966 355572 usertrap_amd64.go:212] [ 4798(1203): 4798(1203)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.605065 355572 usertrap_amd64.go:122] [ 4798(1203): 4798(1203)] Allocate a new trap: 0xc0078f6840 41 D0318 16:20:37.605140 355572 usertrap_amd64.go:225] [ 4798(1203): 4798(1203)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.605357 355572 usertrap_amd64.go:212] [ 4798(1203): 4803(1204)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.605446 355572 usertrap_amd64.go:122] [ 4798(1203): 4803(1204)] Allocate a new trap: 0xc0078f6840 42 D0318 16:20:37.605531 355572 usertrap_amd64.go:225] [ 4798(1203): 4803(1204)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.607675 355572 usertrap_amd64.go:212] [ 4798(1203): 4798(1203)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.607767 355572 usertrap_amd64.go:122] [ 4798(1203): 4798(1203)] Allocate a new trap: 0xc0078f6840 43 D0318 16:20:37.607849 355572 usertrap_amd64.go:225] [ 4798(1203): 4798(1203)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.608022 355572 task_exit.go:204] [ 4797(1224): 4797(1224)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.608452 355572 usertrap_amd64.go:212] [ 4802( 781): 4802( 781)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.608561 355572 usertrap_amd64.go:122] [ 4802( 781): 4802( 781)] Allocate a new trap: 0xc000526750 37 D0318 16:20:37.608716 355572 task_signals.go:204] [ 4797(1224): 4801(1225)] Signal 9, PID: 4797, TID: 4801, fault addr: 0x0: terminating thread group D0318 16:20:37.608742 355572 task_exit.go:204] [ 4797(1224): 4797(1224)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.608984 355572 task_exit.go:204] [ 4797(1224): 4801(1225)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.609230 355572 usertrap_amd64.go:225] [ 4802( 781): 4802( 781)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.612845 355572 task_exit.go:204] [ 4798(1203): 4798(1203)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.613034 355572 usertrap_amd64.go:212] [ 4802( 781): 4802( 781)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.613149 355572 usertrap_amd64.go:122] [ 4802( 781): 4802( 781)] Allocate a new trap: 0xc000526750 38 D0318 16:20:37.613262 355572 usertrap_amd64.go:225] [ 4802( 781): 4802( 781)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.613814 355572 task_signals.go:204] [ 4798(1203): 4803(1204)] Signal 9, PID: 4798, TID: 4803, fault addr: 0x0: terminating thread group D0318 16:20:37.614356 355572 task_exit.go:204] [ 4798(1203): 4798(1203)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.614603 355572 task_exit.go:204] [ 4798(1203): 4803(1204)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.614764 355572 task_exit.go:204] [ 4797(1224): 4801(1225)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.614826 355572 task_exit.go:204] [ 4797(1224): 4801(1225)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.614922 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:37.616254 355572 task_exit.go:204] [ 4797(1224): 4797(1224)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000000)={@link_local, @random="50a245d5cde0", @void, {@ipv4={0x800, @icmp={{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast, {[@timestamp={0x44, 0x8, 0x7f, 0x0, 0x0, [0x0]}]}}, @address_reply}}}}, 0x0) D0318 16:20:37.620909 355572 task_exit.go:204] [ 4798(1203): 4803(1204)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.621028 355572 task_exit.go:204] [ 4798(1203): 4803(1204)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.621133 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.621332 355572 task_exit.go:204] [ 4798(1203): 4798(1203)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x891a, &(0x7f00000001c0)) D0318 16:20:37.625673 355572 usertrap_amd64.go:212] [ 4804( 101): 4804( 101)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.625785 355572 usertrap_amd64.go:122] [ 4804( 101): 4804( 101)] Allocate a new trap: 0xc0002d2450 36 D0318 16:20:37.626453 355572 usertrap_amd64.go:225] [ 4804( 101): 4804( 101)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.627646 355572 usertrap_amd64.go:212] [ 4802( 781): 4802( 781)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.627740 355572 usertrap_amd64.go:122] [ 4802( 781): 4802( 781)] Allocate a new trap: 0xc000526750 39 D0318 16:20:37.627808 355572 usertrap_amd64.go:225] [ 4802( 781): 4802( 781)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.629945 355572 usertrap_amd64.go:212] [ 4804( 101): 4804( 101)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.630078 355572 usertrap_amd64.go:122] [ 4804( 101): 4804( 101)] Allocate a new trap: 0xc0002d2450 37 D0318 16:20:37.630174 355572 usertrap_amd64.go:225] [ 4804( 101): 4804( 101)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.637107 355572 usertrap_amd64.go:212] [ 4802( 781): 4802( 781)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.637188 355572 usertrap_amd64.go:122] [ 4802( 781): 4802( 781)] Allocate a new trap: 0xc000526750 40 D0318 16:20:37.637268 355572 usertrap_amd64.go:225] [ 4802( 781): 4802( 781)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.638884 355572 usertrap_amd64.go:212] [ 4802( 781): 4802( 781)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.638961 355572 usertrap_amd64.go:122] [ 4802( 781): 4802( 781)] Allocate a new trap: 0xc000526750 41 D0318 16:20:37.639059 355572 usertrap_amd64.go:225] [ 4802( 781): 4802( 781)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.641144 355572 usertrap_amd64.go:212] [ 4802( 781): 4806( 782)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.641207 355572 usertrap_amd64.go:122] [ 4802( 781): 4806( 782)] Allocate a new trap: 0xc000526750 42 D0318 16:20:37.641281 355572 usertrap_amd64.go:225] [ 4802( 781): 4806( 782)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.643069 355572 usertrap_amd64.go:212] [ 4804( 101): 4804( 101)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.643144 355572 usertrap_amd64.go:122] [ 4804( 101): 4804( 101)] Allocate a new trap: 0xc0002d2450 38 D0318 16:20:37.643210 355572 usertrap_amd64.go:225] [ 4804( 101): 4804( 101)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.643963 355572 usertrap_amd64.go:212] [ 4802( 781): 4802( 781)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.644028 355572 usertrap_amd64.go:122] [ 4802( 781): 4802( 781)] Allocate a new trap: 0xc000526750 43 D0318 16:20:37.644158 355572 usertrap_amd64.go:225] [ 4802( 781): 4802( 781)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.645665 355572 usertrap_amd64.go:212] [ 4805(1226): 4805(1226)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:37.645738 355572 usertrap_amd64.go:122] [ 4805(1226): 4805(1226)] Allocate a new trap: 0xc0078f69c0 37 D0318 16:20:37.646442 355572 usertrap_amd64.go:225] [ 4805(1226): 4805(1226)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.649370 355572 task_exit.go:204] [ 4802( 781): 4802( 781)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.649565 355572 task_signals.go:204] [ 4802( 781): 4806( 782)] Signal 9, PID: 4802, TID: 4806, fault addr: 0x0: terminating thread group D0318 16:20:37.649802 355572 usertrap_amd64.go:212] [ 4807(1205): 4807(1205)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.649906 355572 usertrap_amd64.go:122] [ 4807(1205): 4807(1205)] Allocate a new trap: 0xc000e1c780 37 D0318 16:20:37.649767 355572 usertrap_amd64.go:212] [ 4805(1226): 4805(1226)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:37.649995 355572 usertrap_amd64.go:122] [ 4805(1226): 4805(1226)] Allocate a new trap: 0xc0078f69c0 38 D0318 16:20:37.650107 355572 task_exit.go:204] [ 4802( 781): 4802( 781)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.650116 355572 usertrap_amd64.go:225] [ 4805(1226): 4805(1226)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.650489 355572 task_exit.go:204] [ 4802( 781): 4806( 782)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.650569 355572 usertrap_amd64.go:225] [ 4807(1205): 4807(1205)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.654181 355572 usertrap_amd64.go:212] [ 4804( 101): 4804( 101)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.654255 355572 usertrap_amd64.go:122] [ 4804( 101): 4804( 101)] Allocate a new trap: 0xc0002d2450 39 D0318 16:20:37.654341 355572 usertrap_amd64.go:225] [ 4804( 101): 4804( 101)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.654404 355572 usertrap_amd64.go:212] [ 4807(1205): 4807(1205)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.654514 355572 usertrap_amd64.go:122] [ 4807(1205): 4807(1205)] Allocate a new trap: 0xc000e1c780 38 D0318 16:20:37.654623 355572 usertrap_amd64.go:225] [ 4807(1205): 4807(1205)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.655850 355572 usertrap_amd64.go:212] [ 4804( 101): 4804( 101)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.655937 355572 usertrap_amd64.go:122] [ 4804( 101): 4804( 101)] Allocate a new trap: 0xc0002d2450 40 D0318 16:20:37.656058 355572 usertrap_amd64.go:225] [ 4804( 101): 4804( 101)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.656348 355572 usertrap_amd64.go:212] [ 4804( 101): 4808( 102)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.656460 355572 usertrap_amd64.go:122] [ 4804( 101): 4808( 102)] Allocate a new trap: 0xc0002d2450 41 D0318 16:20:37.656600 355572 usertrap_amd64.go:225] [ 4804( 101): 4808( 102)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:37.656694 355572 task_exit.go:204] [ 4802( 781): 4806( 782)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.656800 355572 task_exit.go:204] [ 4802( 781): 4806( 782)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.656923 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.657416 355572 task_exit.go:204] [ 4802( 781): 4802( 781)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x1, 0x0, 0x0) D0318 16:20:37.659183 355572 task_signals.go:309] [ 4804( 101): 4808( 102)] failed to restore from a signal frame: bad address D0318 16:20:37.659327 355572 task_signals.go:470] [ 4804( 101): 4808( 102)] Notified of signal 11 D0318 16:20:37.659458 355572 task_signals.go:220] [ 4804( 101): 4808( 102)] Signal 11: delivering to handler D0318 16:20:37.660802 355572 usertrap_amd64.go:212] [ 4804( 101): 4804( 101)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.660891 355572 usertrap_amd64.go:122] [ 4804( 101): 4804( 101)] Allocate a new trap: 0xc0002d2450 42 D0318 16:20:37.660956 355572 usertrap_amd64.go:225] [ 4804( 101): 4804( 101)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:37.663916 355572 usertrap_amd64.go:212] [ 4805(1226): 4805(1226)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:37.664003 355572 usertrap_amd64.go:122] [ 4805(1226): 4805(1226)] Allocate a new trap: 0xc0078f69c0 39 D0318 16:20:37.664090 355572 usertrap_amd64.go:225] [ 4805(1226): 4805(1226)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.665833 355572 task_exit.go:204] [ 4804( 101): 4804( 101)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.666028 355572 task_signals.go:204] [ 4804( 101): 4808( 102)] Signal 9, PID: 4804, TID: 4808, fault addr: 0x0: terminating thread group D0318 16:20:37.666182 355572 usertrap_amd64.go:212] [ 4807(1205): 4807(1205)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.666251 355572 usertrap_amd64.go:122] [ 4807(1205): 4807(1205)] Allocate a new trap: 0xc000e1c780 39 D0318 16:20:37.666365 355572 usertrap_amd64.go:225] [ 4807(1205): 4807(1205)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.666533 355572 task_exit.go:204] [ 4804( 101): 4804( 101)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.666672 355572 task_exit.go:204] [ 4804( 101): 4808( 102)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.672149 355572 usertrap_amd64.go:212] [ 4805(1226): 4805(1226)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:37.672241 355572 usertrap_amd64.go:122] [ 4805(1226): 4805(1226)] Allocate a new trap: 0xc0078f69c0 40 D0318 16:20:37.672263 355572 task_exit.go:204] [ 4804( 101): 4808( 102)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.672319 355572 task_exit.go:204] [ 4804( 101): 4808( 102)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.672340 355572 usertrap_amd64.go:225] [ 4805(1226): 4805(1226)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.672409 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.672559 355572 task_exit.go:204] [ 4804( 101): 4804( 101)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.673018 355572 usertrap_amd64.go:212] [ 4807(1205): 4807(1205)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.673113 355572 usertrap_amd64.go:122] [ 4807(1205): 4807(1205)] Allocate a new trap: 0xc000e1c780 40 D0318 16:20:37.673193 355572 usertrap_amd64.go:225] [ 4807(1205): 4807(1205)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) 16:20:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8941, &(0x7f00000001c0)) D0318 16:20:37.674087 355572 usertrap_amd64.go:212] [ 4805(1226): 4805(1226)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:37.674165 355572 usertrap_amd64.go:122] [ 4805(1226): 4805(1226)] Allocate a new trap: 0xc0078f69c0 41 D0318 16:20:37.674245 355572 usertrap_amd64.go:225] [ 4805(1226): 4805(1226)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.674530 355572 usertrap_amd64.go:212] [ 4805(1226): 4809(1227)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:37.674605 355572 usertrap_amd64.go:122] [ 4805(1226): 4809(1227)] Allocate a new trap: 0xc0078f69c0 42 D0318 16:20:37.674719 355572 usertrap_amd64.go:225] [ 4805(1226): 4809(1227)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.675199 355572 usertrap_amd64.go:212] [ 4807(1205): 4807(1205)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.675273 355572 usertrap_amd64.go:122] [ 4807(1205): 4807(1205)] Allocate a new trap: 0xc000e1c780 41 D0318 16:20:37.675346 355572 usertrap_amd64.go:225] [ 4807(1205): 4807(1205)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.675765 355572 usertrap_amd64.go:212] [ 4807(1205): 4810(1206)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.675846 355572 usertrap_amd64.go:122] [ 4807(1205): 4810(1206)] Allocate a new trap: 0xc000e1c780 42 D0318 16:20:37.675934 355572 usertrap_amd64.go:225] [ 4807(1205): 4810(1206)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.676609 355572 usertrap_amd64.go:212] [ 4805(1226): 4809(1227)] Found the pattern at ip 55ec958b2ae8:sysno 1 D0318 16:20:37.676705 355572 usertrap_amd64.go:122] [ 4805(1226): 4809(1227)] Allocate a new trap: 0xc0078f69c0 43 D0318 16:20:37.676813 355572 usertrap_amd64.go:225] [ 4805(1226): 4809(1227)] Apply the binary patch addr 55ec958b2ae8 trap addr 66d70 ([184 1 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.678346 355572 usertrap_amd64.go:212] [ 4807(1205): 4807(1205)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.678400 355572 usertrap_amd64.go:122] [ 4807(1205): 4807(1205)] Allocate a new trap: 0xc000e1c780 43 D0318 16:20:37.678456 355572 usertrap_amd64.go:225] [ 4807(1205): 4807(1205)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.680661 355572 usertrap_amd64.go:212] [ 4805(1226): 4805(1226)] Found the pattern at ip 55ec958b2c93:sysno 3 D0318 16:20:37.680745 355572 usertrap_amd64.go:122] [ 4805(1226): 4805(1226)] Allocate a new trap: 0xc0078f69c0 44 D0318 16:20:37.680843 355572 usertrap_amd64.go:225] [ 4805(1226): 4805(1226)] Apply the binary patch addr 55ec958b2c93 trap addr 66dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 109 6 0]) D0318 16:20:37.685770 355572 task_exit.go:204] [ 4807(1205): 4807(1205)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.686018 355572 task_exit.go:204] [ 4805(1226): 4805(1226)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.686172 355572 task_signals.go:204] [ 4807(1205): 4810(1206)] Signal 9, PID: 4807, TID: 4810, fault addr: 0x0: terminating thread group D0318 16:20:37.686786 355572 usertrap_amd64.go:212] [ 4811( 783): 4811( 783)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.686886 355572 usertrap_amd64.go:122] [ 4811( 783): 4811( 783)] Allocate a new trap: 0xc000e1c7e0 37 D0318 16:20:37.686968 355572 task_exit.go:204] [ 4807(1205): 4810(1206)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.687226 355572 task_signals.go:204] [ 4805(1226): 4809(1227)] Signal 9, PID: 4805, TID: 4809, fault addr: 0x0: terminating thread group D0318 16:20:37.687433 355572 usertrap_amd64.go:225] [ 4811( 783): 4811( 783)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.688056 355572 task_exit.go:204] [ 4805(1226): 4805(1226)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.688347 355572 task_exit.go:204] [ 4807(1205): 4807(1205)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.688502 355572 task_exit.go:204] [ 4805(1226): 4809(1227)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.692112 355572 usertrap_amd64.go:212] [ 4811( 783): 4811( 783)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.692224 355572 usertrap_amd64.go:122] [ 4811( 783): 4811( 783)] Allocate a new trap: 0xc000e1c7e0 38 D0318 16:20:37.692303 355572 usertrap_amd64.go:225] [ 4811( 783): 4811( 783)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.695210 355572 task_exit.go:204] [ 4807(1205): 4810(1206)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.695304 355572 task_exit.go:204] [ 4807(1205): 4810(1206)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.695456 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.695581 355572 task_exit.go:204] [ 4805(1226): 4809(1227)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.695725 355572 task_exit.go:204] [ 4805(1226): 4809(1227)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.695838 355572 task_signals.go:443] [ 61( 1): 61( 1)] Discarding ignored signal 17 D0318 16:20:37.696139 355572 task_exit.go:204] [ 4805(1226): 4805(1226)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.696618 355572 task_exit.go:204] [ 4807(1205): 4807(1205)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7fff}, {}], 0x2, 0x0) rt_sigreturn() semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000240)=[0x8]) 16:20:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x4020940d, 0x0) D0318 16:20:37.700965 355572 usertrap_amd64.go:212] [ 4812( 103): 4812( 103)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.701070 355572 usertrap_amd64.go:122] [ 4812( 103): 4812( 103)] Allocate a new trap: 0xc000b76540 36 D0318 16:20:37.701793 355572 usertrap_amd64.go:225] [ 4812( 103): 4812( 103)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.705569 355572 usertrap_amd64.go:212] [ 4812( 103): 4812( 103)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.705675 355572 usertrap_amd64.go:122] [ 4812( 103): 4812( 103)] Allocate a new trap: 0xc000b76540 37 D0318 16:20:37.705752 355572 usertrap_amd64.go:225] [ 4812( 103): 4812( 103)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.708262 355572 usertrap_amd64.go:212] [ 4811( 783): 4811( 783)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.708325 355572 usertrap_amd64.go:122] [ 4811( 783): 4811( 783)] Allocate a new trap: 0xc000e1c7e0 39 D0318 16:20:37.708422 355572 usertrap_amd64.go:225] [ 4811( 783): 4811( 783)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.714993 355572 usertrap_amd64.go:212] [ 4811( 783): 4811( 783)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.715063 355572 usertrap_amd64.go:122] [ 4811( 783): 4811( 783)] Allocate a new trap: 0xc000e1c7e0 40 D0318 16:20:37.715164 355572 usertrap_amd64.go:225] [ 4811( 783): 4811( 783)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.717017 355572 usertrap_amd64.go:212] [ 4811( 783): 4811( 783)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.717096 355572 usertrap_amd64.go:122] [ 4811( 783): 4811( 783)] Allocate a new trap: 0xc000e1c7e0 41 D0318 16:20:37.717179 355572 usertrap_amd64.go:225] [ 4811( 783): 4811( 783)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.717121 355572 usertrap_amd64.go:212] [ 4812( 103): 4812( 103)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.717382 355572 usertrap_amd64.go:122] [ 4812( 103): 4812( 103)] Allocate a new trap: 0xc000b76540 38 D0318 16:20:37.717602 355572 usertrap_amd64.go:225] [ 4812( 103): 4812( 103)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.717605 355572 usertrap_amd64.go:212] [ 4811( 783): 4814( 784)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.717727 355572 usertrap_amd64.go:122] [ 4811( 783): 4814( 784)] Allocate a new trap: 0xc000e1c7e0 42 D0318 16:20:37.717835 355572 usertrap_amd64.go:225] [ 4811( 783): 4814( 784)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.720680 355572 usertrap_amd64.go:212] [ 4811( 783): 4811( 783)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.720836 355572 usertrap_amd64.go:122] [ 4811( 783): 4811( 783)] Allocate a new trap: 0xc000e1c7e0 43 D0318 16:20:37.720985 355572 usertrap_amd64.go:225] [ 4811( 783): 4811( 783)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.726498 355572 usertrap_amd64.go:212] [ 4813(1207): 4813(1207)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.726535 355572 usertrap_amd64.go:212] [ 4812( 103): 4812( 103)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.726597 355572 usertrap_amd64.go:122] [ 4812( 103): 4812( 103)] Allocate a new trap: 0xc000b76540 39 D0318 16:20:37.726599 355572 usertrap_amd64.go:212] [ 4815(1228): 4815(1228)] Found the pattern at ip 55ec958df860:sysno 109 D0318 16:20:37.726668 355572 usertrap_amd64.go:225] [ 4812( 103): 4812( 103)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.726618 355572 usertrap_amd64.go:122] [ 4813(1207): 4813(1207)] Allocate a new trap: 0xc000dc6f30 37 D0318 16:20:37.726705 355572 usertrap_amd64.go:122] [ 4815(1228): 4815(1228)] Allocate a new trap: 0xc005e166c0 37 D0318 16:20:37.727357 355572 usertrap_amd64.go:225] [ 4813(1207): 4813(1207)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.727399 355572 usertrap_amd64.go:225] [ 4815(1228): 4815(1228)] Apply the binary patch addr 55ec958df860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.728198 355572 task_signals.go:204] [ 4811( 783): 4814( 784)] Signal 9, PID: 4811, TID: 4814, fault addr: 0x0: terminating thread group D0318 16:20:37.728289 355572 task_exit.go:204] [ 4811( 783): 4811( 783)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.728330 355572 usertrap_amd64.go:212] [ 4812( 103): 4812( 103)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.728394 355572 usertrap_amd64.go:122] [ 4812( 103): 4812( 103)] Allocate a new trap: 0xc000b76540 40 D0318 16:20:37.728415 355572 task_exit.go:204] [ 4811( 783): 4814( 784)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.728490 355572 usertrap_amd64.go:225] [ 4812( 103): 4812( 103)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.728886 355572 usertrap_amd64.go:212] [ 4812( 103): 4816( 104)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.728958 355572 usertrap_amd64.go:122] [ 4812( 103): 4816( 104)] Allocate a new trap: 0xc000b76540 41 D0318 16:20:37.729020 355572 usertrap_amd64.go:225] [ 4812( 103): 4816( 104)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:37.729183 355572 task_exit.go:204] [ 4811( 783): 4814( 784)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.729247 355572 task_exit.go:204] [ 4811( 783): 4814( 784)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.730781 355572 usertrap_amd64.go:212] [ 4812( 103): 4812( 103)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.730852 355572 usertrap_amd64.go:122] [ 4812( 103): 4812( 103)] Allocate a new trap: 0xc000b76540 42 D0318 16:20:37.730986 355572 usertrap_amd64.go:225] [ 4812( 103): 4812( 103)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:37.731022 355572 usertrap_amd64.go:212] [ 4813(1207): 4813(1207)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.731136 355572 usertrap_amd64.go:122] [ 4813(1207): 4813(1207)] Allocate a new trap: 0xc000dc6f30 38 D0318 16:20:37.731206 355572 usertrap_amd64.go:225] [ 4813(1207): 4813(1207)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.731712 355572 usertrap_amd64.go:212] [ 4815(1228): 4815(1228)] Found the pattern at ip 55ec958b3520:sysno 266 D0318 16:20:37.731803 355572 usertrap_amd64.go:122] [ 4815(1228): 4815(1228)] Allocate a new trap: 0xc005e166c0 38 D0318 16:20:37.731868 355572 usertrap_amd64.go:225] [ 4815(1228): 4815(1228)] Apply the binary patch addr 55ec958b3520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.734751 355572 task_exit.go:204] [ 4811( 783): 4811( 783)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.734854 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.736022 355572 task_exit.go:204] [ 4811( 783): 4811( 783)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.736812 355572 task_exit.go:204] [ 4812( 103): 4812( 103)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.737598 355572 task_exit.go:204] [ 4812( 103): 4812( 103)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.737591 355572 task_signals.go:204] [ 4812( 103): 4816( 104)] Signal 9, PID: 4812, TID: 4816, fault addr: 0x0: terminating thread group 16:20:37 executing program 2: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000140)=""/186) D0318 16:20:37.737768 355572 task_exit.go:204] [ 4812( 103): 4816( 104)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.744709 355572 task_exit.go:204] [ 4812( 103): 4816( 104)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.744775 355572 task_exit.go:204] [ 4812( 103): 4816( 104)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.744886 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.745008 355572 task_exit.go:204] [ 4812( 103): 4812( 103)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.746382 355572 usertrap_amd64.go:212] [ 4813(1207): 4813(1207)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.746434 355572 usertrap_amd64.go:122] [ 4813(1207): 4813(1207)] Allocate a new trap: 0xc000dc6f30 39 16:20:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x401c5820, 0x0) D0318 16:20:37.746526 355572 usertrap_amd64.go:225] [ 4813(1207): 4813(1207)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.747845 355572 usertrap_amd64.go:212] [ 4815(1228): 4815(1228)] Found the pattern at ip 55ec95888ca2:sysno 14 D0318 16:20:37.747922 355572 usertrap_amd64.go:122] [ 4815(1228): 4815(1228)] Allocate a new trap: 0xc005e166c0 39 D0318 16:20:37.748078 355572 usertrap_amd64.go:225] [ 4815(1228): 4815(1228)] Apply the binary patch addr 55ec95888ca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.755439 355572 usertrap_amd64.go:212] [ 4813(1207): 4813(1207)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.755546 355572 usertrap_amd64.go:122] [ 4813(1207): 4813(1207)] Allocate a new trap: 0xc000dc6f30 40 D0318 16:20:37.755643 355572 usertrap_amd64.go:225] [ 4813(1207): 4813(1207)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.756926 355572 usertrap_amd64.go:212] [ 4815(1228): 4815(1228)] Found the pattern at ip 55ec958dfb92:sysno 435 D0318 16:20:37.756985 355572 usertrap_amd64.go:122] [ 4815(1228): 4815(1228)] Allocate a new trap: 0xc005e166c0 40 D0318 16:20:37.757039 355572 usertrap_amd64.go:225] [ 4815(1228): 4815(1228)] Apply the binary patch addr 55ec958dfb92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.757182 355572 usertrap_amd64.go:212] [ 4813(1207): 4813(1207)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.757236 355572 usertrap_amd64.go:122] [ 4813(1207): 4813(1207)] Allocate a new trap: 0xc000dc6f30 41 D0318 16:20:37.757298 355572 usertrap_amd64.go:225] [ 4813(1207): 4813(1207)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.757803 355572 usertrap_amd64.go:212] [ 4813(1207): 4818(1208)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.757890 355572 usertrap_amd64.go:122] [ 4813(1207): 4818(1208)] Allocate a new trap: 0xc000dc6f30 42 D0318 16:20:37.757976 355572 usertrap_amd64.go:225] [ 4813(1207): 4818(1208)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.758502 355572 usertrap_amd64.go:212] [ 4815(1228): 4815(1228)] Found the pattern at ip 55ec95888c10:sysno 14 D0318 16:20:37.758589 355572 usertrap_amd64.go:122] [ 4815(1228): 4815(1228)] Allocate a new trap: 0xc005e166c0 41 D0318 16:20:37.758703 355572 usertrap_amd64.go:225] [ 4815(1228): 4815(1228)] Apply the binary patch addr 55ec95888c10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.759110 355572 usertrap_amd64.go:212] [ 4815(1228): 4819(1229)] Found the pattern at ip 55ec95888320:sysno 273 D0318 16:20:37.759188 355572 usertrap_amd64.go:122] [ 4815(1228): 4819(1229)] Allocate a new trap: 0xc005e166c0 42 D0318 16:20:37.759301 355572 usertrap_amd64.go:225] [ 4815(1228): 4819(1229)] Apply the binary patch addr 55ec95888320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.759863 355572 usertrap_amd64.go:212] [ 4813(1207): 4813(1207)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.759968 355572 usertrap_amd64.go:122] [ 4813(1207): 4813(1207)] Allocate a new trap: 0xc000dc6f30 43 D0318 16:20:37.760072 355572 usertrap_amd64.go:225] [ 4813(1207): 4813(1207)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.760654 355572 usertrap_amd64.go:212] [ 4817( 785): 4817( 785)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.760725 355572 usertrap_amd64.go:122] [ 4817( 785): 4817( 785)] Allocate a new trap: 0xc0005269f0 37 D0318 16:20:37.761198 355572 usertrap_amd64.go:225] [ 4817( 785): 4817( 785)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.764684 355572 task_exit.go:204] [ 4813(1207): 4813(1207)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.764882 355572 task_signals.go:204] [ 4813(1207): 4818(1208)] Signal 9, PID: 4813, TID: 4818, fault addr: 0x0: terminating thread group D0318 16:20:37.764947 355572 usertrap_amd64.go:212] [ 4817( 785): 4817( 785)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.764997 355572 usertrap_amd64.go:122] [ 4817( 785): 4817( 785)] Allocate a new trap: 0xc0005269f0 38 D0318 16:20:37.765144 355572 usertrap_amd64.go:225] [ 4817( 785): 4817( 785)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.765378 355572 task_exit.go:204] [ 4813(1207): 4813(1207)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.765487 355572 task_exit.go:204] [ 4813(1207): 4818(1208)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.771551 355572 task_exit.go:204] [ 4813(1207): 4818(1208)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.771649 355572 task_exit.go:204] [ 4813(1207): 4818(1208)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.771749 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.771863 355572 task_exit.go:204] [ 4813(1207): 4813(1207)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) D0318 16:20:37.773783 355572 usertrap_amd64.go:212] [ 4820( 105): 4820( 105)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.773866 355572 usertrap_amd64.go:122] [ 4820( 105): 4820( 105)] Allocate a new trap: 0xc005e16750 36 D0318 16:20:37.774339 355572 usertrap_amd64.go:225] [ 4820( 105): 4820( 105)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.778920 355572 usertrap_amd64.go:212] [ 4820( 105): 4820( 105)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.779103 355572 usertrap_amd64.go:122] [ 4820( 105): 4820( 105)] Allocate a new trap: 0xc005e16750 37 D0318 16:20:37.779262 355572 usertrap_amd64.go:225] [ 4820( 105): 4820( 105)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.780163 355572 usertrap_amd64.go:212] [ 4817( 785): 4817( 785)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.780241 355572 usertrap_amd64.go:122] [ 4817( 785): 4817( 785)] Allocate a new trap: 0xc0005269f0 39 D0318 16:20:37.780365 355572 usertrap_amd64.go:225] [ 4817( 785): 4817( 785)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.787084 355572 usertrap_amd64.go:212] [ 4817( 785): 4817( 785)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.787192 355572 usertrap_amd64.go:122] [ 4817( 785): 4817( 785)] Allocate a new trap: 0xc0005269f0 40 D0318 16:20:37.787319 355572 usertrap_amd64.go:225] [ 4817( 785): 4817( 785)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.788897 355572 usertrap_amd64.go:212] [ 4817( 785): 4817( 785)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.788995 355572 usertrap_amd64.go:122] [ 4817( 785): 4817( 785)] Allocate a new trap: 0xc0005269f0 41 D0318 16:20:37.789082 355572 usertrap_amd64.go:225] [ 4817( 785): 4817( 785)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.788924 355572 usertrap_amd64.go:212] [ 4820( 105): 4820( 105)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.789237 355572 usertrap_amd64.go:122] [ 4820( 105): 4820( 105)] Allocate a new trap: 0xc005e16750 38 D0318 16:20:37.789321 355572 usertrap_amd64.go:225] [ 4820( 105): 4820( 105)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.789456 355572 usertrap_amd64.go:212] [ 4817( 785): 4822( 786)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.789538 355572 usertrap_amd64.go:122] [ 4817( 785): 4822( 786)] Allocate a new trap: 0xc0005269f0 42 D0318 16:20:37.789656 355572 usertrap_amd64.go:225] [ 4817( 785): 4822( 786)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.791050 355572 usertrap_amd64.go:212] [ 4817( 785): 4817( 785)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.791130 355572 usertrap_amd64.go:122] [ 4817( 785): 4817( 785)] Allocate a new trap: 0xc0005269f0 43 D0318 16:20:37.791278 355572 usertrap_amd64.go:225] [ 4817( 785): 4817( 785)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.795977 355572 task_exit.go:204] [ 4817( 785): 4817( 785)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.796788 355572 task_signals.go:204] [ 4817( 785): 4822( 786)] Signal 9, PID: 4817, TID: 4822, fault addr: 0x0: terminating thread group D0318 16:20:37.796815 355572 usertrap_amd64.go:212] [ 4820( 105): 4820( 105)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.796791 355572 task_exit.go:204] [ 4817( 785): 4817( 785)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.796897 355572 usertrap_amd64.go:122] [ 4820( 105): 4820( 105)] Allocate a new trap: 0xc005e16750 39 D0318 16:20:37.797012 355572 usertrap_amd64.go:225] [ 4820( 105): 4820( 105)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.797163 355572 task_exit.go:204] [ 4817( 785): 4822( 786)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.798584 355572 usertrap_amd64.go:212] [ 4820( 105): 4820( 105)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.798670 355572 usertrap_amd64.go:122] [ 4820( 105): 4820( 105)] Allocate a new trap: 0xc005e16750 40 D0318 16:20:37.798777 355572 usertrap_amd64.go:225] [ 4820( 105): 4820( 105)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.799314 355572 usertrap_amd64.go:212] [ 4820( 105): 4823( 106)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.799396 355572 usertrap_amd64.go:122] [ 4820( 105): 4823( 106)] Allocate a new trap: 0xc005e16750 41 D0318 16:20:37.799476 355572 usertrap_amd64.go:225] [ 4820( 105): 4823( 106)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:37.799959 355572 usertrap_amd64.go:212] [ 4821(1209): 4821(1209)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.800061 355572 usertrap_amd64.go:122] [ 4821(1209): 4821(1209)] Allocate a new trap: 0xc000dc70b0 37 D0318 16:20:37.800675 355572 usertrap_amd64.go:225] [ 4821(1209): 4821(1209)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.802348 355572 task_exit.go:204] [ 4817( 785): 4822( 786)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.802423 355572 task_exit.go:204] [ 4817( 785): 4822( 786)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.802509 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.802528 355572 usertrap_amd64.go:212] [ 4820( 105): 4820( 105)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.802591 355572 usertrap_amd64.go:122] [ 4820( 105): 4820( 105)] Allocate a new trap: 0xc005e16750 42 D0318 16:20:37.802632 355572 task_exit.go:204] [ 4817( 785): 4817( 785)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.802672 355572 usertrap_amd64.go:225] [ 4820( 105): 4820( 105)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) 16:20:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x17, 0x0, &(0x7f0000000180)) D0318 16:20:37.804653 355572 usertrap_amd64.go:212] [ 4821(1209): 4821(1209)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.804722 355572 usertrap_amd64.go:122] [ 4821(1209): 4821(1209)] Allocate a new trap: 0xc000dc70b0 38 D0318 16:20:37.804800 355572 usertrap_amd64.go:225] [ 4821(1209): 4821(1209)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.809416 355572 task_exit.go:204] [ 4820( 105): 4820( 105)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.810064 355572 task_signals.go:204] [ 4820( 105): 4823( 106)] Signal 9, PID: 4820, TID: 4823, fault addr: 0x0: terminating thread group D0318 16:20:37.810112 355572 task_exit.go:204] [ 4820( 105): 4820( 105)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.810211 355572 task_exit.go:204] [ 4820( 105): 4823( 106)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.814965 355572 task_signals.go:309] [ 4815(1228): 4824(1230)] failed to restore from a signal frame: bad address D0318 16:20:37.815331 355572 task_signals.go:470] [ 4815(1228): 4824(1230)] Notified of signal 11 D0318 16:20:37.815466 355572 task_signals.go:220] [ 4815(1228): 4824(1230)] Signal 11: delivering to handler D0318 16:20:37.815764 355572 task_exit.go:204] [ 4820( 105): 4823( 106)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.815850 355572 task_exit.go:204] [ 4820( 105): 4823( 106)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.815969 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.816147 355572 task_exit.go:204] [ 4820( 105): 4820( 105)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x18, &(0x7f0000000000), 0x14) D0318 16:20:37.817931 355572 usertrap_amd64.go:212] [ 4821(1209): 4821(1209)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.818035 355572 usertrap_amd64.go:122] [ 4821(1209): 4821(1209)] Allocate a new trap: 0xc000dc70b0 39 D0318 16:20:37.818139 355572 usertrap_amd64.go:225] [ 4821(1209): 4821(1209)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.818392 355572 usertrap_amd64.go:212] [ 4815(1228): 4815(1228)] Found the pattern at ip 55ec958df1ae:sysno 230 D0318 16:20:37.818464 355572 usertrap_amd64.go:122] [ 4815(1228): 4815(1228)] Allocate a new trap: 0xc005e166c0 43 D0318 16:20:37.818519 355572 usertrap_amd64.go:225] [ 4815(1228): 4815(1228)] Apply the binary patch addr 55ec958df1ae trap addr 66d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.831339 355572 usertrap_amd64.go:212] [ 4821(1209): 4821(1209)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.831434 355572 usertrap_amd64.go:122] [ 4821(1209): 4821(1209)] Allocate a new trap: 0xc000dc70b0 40 D0318 16:20:37.831498 355572 usertrap_amd64.go:225] [ 4821(1209): 4821(1209)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.832143 355572 usertrap_amd64.go:212] [ 4826( 787): 4826( 787)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.832263 355572 usertrap_amd64.go:122] [ 4826( 787): 4826( 787)] Allocate a new trap: 0xc000b76660 37 D0318 16:20:37.832898 355572 usertrap_amd64.go:212] [ 4821(1209): 4821(1209)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.832977 355572 usertrap_amd64.go:122] [ 4821(1209): 4821(1209)] Allocate a new trap: 0xc000dc70b0 41 D0318 16:20:37.832978 355572 usertrap_amd64.go:225] [ 4826( 787): 4826( 787)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.833076 355572 usertrap_amd64.go:225] [ 4821(1209): 4821(1209)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.833414 355572 usertrap_amd64.go:212] [ 4821(1209): 4828(1210)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.833488 355572 usertrap_amd64.go:122] [ 4821(1209): 4828(1210)] Allocate a new trap: 0xc000dc70b0 42 D0318 16:20:37.833562 355572 usertrap_amd64.go:225] [ 4821(1209): 4828(1210)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.836675 355572 usertrap_amd64.go:212] [ 4821(1209): 4821(1209)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.836748 355572 usertrap_amd64.go:122] [ 4821(1209): 4821(1209)] Allocate a new trap: 0xc000dc70b0 43 D0318 16:20:37.836798 355572 usertrap_amd64.go:212] [ 4826( 787): 4826( 787)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.836848 355572 usertrap_amd64.go:225] [ 4821(1209): 4821(1209)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.836867 355572 usertrap_amd64.go:122] [ 4826( 787): 4826( 787)] Allocate a new trap: 0xc000b76660 38 D0318 16:20:37.836993 355572 usertrap_amd64.go:225] [ 4826( 787): 4826( 787)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.841739 355572 task_exit.go:204] [ 4821(1209): 4821(1209)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.842495 355572 task_signals.go:204] [ 4821(1209): 4828(1210)] Signal 9, PID: 4821, TID: 4828, fault addr: 0x0: terminating thread group D0318 16:20:37.842601 355572 task_exit.go:204] [ 4821(1209): 4828(1210)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.842941 355572 task_exit.go:204] [ 4821(1209): 4821(1209)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.843502 355572 usertrap_amd64.go:212] [ 4827( 107): 4827( 107)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.843653 355572 usertrap_amd64.go:122] [ 4827( 107): 4827( 107)] Allocate a new trap: 0xc0009766f0 36 D0318 16:20:37.844416 355572 usertrap_amd64.go:225] [ 4827( 107): 4827( 107)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.847800 355572 task_exit.go:204] [ 4821(1209): 4828(1210)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.847878 355572 task_exit.go:204] [ 4821(1209): 4828(1210)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.847990 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.848626 355572 usertrap_amd64.go:212] [ 4827( 107): 4827( 107)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.848701 355572 usertrap_amd64.go:122] [ 4827( 107): 4827( 107)] Allocate a new trap: 0xc0009766f0 37 D0318 16:20:37.848834 355572 usertrap_amd64.go:225] [ 4827( 107): 4827( 107)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.849545 355572 task_exit.go:204] [ 4821(1209): 4821(1209)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 1: add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) D0318 16:20:37.852297 355572 usertrap_amd64.go:212] [ 4826( 787): 4826( 787)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.852368 355572 usertrap_amd64.go:122] [ 4826( 787): 4826( 787)] Allocate a new trap: 0xc000b76660 39 D0318 16:20:37.852471 355572 usertrap_amd64.go:225] [ 4826( 787): 4826( 787)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.859988 355572 usertrap_amd64.go:212] [ 4826( 787): 4826( 787)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.860058 355572 usertrap_amd64.go:122] [ 4826( 787): 4826( 787)] Allocate a new trap: 0xc000b76660 40 D0318 16:20:37.860118 355572 usertrap_amd64.go:225] [ 4826( 787): 4826( 787)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.861484 355572 usertrap_amd64.go:212] [ 4827( 107): 4827( 107)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.861552 355572 usertrap_amd64.go:122] [ 4827( 107): 4827( 107)] Allocate a new trap: 0xc0009766f0 38 D0318 16:20:37.861579 355572 usertrap_amd64.go:212] [ 4826( 787): 4826( 787)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.861681 355572 usertrap_amd64.go:122] [ 4826( 787): 4826( 787)] Allocate a new trap: 0xc000b76660 41 D0318 16:20:37.861603 355572 usertrap_amd64.go:225] [ 4827( 107): 4827( 107)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.861826 355572 usertrap_amd64.go:225] [ 4826( 787): 4826( 787)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.862033 355572 usertrap_amd64.go:212] [ 4826( 787): 4829( 788)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.862113 355572 usertrap_amd64.go:122] [ 4826( 787): 4829( 788)] Allocate a new trap: 0xc000b76660 42 D0318 16:20:37.862190 355572 usertrap_amd64.go:225] [ 4826( 787): 4829( 788)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.864972 355572 usertrap_amd64.go:212] [ 4826( 787): 4826( 787)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.865057 355572 usertrap_amd64.go:122] [ 4826( 787): 4826( 787)] Allocate a new trap: 0xc000b76660 43 D0318 16:20:37.865130 355572 usertrap_amd64.go:225] [ 4826( 787): 4826( 787)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.868272 355572 usertrap_amd64.go:212] [ 4827( 107): 4827( 107)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.868343 355572 usertrap_amd64.go:122] [ 4827( 107): 4827( 107)] Allocate a new trap: 0xc0009766f0 39 D0318 16:20:37.868466 355572 usertrap_amd64.go:225] [ 4827( 107): 4827( 107)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.870552 355572 usertrap_amd64.go:212] [ 4827( 107): 4827( 107)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.870649 355572 usertrap_amd64.go:122] [ 4827( 107): 4827( 107)] Allocate a new trap: 0xc0009766f0 40 D0318 16:20:37.870725 355572 usertrap_amd64.go:225] [ 4827( 107): 4827( 107)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.871072 355572 usertrap_amd64.go:212] [ 4827( 107): 4831( 108)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.871139 355572 usertrap_amd64.go:122] [ 4827( 107): 4831( 108)] Allocate a new trap: 0xc0009766f0 41 D0318 16:20:37.871244 355572 usertrap_amd64.go:225] [ 4827( 107): 4831( 108)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:37.872243 355572 task_exit.go:204] [ 4826( 787): 4826( 787)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.872495 355572 task_signals.go:204] [ 4826( 787): 4829( 788)] Signal 9, PID: 4826, TID: 4829, fault addr: 0x0: terminating thread group D0318 16:20:37.873221 355572 task_exit.go:204] [ 4826( 787): 4826( 787)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.873427 355572 task_exit.go:204] [ 4826( 787): 4829( 788)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.874433 355572 usertrap_amd64.go:212] [ 4827( 107): 4827( 107)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.874500 355572 usertrap_amd64.go:122] [ 4827( 107): 4827( 107)] Allocate a new trap: 0xc0009766f0 42 D0318 16:20:37.874595 355572 usertrap_amd64.go:225] [ 4827( 107): 4827( 107)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:37.877678 355572 usertrap_amd64.go:212] [ 4830(1211): 4830(1211)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.877778 355572 usertrap_amd64.go:122] [ 4830(1211): 4830(1211)] Allocate a new trap: 0xc0002d26c0 37 D0318 16:20:37.878581 355572 usertrap_amd64.go:225] [ 4830(1211): 4830(1211)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.879568 355572 task_signals.go:204] [ 4827( 107): 4831( 108)] Signal 9, PID: 4827, TID: 4831, fault addr: 0x0: terminating thread group D0318 16:20:37.879685 355572 task_exit.go:204] [ 4827( 107): 4827( 107)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.879926 355572 task_exit.go:204] [ 4827( 107): 4831( 108)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.880530 355572 task_exit.go:204] [ 4826( 787): 4829( 788)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.880614 355572 task_exit.go:204] [ 4826( 787): 4829( 788)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.880709 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.880925 355572 task_exit.go:204] [ 4826( 787): 4826( 787)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.881407 355572 task_exit.go:204] [ 4827( 107): 4831( 108)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.881463 355572 task_exit.go:204] [ 4827( 107): 4831( 108)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8903, &(0x7f00000001c0)) D0318 16:20:37.884257 355572 usertrap_amd64.go:212] [ 4830(1211): 4830(1211)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.884358 355572 usertrap_amd64.go:122] [ 4830(1211): 4830(1211)] Allocate a new trap: 0xc0002d26c0 38 D0318 16:20:37.884427 355572 usertrap_amd64.go:225] [ 4830(1211): 4830(1211)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.885159 355572 task_exit.go:204] [ 4827( 107): 4827( 107)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.885245 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.885640 355572 task_exit.go:204] [ 4827( 107): 4827( 107)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x8954, 0x0) D0318 16:20:37.897266 355572 usertrap_amd64.go:212] [ 4830(1211): 4830(1211)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.897414 355572 usertrap_amd64.go:122] [ 4830(1211): 4830(1211)] Allocate a new trap: 0xc0002d26c0 39 D0318 16:20:37.897537 355572 usertrap_amd64.go:225] [ 4830(1211): 4830(1211)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.904439 355572 usertrap_amd64.go:212] [ 4830(1211): 4830(1211)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.904519 355572 usertrap_amd64.go:122] [ 4830(1211): 4830(1211)] Allocate a new trap: 0xc0002d26c0 40 D0318 16:20:37.904623 355572 usertrap_amd64.go:225] [ 4830(1211): 4830(1211)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.906171 355572 usertrap_amd64.go:212] [ 4830(1211): 4830(1211)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.906259 355572 usertrap_amd64.go:122] [ 4830(1211): 4830(1211)] Allocate a new trap: 0xc0002d26c0 41 D0318 16:20:37.906358 355572 usertrap_amd64.go:225] [ 4830(1211): 4830(1211)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.906808 355572 usertrap_amd64.go:212] [ 4830(1211): 4834(1212)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.906873 355572 usertrap_amd64.go:122] [ 4830(1211): 4834(1212)] Allocate a new trap: 0xc0002d26c0 42 D0318 16:20:37.906948 355572 usertrap_amd64.go:225] [ 4830(1211): 4834(1212)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.908567 355572 usertrap_amd64.go:212] [ 4830(1211): 4830(1211)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.908642 355572 usertrap_amd64.go:122] [ 4830(1211): 4830(1211)] Allocate a new trap: 0xc0002d26c0 43 D0318 16:20:37.908741 355572 usertrap_amd64.go:225] [ 4830(1211): 4830(1211)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.908835 355572 usertrap_amd64.go:212] [ 4832( 789): 4832( 789)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.908957 355572 usertrap_amd64.go:122] [ 4832( 789): 4832( 789)] Allocate a new trap: 0xc0078f6ae0 37 D0318 16:20:37.909456 355572 usertrap_amd64.go:225] [ 4832( 789): 4832( 789)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.912990 355572 usertrap_amd64.go:212] [ 4832( 789): 4832( 789)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.913108 355572 usertrap_amd64.go:122] [ 4832( 789): 4832( 789)] Allocate a new trap: 0xc0078f6ae0 38 D0318 16:20:37.913191 355572 usertrap_amd64.go:225] [ 4832( 789): 4832( 789)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.914162 355572 usertrap_amd64.go:212] [ 4833( 109): 4833( 109)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.914303 355572 usertrap_amd64.go:122] [ 4833( 109): 4833( 109)] Allocate a new trap: 0xc00637d560 36 D0318 16:20:37.915008 355572 usertrap_amd64.go:225] [ 4833( 109): 4833( 109)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.917606 355572 task_exit.go:204] [ 4830(1211): 4830(1211)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.917778 355572 task_signals.go:204] [ 4830(1211): 4834(1212)] Signal 9, PID: 4830, TID: 4834, fault addr: 0x0: terminating thread group D0318 16:20:37.918054 355572 usertrap_amd64.go:212] [ 4833( 109): 4833( 109)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.918144 355572 usertrap_amd64.go:122] [ 4833( 109): 4833( 109)] Allocate a new trap: 0xc00637d560 37 D0318 16:20:37.918221 355572 usertrap_amd64.go:225] [ 4833( 109): 4833( 109)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.918417 355572 task_exit.go:204] [ 4830(1211): 4830(1211)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.918514 355572 task_exit.go:204] [ 4830(1211): 4834(1212)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.925199 355572 task_exit.go:204] [ 4830(1211): 4834(1212)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.925280 355572 task_exit.go:204] [ 4830(1211): 4834(1212)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.925376 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.926380 355572 task_exit.go:204] [ 4830(1211): 4830(1211)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.927660 355572 usertrap_amd64.go:212] [ 4833( 109): 4833( 109)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.927736 355572 usertrap_amd64.go:122] [ 4833( 109): 4833( 109)] Allocate a new trap: 0xc00637d560 38 16:20:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) D0318 16:20:37.927836 355572 usertrap_amd64.go:225] [ 4833( 109): 4833( 109)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.928674 355572 usertrap_amd64.go:212] [ 4832( 789): 4832( 789)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:37.928764 355572 usertrap_amd64.go:122] [ 4832( 789): 4832( 789)] Allocate a new trap: 0xc0078f6ae0 39 D0318 16:20:37.928840 355572 usertrap_amd64.go:225] [ 4832( 789): 4832( 789)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:37.935637 355572 usertrap_amd64.go:212] [ 4833( 109): 4833( 109)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:37.935708 355572 usertrap_amd64.go:122] [ 4833( 109): 4833( 109)] Allocate a new trap: 0xc00637d560 39 D0318 16:20:37.935829 355572 usertrap_amd64.go:225] [ 4833( 109): 4833( 109)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:37.937585 355572 usertrap_amd64.go:212] [ 4833( 109): 4833( 109)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:37.937657 355572 usertrap_amd64.go:122] [ 4833( 109): 4833( 109)] Allocate a new trap: 0xc00637d560 40 D0318 16:20:37.937767 355572 usertrap_amd64.go:225] [ 4833( 109): 4833( 109)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:37.937853 355572 usertrap_amd64.go:212] [ 4832( 789): 4832( 789)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:37.937941 355572 usertrap_amd64.go:122] [ 4832( 789): 4832( 789)] Allocate a new trap: 0xc0078f6ae0 40 D0318 16:20:37.937917 355572 usertrap_amd64.go:212] [ 4833( 109): 4835( 110)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:37.938021 355572 usertrap_amd64.go:225] [ 4832( 789): 4832( 789)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:37.938066 355572 usertrap_amd64.go:122] [ 4833( 109): 4835( 110)] Allocate a new trap: 0xc00637d560 41 D0318 16:20:37.938155 355572 usertrap_amd64.go:225] [ 4833( 109): 4835( 110)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:37.939664 355572 usertrap_amd64.go:212] [ 4832( 789): 4832( 789)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:37.939721 355572 usertrap_amd64.go:122] [ 4832( 789): 4832( 789)] Allocate a new trap: 0xc0078f6ae0 41 D0318 16:20:37.939785 355572 usertrap_amd64.go:225] [ 4832( 789): 4832( 789)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:37.940075 355572 usertrap_amd64.go:212] [ 4832( 789): 4836( 790)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:37.940188 355572 usertrap_amd64.go:122] [ 4832( 789): 4836( 790)] Allocate a new trap: 0xc0078f6ae0 42 D0318 16:20:37.940249 355572 usertrap_amd64.go:225] [ 4832( 789): 4836( 790)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:37.941121 355572 usertrap_amd64.go:212] [ 4833( 109): 4833( 109)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:37.941191 355572 usertrap_amd64.go:122] [ 4833( 109): 4833( 109)] Allocate a new trap: 0xc00637d560 42 D0318 16:20:37.941243 355572 usertrap_amd64.go:225] [ 4833( 109): 4833( 109)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:37.942598 355572 usertrap_amd64.go:212] [ 4832( 789): 4832( 789)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:37.942692 355572 usertrap_amd64.go:122] [ 4832( 789): 4832( 789)] Allocate a new trap: 0xc0078f6ae0 43 D0318 16:20:37.942746 355572 usertrap_amd64.go:225] [ 4832( 789): 4832( 789)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:37.946243 355572 task_exit.go:204] [ 4833( 109): 4833( 109)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.946416 355572 task_signals.go:204] [ 4833( 109): 4835( 110)] Signal 9, PID: 4833, TID: 4835, fault addr: 0x0: terminating thread group D0318 16:20:37.946548 355572 task_exit.go:204] [ 4833( 109): 4835( 110)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.947234 355572 task_signals.go:204] [ 4832( 789): 4836( 790)] Signal 9, PID: 4832, TID: 4836, fault addr: 0x0: terminating thread group D0318 16:20:37.947372 355572 task_exit.go:204] [ 4832( 789): 4836( 790)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.947533 355572 task_exit.go:204] [ 4832( 789): 4832( 789)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.947737 355572 task_exit.go:204] [ 4833( 109): 4833( 109)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.948426 355572 task_exit.go:204] [ 4832( 789): 4836( 790)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.948496 355572 task_exit.go:204] [ 4832( 789): 4836( 790)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.950887 355572 task_exit.go:204] [ 4833( 109): 4835( 110)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.950972 355572 task_exit.go:204] [ 4833( 109): 4835( 110)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.951049 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:37.951816 355572 task_exit.go:204] [ 4833( 109): 4833( 109)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.952345 355572 usertrap_amd64.go:212] [ 4837(1213): 4837(1213)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:37.952468 355572 usertrap_amd64.go:122] [ 4837(1213): 4837(1213)] Allocate a new trap: 0xc000e1c8d0 37 16:20:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000000c0)=@abs, 0x6e) D0318 16:20:37.953445 355572 usertrap_amd64.go:225] [ 4837(1213): 4837(1213)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:37.954757 355572 task_exit.go:204] [ 4832( 789): 4832( 789)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.954860 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:37.955045 355572 task_exit.go:204] [ 4832( 789): 4832( 789)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x80811501, 0x0) D0318 16:20:37.957859 355572 usertrap_amd64.go:212] [ 4837(1213): 4837(1213)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:37.957928 355572 usertrap_amd64.go:122] [ 4837(1213): 4837(1213)] Allocate a new trap: 0xc000e1c8d0 38 D0318 16:20:37.958038 355572 usertrap_amd64.go:225] [ 4837(1213): 4837(1213)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:37.969935 355572 usertrap_amd64.go:212] [ 4837(1213): 4837(1213)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:37.970019 355572 usertrap_amd64.go:122] [ 4837(1213): 4837(1213)] Allocate a new trap: 0xc000e1c8d0 39 D0318 16:20:37.970114 355572 usertrap_amd64.go:225] [ 4837(1213): 4837(1213)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:37.977775 355572 usertrap_amd64.go:212] [ 4838( 111): 4838( 111)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:37.977906 355572 usertrap_amd64.go:122] [ 4838( 111): 4838( 111)] Allocate a new trap: 0xc000526cc0 36 D0318 16:20:37.978852 355572 usertrap_amd64.go:225] [ 4838( 111): 4838( 111)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:37.981632 355572 usertrap_amd64.go:212] [ 4837(1213): 4837(1213)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:37.981719 355572 usertrap_amd64.go:122] [ 4837(1213): 4837(1213)] Allocate a new trap: 0xc000e1c8d0 40 D0318 16:20:37.981812 355572 usertrap_amd64.go:225] [ 4837(1213): 4837(1213)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:37.982976 355572 usertrap_amd64.go:212] [ 4838( 111): 4838( 111)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:37.983084 355572 usertrap_amd64.go:122] [ 4838( 111): 4838( 111)] Allocate a new trap: 0xc000526cc0 37 D0318 16:20:37.983177 355572 usertrap_amd64.go:225] [ 4838( 111): 4838( 111)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:37.983517 355572 usertrap_amd64.go:212] [ 4837(1213): 4837(1213)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:37.983584 355572 usertrap_amd64.go:122] [ 4837(1213): 4837(1213)] Allocate a new trap: 0xc000e1c8d0 41 D0318 16:20:37.983716 355572 usertrap_amd64.go:225] [ 4837(1213): 4837(1213)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:37.983778 355572 usertrap_amd64.go:212] [ 4839( 791): 4839( 791)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:37.983899 355572 usertrap_amd64.go:122] [ 4839( 791): 4839( 791)] Allocate a new trap: 0xc000e1c960 37 D0318 16:20:37.984183 355572 usertrap_amd64.go:212] [ 4837(1213): 4840(1214)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:37.984241 355572 usertrap_amd64.go:122] [ 4837(1213): 4840(1214)] Allocate a new trap: 0xc000e1c8d0 42 D0318 16:20:37.984315 355572 usertrap_amd64.go:225] [ 4837(1213): 4840(1214)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:37.984541 355572 usertrap_amd64.go:225] [ 4839( 791): 4839( 791)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:37.986859 355572 usertrap_amd64.go:212] [ 4837(1213): 4837(1213)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:37.986935 355572 usertrap_amd64.go:122] [ 4837(1213): 4837(1213)] Allocate a new trap: 0xc000e1c8d0 43 D0318 16:20:37.987009 355572 usertrap_amd64.go:225] [ 4837(1213): 4837(1213)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:37.987371 355572 usertrap_amd64.go:212] [ 4839( 791): 4839( 791)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:37.987439 355572 usertrap_amd64.go:122] [ 4839( 791): 4839( 791)] Allocate a new trap: 0xc000e1c960 38 D0318 16:20:37.987515 355572 usertrap_amd64.go:225] [ 4839( 791): 4839( 791)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:37.993293 355572 task_exit.go:204] [ 4837(1213): 4837(1213)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.993978 355572 task_signals.go:204] [ 4837(1213): 4840(1214)] Signal 9, PID: 4837, TID: 4840, fault addr: 0x0: terminating thread group D0318 16:20:37.994070 355572 task_exit.go:204] [ 4837(1213): 4837(1213)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.994290 355572 task_exit.go:204] [ 4837(1213): 4840(1214)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:37.996450 355572 usertrap_amd64.go:212] [ 4838( 111): 4838( 111)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:37.996540 355572 usertrap_amd64.go:122] [ 4838( 111): 4838( 111)] Allocate a new trap: 0xc000526cc0 38 D0318 16:20:37.996668 355572 usertrap_amd64.go:225] [ 4838( 111): 4838( 111)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:37.999195 355572 task_exit.go:204] [ 4837(1213): 4840(1214)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:37.999294 355572 task_exit.go:204] [ 4837(1213): 4840(1214)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:37.999733 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:37.999874 355572 task_exit.go:204] [ 4837(1213): 4837(1213)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.000950 355572 usertrap_amd64.go:212] [ 4839( 791): 4839( 791)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:38.001017 355572 usertrap_amd64.go:122] [ 4839( 791): 4839( 791)] Allocate a new trap: 0xc000e1c960 39 16:20:38 executing program 1: getresgid(&(0x7f0000000280), &(0x7f00000002c0), 0x0) D0318 16:20:38.001109 355572 usertrap_amd64.go:225] [ 4839( 791): 4839( 791)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:38.003787 355572 usertrap_amd64.go:212] [ 4838( 111): 4838( 111)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:38.003908 355572 usertrap_amd64.go:122] [ 4838( 111): 4838( 111)] Allocate a new trap: 0xc000526cc0 39 D0318 16:20:38.004048 355572 usertrap_amd64.go:225] [ 4838( 111): 4838( 111)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:38.005883 355572 usertrap_amd64.go:212] [ 4838( 111): 4838( 111)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:38.005982 355572 usertrap_amd64.go:122] [ 4838( 111): 4838( 111)] Allocate a new trap: 0xc000526cc0 40 D0318 16:20:38.006082 355572 usertrap_amd64.go:225] [ 4838( 111): 4838( 111)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:38.006487 355572 usertrap_amd64.go:212] [ 4838( 111): 4841( 112)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:38.006602 355572 usertrap_amd64.go:122] [ 4838( 111): 4841( 112)] Allocate a new trap: 0xc000526cc0 41 D0318 16:20:38.006707 355572 usertrap_amd64.go:225] [ 4838( 111): 4841( 112)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:38.009041 355572 usertrap_amd64.go:212] [ 4838( 111): 4838( 111)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:38.009151 355572 usertrap_amd64.go:122] [ 4838( 111): 4838( 111)] Allocate a new trap: 0xc000526cc0 42 D0318 16:20:38.009259 355572 usertrap_amd64.go:225] [ 4838( 111): 4838( 111)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:38.010656 355572 usertrap_amd64.go:212] [ 4839( 791): 4839( 791)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:38.010739 355572 usertrap_amd64.go:122] [ 4839( 791): 4839( 791)] Allocate a new trap: 0xc000e1c960 40 D0318 16:20:38.010843 355572 usertrap_amd64.go:225] [ 4839( 791): 4839( 791)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:38.012455 355572 usertrap_amd64.go:212] [ 4839( 791): 4839( 791)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:38.012600 355572 usertrap_amd64.go:122] [ 4839( 791): 4839( 791)] Allocate a new trap: 0xc000e1c960 41 D0318 16:20:38.012702 355572 usertrap_amd64.go:225] [ 4839( 791): 4839( 791)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:38.012979 355572 usertrap_amd64.go:212] [ 4839( 791): 4842( 792)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:38.013047 355572 usertrap_amd64.go:122] [ 4839( 791): 4842( 792)] Allocate a new trap: 0xc000e1c960 42 D0318 16:20:38.013144 355572 usertrap_amd64.go:225] [ 4839( 791): 4842( 792)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:38.015226 355572 usertrap_amd64.go:212] [ 4839( 791): 4839( 791)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:38.015218 355572 task_exit.go:204] [ 4838( 111): 4838( 111)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.015299 355572 usertrap_amd64.go:122] [ 4839( 791): 4839( 791)] Allocate a new trap: 0xc000e1c960 43 D0318 16:20:38.015402 355572 usertrap_amd64.go:225] [ 4839( 791): 4839( 791)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:38.015962 355572 task_signals.go:204] [ 4838( 111): 4841( 112)] Signal 9, PID: 4838, TID: 4841, fault addr: 0x0: terminating thread group D0318 16:20:38.015967 355572 task_exit.go:204] [ 4838( 111): 4838( 111)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.016131 355572 task_exit.go:204] [ 4838( 111): 4841( 112)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.021291 355572 task_exit.go:204] [ 4838( 111): 4841( 112)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.021351 355572 task_exit.go:204] [ 4838( 111): 4841( 112)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.021454 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:38.021677 355572 task_exit.go:204] [ 4838( 111): 4838( 111)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.021878 355572 task_signals.go:204] [ 4839( 791): 4842( 792)] Signal 9, PID: 4839, TID: 4842, fault addr: 0x0: terminating thread group D0318 16:20:38.021971 355572 task_exit.go:204] [ 4839( 791): 4842( 792)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.022639 355572 task_exit.go:204] [ 4839( 791): 4839( 791)] Transitioning from exit state TaskExitNone to TaskExitInitiated 16:20:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x2a, &(0x7f0000000000), 0x14) D0318 16:20:38.022956 355572 task_exit.go:204] [ 4839( 791): 4842( 792)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.023073 355572 task_exit.go:204] [ 4839( 791): 4842( 792)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.027312 355572 usertrap_amd64.go:212] [ 4843(1215): 4843(1215)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:38.027411 355572 usertrap_amd64.go:122] [ 4843(1215): 4843(1215)] Allocate a new trap: 0xc005728f90 37 D0318 16:20:38.027713 355572 task_exit.go:204] [ 4839( 791): 4839( 791)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.027800 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:38.027945 355572 usertrap_amd64.go:225] [ 4843(1215): 4843(1215)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:38.029064 355572 task_exit.go:204] [ 4839( 791): 4839( 791)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x8, 0x0, &(0x7f0000000180)) D0318 16:20:38.030700 355572 usertrap_amd64.go:212] [ 4843(1215): 4843(1215)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:38.030802 355572 usertrap_amd64.go:122] [ 4843(1215): 4843(1215)] Allocate a new trap: 0xc005728f90 38 D0318 16:20:38.030868 355572 usertrap_amd64.go:225] [ 4843(1215): 4843(1215)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:38.044753 355572 usertrap_amd64.go:212] [ 4843(1215): 4843(1215)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:38.044844 355572 usertrap_amd64.go:122] [ 4843(1215): 4843(1215)] Allocate a new trap: 0xc005728f90 39 D0318 16:20:38.044994 355572 usertrap_amd64.go:225] [ 4843(1215): 4843(1215)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:38.047771 355572 usertrap_amd64.go:212] [ 4844( 113): 4844( 113)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:38.047857 355572 usertrap_amd64.go:122] [ 4844( 113): 4844( 113)] Allocate a new trap: 0xc00637d5f0 36 D0318 16:20:38.048446 355572 usertrap_amd64.go:225] [ 4844( 113): 4844( 113)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:38.051459 355572 usertrap_amd64.go:212] [ 4844( 113): 4844( 113)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:38.051560 355572 usertrap_amd64.go:122] [ 4844( 113): 4844( 113)] Allocate a new trap: 0xc00637d5f0 37 D0318 16:20:38.051742 355572 usertrap_amd64.go:225] [ 4844( 113): 4844( 113)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:38.051910 355572 usertrap_amd64.go:212] [ 4843(1215): 4843(1215)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:38.052054 355572 usertrap_amd64.go:122] [ 4843(1215): 4843(1215)] Allocate a new trap: 0xc005728f90 40 D0318 16:20:38.052148 355572 usertrap_amd64.go:225] [ 4843(1215): 4843(1215)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:38.053654 355572 usertrap_amd64.go:212] [ 4843(1215): 4843(1215)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:38.053734 355572 usertrap_amd64.go:122] [ 4843(1215): 4843(1215)] Allocate a new trap: 0xc005728f90 41 D0318 16:20:38.053789 355572 usertrap_amd64.go:225] [ 4843(1215): 4843(1215)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:38.054099 355572 usertrap_amd64.go:212] [ 4843(1215): 4846(1216)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:38.054184 355572 usertrap_amd64.go:122] [ 4843(1215): 4846(1216)] Allocate a new trap: 0xc005728f90 42 D0318 16:20:38.054265 355572 usertrap_amd64.go:225] [ 4843(1215): 4846(1216)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:38.054736 355572 usertrap_amd64.go:212] [ 4845( 793): 4845( 793)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:38.054831 355572 usertrap_amd64.go:122] [ 4845( 793): 4845( 793)] Allocate a new trap: 0xc005728fc0 37 D0318 16:20:38.055482 355572 usertrap_amd64.go:225] [ 4845( 793): 4845( 793)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:38.056135 355572 usertrap_amd64.go:212] [ 4843(1215): 4843(1215)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:38.056233 355572 usertrap_amd64.go:122] [ 4843(1215): 4843(1215)] Allocate a new trap: 0xc005728f90 43 D0318 16:20:38.056330 355572 usertrap_amd64.go:225] [ 4843(1215): 4843(1215)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:38.059491 355572 usertrap_amd64.go:212] [ 4845( 793): 4845( 793)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:38.059573 355572 usertrap_amd64.go:122] [ 4845( 793): 4845( 793)] Allocate a new trap: 0xc005728fc0 38 D0318 16:20:38.059705 355572 usertrap_amd64.go:225] [ 4845( 793): 4845( 793)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:38.062191 355572 task_exit.go:204] [ 4843(1215): 4843(1215)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.062457 355572 task_signals.go:204] [ 4843(1215): 4846(1216)] Signal 9, PID: 4843, TID: 4846, fault addr: 0x0: terminating thread group D0318 16:20:38.062587 355572 task_exit.go:204] [ 4843(1215): 4846(1216)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.063337 355572 task_exit.go:204] [ 4843(1215): 4846(1216)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.063430 355572 task_exit.go:204] [ 4843(1215): 4846(1216)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.064957 355572 usertrap_amd64.go:212] [ 4844( 113): 4844( 113)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:38.065026 355572 usertrap_amd64.go:122] [ 4844( 113): 4844( 113)] Allocate a new trap: 0xc00637d5f0 38 D0318 16:20:38.065121 355572 usertrap_amd64.go:225] [ 4844( 113): 4844( 113)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:38.067470 355572 task_exit.go:204] [ 4843(1215): 4843(1215)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.067585 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:38.068408 355572 task_exit.go:204] [ 4843(1215): 4843(1215)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x5460, 0x0) D0318 16:20:38.073405 355572 usertrap_amd64.go:212] [ 4844( 113): 4844( 113)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:38.073506 355572 usertrap_amd64.go:122] [ 4844( 113): 4844( 113)] Allocate a new trap: 0xc00637d5f0 39 D0318 16:20:38.073655 355572 usertrap_amd64.go:225] [ 4844( 113): 4844( 113)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:38.075715 355572 usertrap_amd64.go:212] [ 4845( 793): 4845( 793)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:38.075821 355572 usertrap_amd64.go:212] [ 4844( 113): 4844( 113)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:38.075863 355572 usertrap_amd64.go:122] [ 4845( 793): 4845( 793)] Allocate a new trap: 0xc005728fc0 39 D0318 16:20:38.075877 355572 usertrap_amd64.go:122] [ 4844( 113): 4844( 113)] Allocate a new trap: 0xc00637d5f0 40 D0318 16:20:38.076002 355572 usertrap_amd64.go:225] [ 4844( 113): 4844( 113)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:38.075970 355572 usertrap_amd64.go:225] [ 4845( 793): 4845( 793)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:38.076306 355572 usertrap_amd64.go:212] [ 4844( 113): 4847( 114)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:38.076392 355572 usertrap_amd64.go:122] [ 4844( 113): 4847( 114)] Allocate a new trap: 0xc00637d5f0 41 D0318 16:20:38.076461 355572 usertrap_amd64.go:225] [ 4844( 113): 4847( 114)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:38.079389 355572 usertrap_amd64.go:212] [ 4844( 113): 4844( 113)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:38.079466 355572 usertrap_amd64.go:122] [ 4844( 113): 4844( 113)] Allocate a new trap: 0xc00637d5f0 42 D0318 16:20:38.079533 355572 usertrap_amd64.go:225] [ 4844( 113): 4844( 113)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:38.084148 355572 task_exit.go:204] [ 4844( 113): 4844( 113)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.084201 355572 usertrap_amd64.go:212] [ 4845( 793): 4845( 793)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:38.084280 355572 usertrap_amd64.go:122] [ 4845( 793): 4845( 793)] Allocate a new trap: 0xc005728fc0 40 D0318 16:20:38.084397 355572 usertrap_amd64.go:225] [ 4845( 793): 4845( 793)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:38.084927 355572 task_signals.go:204] [ 4844( 113): 4847( 114)] Signal 9, PID: 4844, TID: 4847, fault addr: 0x0: terminating thread group D0318 16:20:38.085099 355572 task_exit.go:204] [ 4844( 113): 4844( 113)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.085332 355572 task_exit.go:204] [ 4844( 113): 4847( 114)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.086855 355572 usertrap_amd64.go:212] [ 4845( 793): 4845( 793)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:38.086928 355572 usertrap_amd64.go:122] [ 4845( 793): 4845( 793)] Allocate a new trap: 0xc005728fc0 41 D0318 16:20:38.087047 355572 usertrap_amd64.go:225] [ 4845( 793): 4845( 793)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:38.087216 355572 usertrap_amd64.go:212] [ 4845( 793): 4849( 794)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:38.087316 355572 usertrap_amd64.go:122] [ 4845( 793): 4849( 794)] Allocate a new trap: 0xc005728fc0 42 D0318 16:20:38.087431 355572 usertrap_amd64.go:225] [ 4845( 793): 4849( 794)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) D0318 16:20:38.090210 355572 usertrap_amd64.go:212] [ 4845( 793): 4845( 793)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:38.090298 355572 usertrap_amd64.go:122] [ 4845( 793): 4845( 793)] Allocate a new trap: 0xc005728fc0 43 D0318 16:20:38.090342 355572 task_exit.go:204] [ 4844( 113): 4847( 114)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.090410 355572 task_exit.go:204] [ 4844( 113): 4847( 114)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.090380 355572 usertrap_amd64.go:225] [ 4845( 793): 4845( 793)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:38.090522 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:38.090868 355572 task_exit.go:204] [ 4844( 113): 4844( 113)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) D0318 16:20:38.092946 355572 usertrap_amd64.go:212] [ 4848(1217): 4848(1217)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:38.093033 355572 usertrap_amd64.go:122] [ 4848(1217): 4848(1217)] Allocate a new trap: 0xc000e1ca20 37 D0318 16:20:38.093679 355572 usertrap_amd64.go:225] [ 4848(1217): 4848(1217)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:38.095720 355572 task_exit.go:204] [ 4845( 793): 4845( 793)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.095956 355572 task_signals.go:204] [ 4845( 793): 4849( 794)] Signal 9, PID: 4845, TID: 4849, fault addr: 0x0: terminating thread group D0318 16:20:38.096549 355572 task_exit.go:204] [ 4845( 793): 4849( 794)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.096724 355572 task_exit.go:204] [ 4845( 793): 4845( 793)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.097422 355572 usertrap_amd64.go:212] [ 4848(1217): 4848(1217)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:38.097491 355572 usertrap_amd64.go:122] [ 4848(1217): 4848(1217)] Allocate a new trap: 0xc000e1ca20 38 D0318 16:20:38.097591 355572 usertrap_amd64.go:225] [ 4848(1217): 4848(1217)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:38.105163 355572 task_exit.go:204] [ 4845( 793): 4849( 794)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.105339 355572 task_exit.go:204] [ 4845( 793): 4849( 794)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.105440 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:38.105696 355572 task_exit.go:204] [ 4845( 793): 4845( 793)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0xa, &(0x7f0000000000), 0x14) D0318 16:20:38.110198 355572 usertrap_amd64.go:212] [ 4848(1217): 4848(1217)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:38.110291 355572 usertrap_amd64.go:122] [ 4848(1217): 4848(1217)] Allocate a new trap: 0xc000e1ca20 39 D0318 16:20:38.110428 355572 usertrap_amd64.go:225] [ 4848(1217): 4848(1217)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:38.119456 355572 usertrap_amd64.go:212] [ 4848(1217): 4848(1217)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:38.119523 355572 usertrap_amd64.go:122] [ 4848(1217): 4848(1217)] Allocate a new trap: 0xc000e1ca20 40 D0318 16:20:38.119666 355572 usertrap_amd64.go:225] [ 4848(1217): 4848(1217)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:38.121175 355572 usertrap_amd64.go:212] [ 4848(1217): 4848(1217)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:38.121251 355572 usertrap_amd64.go:122] [ 4848(1217): 4848(1217)] Allocate a new trap: 0xc000e1ca20 41 D0318 16:20:38.121348 355572 usertrap_amd64.go:212] [ 4850( 115): 4850( 115)] Found the pattern at ip 55e9c2798860:sysno 109 D0318 16:20:38.121327 355572 usertrap_amd64.go:225] [ 4848(1217): 4848(1217)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:38.121472 355572 usertrap_amd64.go:122] [ 4850( 115): 4850( 115)] Allocate a new trap: 0xc000b768a0 36 D0318 16:20:38.121626 355572 usertrap_amd64.go:212] [ 4848(1217): 4851(1218)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:38.121706 355572 usertrap_amd64.go:122] [ 4848(1217): 4851(1218)] Allocate a new trap: 0xc000e1ca20 42 D0318 16:20:38.121776 355572 usertrap_amd64.go:225] [ 4848(1217): 4851(1218)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) D0318 16:20:38.122179 355572 usertrap_amd64.go:225] [ 4850( 115): 4850( 115)] Apply the binary patch addr 55e9c2798860 trap addr 60b40 ([184 109 0 0 0 15 5] -> [255 36 37 64 11 6 0]) D0318 16:20:38.123433 355572 usertrap_amd64.go:212] [ 4848(1217): 4848(1217)] Found the pattern at ip 562e85cf5c93:sysno 3 D0318 16:20:38.123511 355572 usertrap_amd64.go:122] [ 4848(1217): 4848(1217)] Allocate a new trap: 0xc000e1ca20 43 D0318 16:20:38.123599 355572 usertrap_amd64.go:225] [ 4848(1217): 4848(1217)] Apply the binary patch addr 562e85cf5c93 trap addr 66d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 109 6 0]) D0318 16:20:38.125332 355572 usertrap_amd64.go:212] [ 4850( 115): 4850( 115)] Found the pattern at ip 55e9c276c520:sysno 266 D0318 16:20:38.125455 355572 usertrap_amd64.go:122] [ 4850( 115): 4850( 115)] Allocate a new trap: 0xc000b768a0 37 D0318 16:20:38.125592 355572 usertrap_amd64.go:225] [ 4850( 115): 4850( 115)] Apply the binary patch addr 55e9c276c520 trap addr 60b90 ([184 10 1 0 0 15 5] -> [255 36 37 144 11 6 0]) D0318 16:20:38.128897 355572 task_exit.go:204] [ 4848(1217): 4848(1217)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.129557 355572 task_exit.go:204] [ 4848(1217): 4848(1217)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.129564 355572 task_signals.go:204] [ 4848(1217): 4851(1218)] Signal 9, PID: 4848, TID: 4851, fault addr: 0x0: terminating thread group D0318 16:20:38.129686 355572 task_exit.go:204] [ 4848(1217): 4851(1218)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.133645 355572 task_exit.go:204] [ 4848(1217): 4851(1218)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.133737 355572 task_exit.go:204] [ 4848(1217): 4851(1218)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.133962 355572 task_signals.go:443] [ 60( 1): 60( 1)] Discarding ignored signal 17 D0318 16:20:38.134122 355572 task_exit.go:204] [ 4848(1217): 4848(1217)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x3, &(0x7f0000000000), 0x14) D0318 16:20:38.135453 355572 usertrap_amd64.go:212] [ 4852( 795): 4852( 795)] Found the pattern at ip 55ca2d911860:sysno 109 D0318 16:20:38.135563 355572 usertrap_amd64.go:122] [ 4852( 795): 4852( 795)] Allocate a new trap: 0xc0002d2870 37 D0318 16:20:38.136353 355572 usertrap_amd64.go:225] [ 4852( 795): 4852( 795)] Apply the binary patch addr 55ca2d911860 trap addr 6ab90 ([184 109 0 0 0 15 5] -> [255 36 37 144 171 6 0]) D0318 16:20:38.140178 355572 usertrap_amd64.go:212] [ 4850( 115): 4850( 115)] Found the pattern at ip 55e9c2741ca2:sysno 14 D0318 16:20:38.140229 355572 usertrap_amd64.go:212] [ 4852( 795): 4852( 795)] Found the pattern at ip 55ca2d8e5520:sysno 266 D0318 16:20:38.140249 355572 usertrap_amd64.go:122] [ 4850( 115): 4850( 115)] Allocate a new trap: 0xc000b768a0 38 D0318 16:20:38.140383 355572 usertrap_amd64.go:225] [ 4850( 115): 4850( 115)] Apply the binary patch addr 55e9c2741ca2 trap addr 60be0 ([184 14 0 0 0 15 5] -> [255 36 37 224 11 6 0]) D0318 16:20:38.140301 355572 usertrap_amd64.go:122] [ 4852( 795): 4852( 795)] Allocate a new trap: 0xc0002d2870 38 D0318 16:20:38.140564 355572 usertrap_amd64.go:225] [ 4852( 795): 4852( 795)] Apply the binary patch addr 55ca2d8e5520 trap addr 6abe0 ([184 10 1 0 0 15 5] -> [255 36 37 224 171 6 0]) D0318 16:20:38.147376 355572 usertrap_amd64.go:212] [ 4850( 115): 4850( 115)] Found the pattern at ip 55e9c2798b92:sysno 435 D0318 16:20:38.147437 355572 usertrap_amd64.go:122] [ 4850( 115): 4850( 115)] Allocate a new trap: 0xc000b768a0 39 D0318 16:20:38.147519 355572 usertrap_amd64.go:225] [ 4850( 115): 4850( 115)] Apply the binary patch addr 55e9c2798b92 trap addr 60c30 ([184 179 1 0 0 15 5] -> [255 36 37 48 12 6 0]) D0318 16:20:38.148926 355572 usertrap_amd64.go:212] [ 4850( 115): 4850( 115)] Found the pattern at ip 55e9c2741c10:sysno 14 D0318 16:20:38.148990 355572 usertrap_amd64.go:122] [ 4850( 115): 4850( 115)] Allocate a new trap: 0xc000b768a0 40 D0318 16:20:38.149072 355572 usertrap_amd64.go:225] [ 4850( 115): 4850( 115)] Apply the binary patch addr 55e9c2741c10 trap addr 60c80 ([184 14 0 0 0 15 5] -> [255 36 37 128 12 6 0]) D0318 16:20:38.149444 355572 usertrap_amd64.go:212] [ 4850( 115): 4853( 116)] Found the pattern at ip 55e9c2741320:sysno 273 D0318 16:20:38.149542 355572 usertrap_amd64.go:122] [ 4850( 115): 4853( 116)] Allocate a new trap: 0xc000b768a0 41 D0318 16:20:38.149594 355572 usertrap_amd64.go:225] [ 4850( 115): 4853( 116)] Apply the binary patch addr 55e9c2741320 trap addr 60cd0 ([184 17 1 0 0 15 5] -> [255 36 37 208 12 6 0]) D0318 16:20:38.151984 355572 usertrap_amd64.go:212] [ 4850( 115): 4850( 115)] Found the pattern at ip 55e9c276bc93:sysno 3 D0318 16:20:38.152074 355572 usertrap_amd64.go:122] [ 4850( 115): 4850( 115)] Allocate a new trap: 0xc000b768a0 42 D0318 16:20:38.152150 355572 usertrap_amd64.go:225] [ 4850( 115): 4850( 115)] Apply the binary patch addr 55e9c276bc93 trap addr 60d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 13 6 0]) D0318 16:20:38.155499 355572 usertrap_amd64.go:212] [ 4852( 795): 4852( 795)] Found the pattern at ip 55ca2d8baca2:sysno 14 D0318 16:20:38.155576 355572 usertrap_amd64.go:122] [ 4852( 795): 4852( 795)] Allocate a new trap: 0xc0002d2870 39 D0318 16:20:38.155704 355572 usertrap_amd64.go:225] [ 4852( 795): 4852( 795)] Apply the binary patch addr 55ca2d8baca2 trap addr 6ac30 ([184 14 0 0 0 15 5] -> [255 36 37 48 172 6 0]) D0318 16:20:38.157180 355572 task_exit.go:204] [ 4850( 115): 4850( 115)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.157941 355572 task_exit.go:204] [ 4850( 115): 4850( 115)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.157930 355572 task_signals.go:204] [ 4850( 115): 4853( 116)] Signal 9, PID: 4850, TID: 4853, fault addr: 0x0: terminating thread group D0318 16:20:38.158075 355572 task_exit.go:204] [ 4850( 115): 4853( 116)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.158758 355572 usertrap_amd64.go:212] [ 4854(1219): 4854(1219)] Found the pattern at ip 562e85d22860:sysno 109 D0318 16:20:38.158870 355572 usertrap_amd64.go:122] [ 4854(1219): 4854(1219)] Allocate a new trap: 0xc000526d20 37 D0318 16:20:38.159498 355572 usertrap_amd64.go:225] [ 4854(1219): 4854(1219)] Apply the binary patch addr 562e85d22860 trap addr 66b90 ([184 109 0 0 0 15 5] -> [255 36 37 144 107 6 0]) D0318 16:20:38.162674 355572 usertrap_amd64.go:212] [ 4854(1219): 4854(1219)] Found the pattern at ip 562e85cf6520:sysno 266 D0318 16:20:38.162747 355572 usertrap_amd64.go:122] [ 4854(1219): 4854(1219)] Allocate a new trap: 0xc000526d20 38 D0318 16:20:38.162823 355572 usertrap_amd64.go:225] [ 4854(1219): 4854(1219)] Apply the binary patch addr 562e85cf6520 trap addr 66be0 ([184 10 1 0 0 15 5] -> [255 36 37 224 107 6 0]) D0318 16:20:38.163437 355572 task_exit.go:204] [ 4850( 115): 4853( 116)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.163514 355572 task_exit.go:204] [ 4850( 115): 4853( 116)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.163392 355572 usertrap_amd64.go:212] [ 4852( 795): 4852( 795)] Found the pattern at ip 55ca2d911b92:sysno 435 D0318 16:20:38.163595 355572 task_signals.go:443] [ 4304( 1): 4304( 1)] Discarding ignored signal 17 D0318 16:20:38.163661 355572 usertrap_amd64.go:122] [ 4852( 795): 4852( 795)] Allocate a new trap: 0xc0002d2870 40 D0318 16:20:38.163745 355572 usertrap_amd64.go:225] [ 4852( 795): 4852( 795)] Apply the binary patch addr 55ca2d911b92 trap addr 6ac80 ([184 179 1 0 0 15 5] -> [255 36 37 128 172 6 0]) D0318 16:20:38.165552 355572 task_exit.go:204] [ 4850( 115): 4850( 115)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.165557 355572 usertrap_amd64.go:212] [ 4852( 795): 4852( 795)] Found the pattern at ip 55ca2d8bac10:sysno 14 D0318 16:20:38.165684 355572 usertrap_amd64.go:122] [ 4852( 795): 4852( 795)] Allocate a new trap: 0xc0002d2870 41 D0318 16:20:38.165792 355572 usertrap_amd64.go:225] [ 4852( 795): 4852( 795)] Apply the binary patch addr 55ca2d8bac10 trap addr 6acd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 172 6 0]) D0318 16:20:38.165976 355572 usertrap_amd64.go:212] [ 4852( 795): 4855( 796)] Found the pattern at ip 55ca2d8ba320:sysno 273 D0318 16:20:38.166085 355572 usertrap_amd64.go:122] [ 4852( 795): 4855( 796)] Allocate a new trap: 0xc0002d2870 42 D0318 16:20:38.166169 355572 usertrap_amd64.go:225] [ 4852( 795): 4855( 796)] Apply the binary patch addr 55ca2d8ba320 trap addr 6ad20 ([184 17 1 0 0 15 5] -> [255 36 37 32 173 6 0]) 16:20:38 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x2}}) D0318 16:20:38.169098 355572 usertrap_amd64.go:212] [ 4852( 795): 4852( 795)] Found the pattern at ip 55ca2d8e4c93:sysno 3 D0318 16:20:38.169212 355572 usertrap_amd64.go:122] [ 4852( 795): 4852( 795)] Allocate a new trap: 0xc0002d2870 43 D0318 16:20:38.169351 355572 usertrap_amd64.go:225] [ 4852( 795): 4852( 795)] Apply the binary patch addr 55ca2d8e4c93 trap addr 6ad70 ([184 3 0 0 0 15 5] -> [255 36 37 112 173 6 0]) D0318 16:20:38.174680 355572 usertrap_amd64.go:212] [ 4854(1219): 4854(1219)] Found the pattern at ip 562e85ccbca2:sysno 14 D0318 16:20:38.174748 355572 usertrap_amd64.go:122] [ 4854(1219): 4854(1219)] Allocate a new trap: 0xc000526d20 39 D0318 16:20:38.174838 355572 usertrap_amd64.go:225] [ 4854(1219): 4854(1219)] Apply the binary patch addr 562e85ccbca2 trap addr 66c30 ([184 14 0 0 0 15 5] -> [255 36 37 48 108 6 0]) D0318 16:20:38.176582 355572 task_exit.go:204] [ 4852( 795): 4852( 795)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.176783 355572 task_signals.go:204] [ 4852( 795): 4855( 796)] Signal 9, PID: 4852, TID: 4855, fault addr: 0x0: terminating thread group D0318 16:20:38.177289 355572 task_exit.go:204] [ 4852( 795): 4852( 795)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.177470 355572 task_exit.go:204] [ 4852( 795): 4855( 796)] Transitioning from exit state TaskExitNone to TaskExitInitiated D0318 16:20:38.182544 355572 usertrap_amd64.go:212] [ 4854(1219): 4854(1219)] Found the pattern at ip 562e85d22b92:sysno 435 D0318 16:20:38.182640 355572 usertrap_amd64.go:122] [ 4854(1219): 4854(1219)] Allocate a new trap: 0xc000526d20 40 D0318 16:20:38.182704 355572 usertrap_amd64.go:225] [ 4854(1219): 4854(1219)] Apply the binary patch addr 562e85d22b92 trap addr 66c80 ([184 179 1 0 0 15 5] -> [255 36 37 128 108 6 0]) D0318 16:20:38.182938 355572 task_exit.go:204] [ 4852( 795): 4855( 796)] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0318 16:20:38.183018 355572 task_exit.go:204] [ 4852( 795): 4855( 796)] Transitioning from exit state TaskExitZombie to TaskExitDead D0318 16:20:38.183141 355572 task_signals.go:443] [ 1717( 1): 1717( 1)] Discarding ignored signal 17 D0318 16:20:38.183284 355572 task_exit.go:204] [ 4852( 795): 4852( 795)] Transitioning from exit state TaskExitZombie to TaskExitDead 16:20:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x5452, &(0x7f00000001c0)) D0318 16:20:38.184672 355572 usertrap_amd64.go:212] [ 4854(1219): 4854(1219)] Found the pattern at ip 562e85ccbc10:sysno 14 D0318 16:20:38.184731 355572 usertrap_amd64.go:122] [ 4854(1219): 4854(1219)] Allocate a new trap: 0xc000526d20 41 D0318 16:20:38.184862 355572 usertrap_amd64.go:225] [ 4854(1219): 4854(1219)] Apply the binary patch addr 562e85ccbc10 trap addr 66cd0 ([184 14 0 0 0 15 5] -> [255 36 37 208 108 6 0]) D0318 16:20:38.185084 355572 usertrap_amd64.go:212] [ 4854(1219): 4856(1220)] Found the pattern at ip 562e85ccb320:sysno 273 D0318 16:20:38.185148 355572 usertrap_amd64.go:122] [ 4854(1219): 4856(1220)] Allocate a new trap: 0xc000526d20 42 D0318 16:20:38.185223 355572 usertrap_amd64.go:225] [ 4854(1219): 4856(1220)] Apply the binary patch addr 562e85ccb320 trap addr 66d20 ([184 17 1 0 0 15 5] -> [255 36 37 32 109 6 0]) panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x1e21a36] goroutine 14021 gp=0xc001143880 m=24 mp=0xc000d80008 [running]: panic({0x312ce0?, 0x2827720?}) GOROOT/src/runtime/panic.go:779 +0x158 fp=0xc005bcf0c0 sp=0xc005bcf010 pc=0x1358318 runtime.panicmem(...) GOROOT/src/runtime/panic.go:261 runtime.sigpanic() GOROOT/src/runtime/signal_unix.go:881 +0x378 fp=0xc005bcf120 sp=0xc005bcf0c0 pc=0x1373578 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*endpoint).OnCorkOptionSet(0xc008cb6a08, 0x0) pkg/tcpip/transport/tcp/endpoint.go:1766 +0xb6 fp=0xc005bcf190 sp=0xc005bcf120 pc=0x1e21a36 gvisor.dev/gvisor/pkg/tcpip.(*SocketOptions).SetCorkOption(0xc008cb6f18, 0x0) pkg/tcpip/socketops.go:474 +0x66 fp=0xc005bcf1b0 sp=0xc005bcf190 pc=0x16d69a6 gvisor.dev/gvisor/pkg/sentry/socket/netstack.setSockOptTCP(0x0?, {0x833048, 0xc008766c30}, {0x7fd84e00d708, 0xc008cb6a08}, 0x3, {0xc008f633bc, 0x14, 0x1399b91?}) pkg/sentry/socket/netstack/netstack.go:2015 +0x425 fp=0xc005bcf250 sp=0xc005bcf1b0 pc=0x1ef1945 gvisor.dev/gvisor/pkg/sentry/socket/netstack.SetSockOpt(0xc008f62a88, {0x833048, 0xc008766c30}, {0x7fd84e00d708, 0xc008cb6a08}, 0x6, 0x3, {0xc008f633bc, 0x14, 0x90}) pkg/sentry/socket/netstack/netstack.go:1765 +0x196 fp=0xc005bcf2b0 sp=0xc005bcf250 pc=0x1eeed16 gvisor.dev/gvisor/pkg/sentry/socket/netstack.(*sock).SetSockOpt(0xc008766c30, 0xc008f62a88, 0x6, 0x3, {0xc008f633bc, 0x14, 0x90}) pkg/sentry/socket/netstack/netstack.go:611 +0x608 fp=0xc005bcf3d8 sp=0xc005bcf2b0 pc=0x1ee67e8 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.SetSockOpt(0xc008f62a88, 0xca?, {{0x3}, {0x6}, {0x3}, {0x20000000}, {0x14}, {0x0}}) pkg/sentry/syscalls/linux/sys_socket.go:551 +0x3b5 fp=0xc005bcf4f0 sp=0xc005bcf3d8 pc=0x1fb72b5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc008f62a88, 0x36, {{0x3}, {0x6}, {0x3}, {0x20000000}, {0x14}, {0x0}}) pkg/sentry/kernel/task_syscall.go:143 +0x995 fp=0xc005bcf938 sp=0xc005bcf4f0 pc=0x1d32e55 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc008f62a88, 0x36, {{0x3}, {0x6}, {0x3}, {0x20000000}, {0x14}, {0x0}}) pkg/sentry/kernel/task_syscall.go:323 +0x72 fp=0xc005bcf9e0 sp=0xc005bcf938 pc=0x1d34cb2 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc008f62a88, 0x36, {{0x3}, {0x6}, {0x3}, {0x20000000}, {0x14}, {0x0}}) pkg/sentry/kernel/task_syscall.go:283 +0x94 fp=0xc005bcfa50 sp=0xc005bcf9e0 pc=0x1d346b4 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc008f62a88) pkg/sentry/kernel/task_syscall.go:258 +0x4b0 fp=0xc005bcfb80 sp=0xc005bcfa50 pc=0x1d34250 gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc008f62a88?, 0xc008f62a88) pkg/sentry/kernel/task_run.go:263 +0x1fee fp=0xc005bcfe98 sp=0xc005bcfb80 pc=0x1d1dace gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc008f62a88, 0x12f8) pkg/sentry/kernel/task_run.go:98 +0x46d fp=0xc005bcffb0 sp=0xc005bcfe98 pc=0x1d1b14d gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.gowrap1() pkg/sentry/kernel/task_start.go:390 +0x45 fp=0xc005bcffe0 sp=0xc005bcffb0 pc=0x1d30985 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc005bcffe8 sp=0xc005bcffe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start in goroutine 13966 pkg/sentry/kernel/task_start.go:390 +0x1ae goroutine 1 gp=0xc0000061c0 m=nil [semacquire, 1 minutes]: runtime.gopark(0xc000635500?, 0xc000178120?, 0xe0?, 0x41?, 0xc000599118?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0005a70c0 sp=0xc0005a70a0 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.semacquire1(0xc000390120, 0x0, 0x1, 0x0, 0x12) GOROOT/src/runtime/sema.go:160 +0x225 fp=0xc0005a7128 sp=0xc0005a70c0 pc=0x13706e5 sync.runtime_Semacquire(0xc000390120?) GOROOT/src/runtime/sema.go:62 +0x25 fp=0xc0005a7160 sp=0xc0005a7128 pc=0x13920c5 sync.(*WaitGroup).Wait(0xc000390118) GOROOT/src/sync/waitgroup.go:116 +0xa5 fp=0xc0005a7190 sp=0xc0005a7160 pc=0x13aa865 gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1265 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc000664008) runsc/boot/loader.go:1297 +0x65 fp=0xc0005a71b8 sp=0xc0005a7190 pc=0x2503ea5 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc000002780, {0xc000232118?, 0x10?}, 0xc000404000, {0xc000436060, 0x2, 0x2752400?}) runsc/cmd/boot.go:507 +0x2ac5 fp=0xc0005a7bf0 sp=0xc0005a71b8 pc=0x26d0045 github.com/google/subcommands.(*Commander).Execute(0xc00026e000, {0x8129d0, 0x3821fc0}, {0xc000436060, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x684 fp=0xc0005a7ce0 sp=0xc0005a7bf0 pc=0x14a5224 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:221 +0x20f7 fp=0xc0005a7f38 sp=0xc0005a7ce0 pc=0x271f937 main.main() runsc/main.go:31 +0x1d fp=0xc0005a7f50 sp=0xc0005a7f38 pc=0x2720c9d runtime.main() GOROOT/src/runtime/proc.go:271 +0x29d fp=0xc0005a7fe0 sp=0xc0005a7f50 pc=0x135b9dd runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005a7fe8 sp=0xc0005a7fe0 pc=0x13968c1 goroutine 2 gp=0xc000006c40 m=nil [force gc (idle), 1 minutes]: runtime.gopark(0x285d590?, 0x2883b00?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00013c7a8 sp=0xc00013c788 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.forcegchelper() GOROOT/src/runtime/proc.go:326 +0xb3 fp=0xc00013c7e0 sp=0xc00013c7a8 pc=0x135bcb3 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00013c7e8 sp=0xc00013c7e0 pc=0x13968c1 created by runtime.init.6 in goroutine 1 GOROOT/src/runtime/proc.go:314 +0x1a goroutine 18 gp=0xc000182380 m=nil [GC sweep wait]: runtime.gopark(0x1?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000152f80 sp=0xc000152f60 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.bgsweep(0xc00018e000) GOROOT/src/runtime/mgcsweep.go:318 +0xdf fp=0xc000152fc8 sp=0xc000152f80 pc=0x134571f runtime.gcenable.gowrap1() GOROOT/src/runtime/mgc.go:203 +0x25 fp=0xc000152fe0 sp=0xc000152fc8 pc=0x133a045 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000152fe8 sp=0xc000152fe0 pc=0x13968c1 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:203 +0x66 goroutine 19 gp=0xc000182540 m=nil [GC scavenge wait]: runtime.gopark(0x10000?, 0xd8e44?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014cf78 sp=0xc00014cf58 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 runtime.(*scavengerState).park(0x2881a80) GOROOT/src/runtime/mgcscavenge.go:425 +0x49 fp=0xc00014cfa8 sp=0xc00014cf78 pc=0x13430e9 runtime.bgscavenge(0xc00018e000) GOROOT/src/runtime/mgcscavenge.go:658 +0x59 fp=0xc00014cfc8 sp=0xc00014cfa8 pc=0x1343679 runtime.gcenable.gowrap2() GOROOT/src/runtime/mgc.go:204 +0x25 fp=0xc00014cfe0 sp=0xc00014cfc8 pc=0x1339fe5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014cfe8 sp=0xc00014cfe0 pc=0x13968c1 created by runtime.gcenable in goroutine 1 GOROOT/src/runtime/mgc.go:204 +0xa5 goroutine 34 gp=0xc000202700 m=nil [finalizer wait, 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000284e20 sp=0xc000284e00 pc=0x135be4e runtime.runfinq() GOROOT/src/runtime/mfinal.go:194 +0x145 fp=0xc000284fe0 sp=0xc000284e20 pc=0x1339005 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000284fe8 sp=0xc000284fe0 pc=0x13968c1 created by runtime.createfing in goroutine 1 GOROOT/src/runtime/mfinal.go:164 +0x3d goroutine 35 gp=0xc00033ea80 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000283f50 sp=0xc000283f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000283fe0 sp=0xc000283f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000283fe8 sp=0xc000283fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 50 gp=0xc00028a000 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000282f50 sp=0xc000282f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000282fe0 sp=0xc000282f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000282fe8 sp=0xc000282fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 3 gp=0xc000007500 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0xc00018e000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000281f50 sp=0xc000281f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000281fe0 sp=0xc000281f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000281fe8 sp=0xc000281fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 36 gp=0xc00033ec40 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000280f50 sp=0xc000280f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000280fe0 sp=0xc000280f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000280fe8 sp=0xc000280fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 51 gp=0xc00028a1c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00037df50 sp=0xc00037df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00037dfe0 sp=0xc00037df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00037dfe8 sp=0xc00037dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 4 gp=0xc0000076c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00037cf50 sp=0xc00037cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00037cfe0 sp=0xc00037cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00037cfe8 sp=0xc00037cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 37 gp=0xc00033ee00 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00037bf50 sp=0xc00037bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00037bfe0 sp=0xc00037bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00037bfe8 sp=0xc00037bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 52 gp=0xc00028a380 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00037af50 sp=0xc00037af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00037afe0 sp=0xc00037af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00037afe8 sp=0xc00037afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 38 gp=0xc00033efc0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000379f50 sp=0xc000379f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000379fe0 sp=0xc000379f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000379fe8 sp=0xc000379fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 5 gp=0xc000007880 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000378f50 sp=0xc000378f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000378fe0 sp=0xc000378f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000378fe8 sp=0xc000378fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 53 gp=0xc00028a540 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000377f50 sp=0xc000377f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000377fe0 sp=0xc000377f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000377fe8 sp=0xc000377fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 39 gp=0xc00033f180 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000376f50 sp=0xc000376f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000376fe0 sp=0xc000376f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000376fe8 sp=0xc000376fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 6 gp=0xc000007a40 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000295f50 sp=0xc000295f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000295fe0 sp=0xc000295f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000295fe8 sp=0xc000295fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 54 gp=0xc00028a700 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000294f50 sp=0xc000294f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000294fe0 sp=0xc000294f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000294fe8 sp=0xc000294fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 7 gp=0xc000007c00 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000293f50 sp=0xc000293f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000293fe0 sp=0xc000293f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000293fe8 sp=0xc000293fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 55 gp=0xc00028a8c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000292f50 sp=0xc000292f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000292fe0 sp=0xc000292f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000292fe8 sp=0xc000292fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 40 gp=0xc00033f340 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000291f50 sp=0xc000291f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000291fe0 sp=0xc000291f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000291fe8 sp=0xc000291fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 41 gp=0xc00033f500 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000290f50 sp=0xc000290f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000290fe0 sp=0xc000290f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000290fe8 sp=0xc000290fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 8 gp=0xc000007dc0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00028ff50 sp=0xc00028ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00028ffe0 sp=0xc00028ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00028ffe8 sp=0xc00028ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 9 gp=0xc00053c000 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00028ef50 sp=0xc00028ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00028efe0 sp=0xc00028ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00028efe8 sp=0xc00028efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 10 gp=0xc00053c1c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000545f50 sp=0xc000545f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000545fe0 sp=0xc000545f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000545fe8 sp=0xc000545fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 11 gp=0xc00053c380 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000544f50 sp=0xc000544f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000544fe0 sp=0xc000544f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000544fe8 sp=0xc000544fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 12 gp=0xc00053c540 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000543f50 sp=0xc000543f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000543fe0 sp=0xc000543f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000543fe8 sp=0xc000543fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 42 gp=0xc00033f6c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000542f50 sp=0xc000542f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000542fe0 sp=0xc000542f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000542fe8 sp=0xc000542fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 13 gp=0xc00053c700 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000541f50 sp=0xc000541f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000541fe0 sp=0xc000541f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000541fe8 sp=0xc000541fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 20 gp=0xc000182700 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000540f50 sp=0xc000540f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000540fe0 sp=0xc000540f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000540fe8 sp=0xc000540fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 43 gp=0xc00033f880 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00053ff50 sp=0xc00053ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00053ffe0 sp=0xc00053ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00053ffe8 sp=0xc00053ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 21 gp=0xc0001828c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00053ef50 sp=0xc00053ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00053efe0 sp=0xc00053ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00053efe8 sp=0xc00053efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 14 gp=0xc00053c8c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000587f50 sp=0xc000587f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000587fe0 sp=0xc000587f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000587fe8 sp=0xc000587fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 44 gp=0xc00033fa40 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000586f50 sp=0xc000586f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000586fe0 sp=0xc000586f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000586fe8 sp=0xc000586fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 15 gp=0xc00053ca80 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000585f50 sp=0xc000585f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000585fe0 sp=0xc000585f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000585fe8 sp=0xc000585fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 45 gp=0xc00033fc00 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000584f50 sp=0xc000584f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000584fe0 sp=0xc000584f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000584fe8 sp=0xc000584fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 16 gp=0xc00053cc40 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000583f50 sp=0xc000583f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000583fe0 sp=0xc000583f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000583fe8 sp=0xc000583fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 22 gp=0xc000182a80 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000582f50 sp=0xc000582f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000582fe0 sp=0xc000582f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000582fe8 sp=0xc000582fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 46 gp=0xc00033fdc0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000581f50 sp=0xc000581f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000581fe0 sp=0xc000581f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000581fe8 sp=0xc000581fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 23 gp=0xc000182c40 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000580f50 sp=0xc000580f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000580fe0 sp=0xc000580f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000580fe8 sp=0xc000580fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 66 gp=0xc00053ce00 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00058ff50 sp=0xc00058ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00058ffe0 sp=0xc00058ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00058ffe8 sp=0xc00058ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 47 gp=0xc000590000 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00058ef50 sp=0xc00058ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00058efe0 sp=0xc00058ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00058efe8 sp=0xc00058efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 24 gp=0xc000182e00 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00058df50 sp=0xc00058df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00058dfe0 sp=0xc00058df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00058dfe8 sp=0xc00058dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 67 gp=0xc00053cfc0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00058cf50 sp=0xc00058cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00058cfe0 sp=0xc00058cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00058cfe8 sp=0xc00058cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 56 gp=0xc00028aa80 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00058bf50 sp=0xc00058bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00058bfe0 sp=0xc00058bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00058bfe8 sp=0xc00058bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 82 gp=0xc00036e000 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00058af50 sp=0xc00058af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00058afe0 sp=0xc00058af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00058afe8 sp=0xc00058afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 68 gp=0xc00053d180 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000589f50 sp=0xc000589f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000589fe0 sp=0xc000589f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000589fe8 sp=0xc000589fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 57 gp=0xc00028ac40 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000588f50 sp=0xc000588f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000588fe0 sp=0xc000588f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000588fe8 sp=0xc000588fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 58 gp=0xc00028ae00 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0xc00018e000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019ff50 sp=0xc00019ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019ffe0 sp=0xc00019ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019ffe8 sp=0xc00019ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 25 gp=0xc000182fc0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019ef50 sp=0xc00019ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019efe0 sp=0xc00019ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019efe8 sp=0xc00019efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 59 gp=0xc00028afc0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019df50 sp=0xc00019df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019dfe0 sp=0xc00019df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019dfe8 sp=0xc00019dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 26 gp=0xc000183180 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019cf50 sp=0xc00019cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019cfe0 sp=0xc00019cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019cfe8 sp=0xc00019cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 60 gp=0xc00028b180 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019bf50 sp=0xc00019bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019bfe0 sp=0xc00019bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019bfe8 sp=0xc00019bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 48 gp=0xc0005901c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00019af50 sp=0xc00019af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00019afe0 sp=0xc00019af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00019afe8 sp=0xc00019afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 61 gp=0xc00028b340 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000199f50 sp=0xc000199f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000199fe0 sp=0xc000199f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000199fe8 sp=0xc000199fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 49 gp=0xc000590380 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000198f50 sp=0xc000198f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000198fe0 sp=0xc000198f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000198fe8 sp=0xc000198fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 27 gp=0xc000183340 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a7f50 sp=0xc0001a7f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a7fe0 sp=0xc0001a7f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a7fe8 sp=0xc0001a7fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 83 gp=0xc00036e540 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a6f50 sp=0xc0001a6f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a6fe0 sp=0xc0001a6f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a6fe8 sp=0xc0001a6fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 98 gp=0xc000590540 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a5f50 sp=0xc0001a5f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a5fe0 sp=0xc0001a5f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a5fe8 sp=0xc0001a5fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 28 gp=0xc000183500 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a4f50 sp=0xc0001a4f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a4fe0 sp=0xc0001a4f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a4fe8 sp=0xc0001a4fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 99 gp=0xc000590700 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a3f50 sp=0xc0001a3f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a3fe0 sp=0xc0001a3f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a3fe8 sp=0xc0001a3fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 29 gp=0xc0001836c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a2f50 sp=0xc0001a2f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a2fe0 sp=0xc0001a2f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a2fe8 sp=0xc0001a2fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 84 gp=0xc00036e700 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a1f50 sp=0xc0001a1f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a1fe0 sp=0xc0001a1f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a1fe8 sp=0xc0001a1fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 62 gp=0xc00028b880 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0001a0f50 sp=0xc0001a0f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0001a0fe0 sp=0xc0001a0f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0001a0fe8 sp=0xc0001a0fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 114 gp=0xc000682000 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002a9f50 sp=0xc0002a9f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002a9fe0 sp=0xc0002a9f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002a9fe8 sp=0xc0002a9fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 85 gp=0xc00036e8c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002a8f50 sp=0xc0002a8f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002a8fe0 sp=0xc0002a8f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002a8fe8 sp=0xc0002a8fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 63 gp=0xc00028ba40 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002a7f50 sp=0xc0002a7f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002a7fe0 sp=0xc0002a7f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002a7fe8 sp=0xc0002a7fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 86 gp=0xc00036ea80 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002a6f50 sp=0xc0002a6f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002a6fe0 sp=0xc0002a6f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002a6fe8 sp=0xc0002a6fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 64 gp=0xc00028bc00 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x132d005?, 0x48?, 0x0?, 0xc5?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002a5f50 sp=0xc0002a5f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002a5fe0 sp=0xc0002a5f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002a5fe8 sp=0xc0002a5fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 87 gp=0xc00036ec40 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002a4f50 sp=0xc0002a4f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002a4fe0 sp=0xc0002a4f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002a4fe8 sp=0xc0002a4fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 115 gp=0xc0006821c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002a3f50 sp=0xc0002a3f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002a3fe0 sp=0xc0002a3f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002a3fe8 sp=0xc0002a3fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 116 gp=0xc000682380 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002a2f50 sp=0xc0002a2f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002a2fe0 sp=0xc0002a2f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002a2fe8 sp=0xc0002a2fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 65 gp=0xc00028bdc0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0xc00018e000?, 0x7f96e0?, 0x1?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000611f50 sp=0xc000611f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000611fe0 sp=0xc000611f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000611fe8 sp=0xc000611fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 88 gp=0xc00036ee00 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000610f50 sp=0xc000610f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000610fe0 sp=0xc000610f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000610fe8 sp=0xc000610fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 130 gp=0xc0002aa000 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060ff50 sp=0xc00060ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060ffe0 sp=0xc00060ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060ffe8 sp=0xc00060ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 131 gp=0xc0002aa1c0 m=nil [GC worker (idle), 1 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060ef50 sp=0xc00060ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060efe0 sp=0xc00060ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060efe8 sp=0xc00060efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 117 gp=0xc000682540 m=nil [GC worker (idle)]: runtime.gopark(0x4c61b0742bb0df?, 0x1?, 0x70?, 0xd0?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060df50 sp=0xc00060df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060dfe0 sp=0xc00060df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060dfe8 sp=0xc00060dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 89 gp=0xc00036efc0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x93?, 0x25?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060cf50 sp=0xc00060cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060cfe0 sp=0xc00060cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060cfe8 sp=0xc00060cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 132 gp=0xc0002aa380 m=nil [GC worker (idle)]: runtime.gopark(0x4c61afc6b356f5?, 0x1?, 0x8?, 0x9b?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060bf50 sp=0xc00060bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060bfe0 sp=0xc00060bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060bfe8 sp=0xc00060bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 90 gp=0xc00036f180 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xd?, 0x75?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00060af50 sp=0xc00060af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00060afe0 sp=0xc00060af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00060afe8 sp=0xc00060afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 118 gp=0xc000682700 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x66?, 0x45?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002b3f50 sp=0xc0002b3f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002b3fe0 sp=0xc0002b3f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002b3fe8 sp=0xc0002b3fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 133 gp=0xc0002aa540 m=nil [GC worker (idle)]: runtime.gopark(0x4c61b0742e5605?, 0x1?, 0xe3?, 0xe2?, 0x1?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002b2f50 sp=0xc0002b2f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002b2fe0 sp=0xc0002b2f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002b2fe8 sp=0xc0002b2fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 91 gp=0xc00036f340 m=nil [GC worker (idle)]: runtime.gopark(0x4c61b0742b8e6b?, 0x1?, 0xe0?, 0xc1?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002b1f50 sp=0xc0002b1f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002b1fe0 sp=0xc0002b1f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002b1fe8 sp=0xc0002b1fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 134 gp=0xc0002aa700 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x34?, 0xa2?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002b0f50 sp=0xc0002b0f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002b0fe0 sp=0xc0002b0f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002b0fe8 sp=0xc0002b0fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 119 gp=0xc0006828c0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xb5?, 0xde?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002aff50 sp=0xc0002aff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002affe0 sp=0xc0002aff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002affe8 sp=0xc0002affe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 135 gp=0xc0002aa8c0 m=nil [GC worker (idle)]: runtime.gopark(0x4c61b0742e6c8f?, 0x1?, 0xb?, 0xd2?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002aef50 sp=0xc0002aef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002aefe0 sp=0xc0002aef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002aefe8 sp=0xc0002aefe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 92 gp=0xc00036f500 m=nil [GC worker (idle)]: runtime.gopark(0x4c61afc6b347b9?, 0x1?, 0x0?, 0x46?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002adf50 sp=0xc0002adf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002adfe0 sp=0xc0002adf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002adfe8 sp=0xc0002adfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 120 gp=0xc000682a80 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x4c?, 0x51?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0002acf50 sp=0xc0002acf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc0002acfe0 sp=0xc0002acf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0002acfe8 sp=0xc0002acfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 136 gp=0xc0002aaa80 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x17?, 0xb5?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000621f50 sp=0xc000621f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000621fe0 sp=0xc000621f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000621fe8 sp=0xc000621fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 93 gp=0xc00036f6c0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xd?, 0x4e?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000620f50 sp=0xc000620f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000620fe0 sp=0xc000620f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000620fe8 sp=0xc000620fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 94 gp=0xc00036f880 m=nil [GC worker (idle)]: runtime.gopark(0x4c61b0742da453?, 0x1?, 0x2e?, 0x80?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061ff50 sp=0xc00061ff30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00061ffe0 sp=0xc00061ff50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061ffe8 sp=0xc00061ffe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 137 gp=0xc0002aac40 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xfd?, 0xb?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061ef50 sp=0xc00061ef30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00061efe0 sp=0xc00061ef50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061efe8 sp=0xc00061efe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 121 gp=0xc000682c40 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xdb?, 0x2c?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061df50 sp=0xc00061df30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00061dfe0 sp=0xc00061df50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061dfe8 sp=0xc00061dfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 95 gp=0xc00036fa40 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x17?, 0xd9?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061cf50 sp=0xc00061cf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00061cfe0 sp=0xc00061cf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061cfe8 sp=0xc00061cfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 138 gp=0xc0002aae00 m=nil [GC worker (idle)]: runtime.gopark(0x4c61b0742bcda9?, 0x1?, 0xed?, 0xca?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061bf50 sp=0xc00061bf30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00061bfe0 sp=0xc00061bf50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061bfe8 sp=0xc00061bfe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 122 gp=0xc000682e00 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x80?, 0x39?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00061af50 sp=0xc00061af30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc00061afe0 sp=0xc00061af50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00061afe8 sp=0xc00061afe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 139 gp=0xc0002aafc0 m=nil [GC worker (idle)]: runtime.gopark(0x4c61b0742d273f?, 0x1?, 0xb9?, 0x26?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000629f50 sp=0xc000629f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000629fe0 sp=0xc000629f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000629fe8 sp=0xc000629fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 96 gp=0xc00036fc00 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0xcc?, 0x2c?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000628f50 sp=0xc000628f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000628fe0 sp=0xc000628f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000628fe8 sp=0xc000628fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 123 gp=0xc000682fc0 m=nil [GC worker (idle)]: runtime.gopark(0x3823b00?, 0x1?, 0x17?, 0x72?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000627f50 sp=0xc000627f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000627fe0 sp=0xc000627f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000627fe8 sp=0xc000627fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 97 gp=0xc00036fdc0 m=nil [GC worker (idle)]: runtime.gopark(0x4c61b0742db4a7?, 0x1?, 0xb3?, 0x2?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000626f50 sp=0xc000626f30 pc=0x135be4e runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1310 +0xe5 fp=0xc000626fe0 sp=0xc000626f50 pc=0x133c125 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000626fe8 sp=0xc000626fe0 pc=0x13968c1 created by runtime.gcBgMarkStartWorkers in goroutine 1 GOROOT/src/runtime/mgc.go:1234 +0x1c goroutine 69 gp=0xc000183c00 m=nil [sync.Cond.Wait, 1 minutes]: runtime.gopark(0xc00014dcd8?, 0x13a854e?, 0x91?, 0x9b?, 0x1399bc9?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014dcb8 sp=0xc00014dc98 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc0002976d8, 0x0) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc00014dd08 sp=0xc00014dcb8 pc=0x1392439 sync.(*Cond).Wait(0xc0002976c8) GOROOT/src/sync/cond.go:70 +0x75 fp=0xc00014dd38 sp=0xc00014dd08 pc=0x13a6135 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000297008) pkg/sentry/pgalloc/pgalloc.go:1442 +0x174 fp=0xc00014ddf0 sp=0xc00014dd38 pc=0x19900b4 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000297008) pkg/sentry/pgalloc/pgalloc.go:1351 +0x72 fp=0xc00014dfc0 sp=0xc00014ddf0 pc=0x198f3f2 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:376 +0x34 fp=0xc00014dfe0 sp=0xc00014dfc0 pc=0x1987e34 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014dfe8 sp=0xc00014dfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:376 +0x4e7 goroutine 70 gp=0xc0002ab500 m=nil [chan receive]: runtime.gopark(0xc000173380?, 0x22b52c0?, 0x40?, 0x3f?, 0xc0012fe5a0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014eef8 sp=0xc00014eed8 pc=0x135be4e runtime.chanrecv(0xc00047c240, 0xc00014efc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x36d fp=0xc00014ef70 sp=0xc00014eef8 pc=0x13251ed runtime.chanrecv2(0xc000183dc0?, 0x34b880?) GOROOT/src/runtime/chan.go:447 +0x12 fp=0xc00014ef98 sp=0xc00014ef70 pc=0x1324e72 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:336 +0x5b fp=0xc00014efe0 sp=0xc00014ef98 pc=0x22b5bfb runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014efe8 sp=0xc00014efe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess in goroutine 1 pkg/sentry/platform/systrap/subprocess.go:333 +0x550 goroutine 100 gp=0xc00053d340 m=nil [sleep]: runtime.gopark(0x4c61b0dec43fec?, 0x1399bc9?, 0xb0?, 0x5f?, 0x16b7594?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000285f80 sp=0xc000285f60 pc=0x135be4e time.Sleep(0x61a80) GOROOT/src/runtime/time.go:195 +0x115 fp=0xc000285fc0 sp=0xc000285f80 pc=0x13930f5 gvisor.dev/gvisor/pkg/sentry/platform/systrap.controlFastPath() pkg/sentry/platform/systrap/metrics.go:263 +0x25 fp=0xc000285fe0 sp=0xc000285fc0 pc=0x22af865 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000285fe8 sp=0xc000285fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.New.func2 in goroutine 1 pkg/sentry/platform/systrap/systrap.go:346 +0x25 goroutine 101 gp=0xc00053d500 m=nil [sync.Cond.Wait]: runtime.gopark(0xc00014fcd8?, 0x13a854e?, 0x91?, 0x9b?, 0x1399bc9?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00014fcb8 sp=0xc00014fc98 pc=0x135be4e runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:408 sync.runtime_notifyListWait(0xc000180ed8, 0x2fe6) GOROOT/src/runtime/sema.go:569 +0x159 fp=0xc00014fd08 sp=0xc00014fcb8 pc=0x1392439 sync.(*Cond).Wait(0xc000180ec8) GOROOT/src/sync/cond.go:70 +0x75 fp=0xc00014fd38 sp=0xc00014fd08 pc=0x13a6135 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc000180808) pkg/sentry/pgalloc/pgalloc.go:1442 +0x174 fp=0xc00014fdf0 sp=0xc00014fd38 pc=0x19900b4 gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc000180808) pkg/sentry/pgalloc/pgalloc.go:1351 +0x72 fp=0xc00014ffc0 sp=0xc00014fdf0 pc=0x198f3f2 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.gowrap1() pkg/sentry/pgalloc/pgalloc.go:376 +0x34 fp=0xc00014ffe0 sp=0xc00014ffc0 pc=0x1987e34 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00014ffe8 sp=0xc00014ffe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile in goroutine 1 pkg/sentry/pgalloc/pgalloc.go:376 +0x4e7 goroutine 102 gp=0xc00053d6c0 m=nil [select]: runtime.gopark(0xc0007effb0?, 0x2?, 0x40?, 0x60?, 0xc0007eff04?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0007efd80 sp=0xc0007efd60 pc=0x135be4e runtime.selectgo(0xc0007effb0, 0xc0007eff00, 0x0?, 0x0, 0x0?, 0x1) GOROOT/src/runtime/select.go:327 +0x865 fp=0xc0007efed0 sp=0xc0007efd80 pc=0x136f3e5 gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater.func1() pkg/sentry/kernel/timekeeper.go:254 +0x2ba fp=0xc0007effe0 sp=0xc0007efed0 pc=0x1d4229a runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0007effe8 sp=0xc0007effe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Timekeeper).startUpdater in goroutine 1 pkg/sentry/kernel/timekeeper.go:224 +0x16d goroutine 103 gp=0xc00053d880 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a038?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000287de8 sp=0xc000287dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a038, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000287e18 sp=0xc000287de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a020, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000287e88 sp=0xc000287e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a020, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000287eb0 sp=0xc000287e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a008, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000287fb0 sp=0xc000287eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000287fe0 sp=0xc000287fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000287fe8 sp=0xc000287fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 104 gp=0xc00053da40 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a0c8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bede8 sp=0xc0004bedc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a0c8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004bee18 sp=0xc0004bede8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a0b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004bee88 sp=0xc0004bee18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a0b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004beeb0 sp=0xc0004bee88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a098, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004befb0 sp=0xc0004beeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004befe0 sp=0xc0004befb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004befe8 sp=0xc0004befe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 105 gp=0xc00053dc00 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a158?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000286de8 sp=0xc000286dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a158, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000286e18 sp=0xc000286de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a140, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000286e88 sp=0xc000286e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a140, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000286eb0 sp=0xc000286e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a128, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000286fb0 sp=0xc000286eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000286fe0 sp=0xc000286fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000286fe8 sp=0xc000286fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 106 gp=0xc00053ddc0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a1e8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000151de8 sp=0xc000151dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a1e8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000151e18 sp=0xc000151de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a1d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000151e88 sp=0xc000151e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a1d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000151eb0 sp=0xc000151e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a1b8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000151fb0 sp=0xc000151eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000151fe0 sp=0xc000151fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000151fe8 sp=0xc000151fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 107 gp=0xc0005908c0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a278?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bade8 sp=0xc0004badc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a278, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004bae18 sp=0xc0004bade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a260, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004bae88 sp=0xc0004bae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a260, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004baeb0 sp=0xc0004bae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a248, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004bafb0 sp=0xc0004baeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004bafe0 sp=0xc0004bafb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bafe8 sp=0xc0004bafe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 108 gp=0xc000590a80 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a308?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00070cde8 sp=0xc00070cdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a308, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00070ce18 sp=0xc00070cde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a2f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00070ce88 sp=0xc00070ce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a2f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00070ceb0 sp=0xc00070ce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a2d8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00070cfb0 sp=0xc00070ceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00070cfe0 sp=0xc00070cfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00070cfe8 sp=0xc00070cfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 109 gp=0xc000590c40 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a398?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bfde8 sp=0xc0004bfdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a398, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004bfe18 sp=0xc0004bfde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a380, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004bfe88 sp=0xc0004bfe18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a380, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004bfeb0 sp=0xc0004bfe88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a368, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004bffb0 sp=0xc0004bfeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004bffe0 sp=0xc0004bffb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bffe8 sp=0xc0004bffe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 110 gp=0xc000590e00 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a428?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000554de8 sp=0xc000554dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a428, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000554e18 sp=0xc000554de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a410, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000554e88 sp=0xc000554e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a410, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000554eb0 sp=0xc000554e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a3f8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000554fb0 sp=0xc000554eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000554fe0 sp=0xc000554fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000554fe8 sp=0xc000554fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 111 gp=0xc000590fc0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a4b8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000708de8 sp=0xc000708dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a4b8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000708e18 sp=0xc000708de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a4a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000708e88 sp=0xc000708e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a4a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000708eb0 sp=0xc000708e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a488, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000708fb0 sp=0xc000708eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000708fe0 sp=0xc000708fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000708fe8 sp=0xc000708fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 112 gp=0xc000591180 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a548?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000622de8 sp=0xc000622dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a548, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000622e18 sp=0xc000622de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a530, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000622e88 sp=0xc000622e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a530, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000622eb0 sp=0xc000622e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a518, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000622fb0 sp=0xc000622eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000622fe0 sp=0xc000622fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000622fe8 sp=0xc000622fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 113 gp=0xc000591340 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a5d8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000623de8 sp=0xc000623dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a5d8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000623e18 sp=0xc000623de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a5c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000623e88 sp=0xc000623e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a5c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000623eb0 sp=0xc000623e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a5a8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000623fb0 sp=0xc000623eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000623fe0 sp=0xc000623fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000623fe8 sp=0xc000623fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 146 gp=0xc000591500 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a668?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00056ade8 sp=0xc00056adc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a668, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00056ae18 sp=0xc00056ade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a650, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00056ae88 sp=0xc00056ae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a650, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00056aeb0 sp=0xc00056ae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a638, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00056afb0 sp=0xc00056aeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00056afe0 sp=0xc00056afb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00056afe8 sp=0xc00056afe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 147 gp=0xc0005916c0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a6f8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000558de8 sp=0xc000558dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a6f8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000558e18 sp=0xc000558de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a6e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000558e88 sp=0xc000558e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a6e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000558eb0 sp=0xc000558e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a6c8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000558fb0 sp=0xc000558eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000558fe0 sp=0xc000558fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000558fe8 sp=0xc000558fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 148 gp=0xc000591880 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a788?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000625de8 sp=0xc000625dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a788, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000625e18 sp=0xc000625de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a770, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000625e88 sp=0xc000625e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a770, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000625eb0 sp=0xc000625e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a758, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000625fb0 sp=0xc000625eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000625fe0 sp=0xc000625fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000625fe8 sp=0xc000625fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 149 gp=0xc000591a40 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a818?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000624de8 sp=0xc000624dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a818, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000624e18 sp=0xc000624de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a800, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000624e88 sp=0xc000624e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a800, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000624eb0 sp=0xc000624e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a7e8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000624fb0 sp=0xc000624eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000624fe0 sp=0xc000624fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000624fe8 sp=0xc000624fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 150 gp=0xc000591c00 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a8a8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000566de8 sp=0xc000566dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a8a8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000566e18 sp=0xc000566de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a890, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000566e88 sp=0xc000566e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a890, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000566eb0 sp=0xc000566e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a878, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000566fb0 sp=0xc000566eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000566fe0 sp=0xc000566fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000566fe8 sp=0xc000566fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 151 gp=0xc000591dc0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a938?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004c0de8 sp=0xc0004c0dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a938, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004c0e18 sp=0xc0004c0de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a920, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004c0e88 sp=0xc0004c0e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a920, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004c0eb0 sp=0xc0004c0e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a908, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004c0fb0 sp=0xc0004c0eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004c0fe0 sp=0xc0004c0fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004c0fe8 sp=0xc0004c0fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 152 gp=0xc000683180 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046a9c8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bcde8 sp=0xc0004bcdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046a9c8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004bce18 sp=0xc0004bcde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046a9b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004bce88 sp=0xc0004bce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046a9b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004bceb0 sp=0xc0004bce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046a998, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004bcfb0 sp=0xc0004bceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004bcfe0 sp=0xc0004bcfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bcfe8 sp=0xc0004bcfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 153 gp=0xc000683340 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046aa58?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000559de8 sp=0xc000559dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046aa58, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000559e18 sp=0xc000559de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046aa40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000559e88 sp=0xc000559e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046aa40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000559eb0 sp=0xc000559e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046aa28, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000559fb0 sp=0xc000559eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000559fe0 sp=0xc000559fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000559fe8 sp=0xc000559fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 154 gp=0xc000683500 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046aae8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bdde8 sp=0xc0004bddc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046aae8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004bde18 sp=0xc0004bdde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046aad0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004bde88 sp=0xc0004bde18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046aad0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004bdeb0 sp=0xc0004bde88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046aab8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004bdfb0 sp=0xc0004bdeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004bdfe0 sp=0xc0004bdfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bdfe8 sp=0xc0004bdfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 155 gp=0xc0006836c0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046ab78?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00059ede8 sp=0xc00059edc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046ab78, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00059ee18 sp=0xc00059ede8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046ab60, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00059ee88 sp=0xc00059ee18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046ab60, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00059eeb0 sp=0xc00059ee88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046ab48, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00059efb0 sp=0xc00059eeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00059efe0 sp=0xc00059efb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00059efe8 sp=0xc00059efe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 156 gp=0xc000683880 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046ac08?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00055ade8 sp=0xc00055adc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046ac08, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00055ae18 sp=0xc00055ade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046abf0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00055ae88 sp=0xc00055ae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046abf0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00055aeb0 sp=0xc00055ae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046abd8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00055afb0 sp=0xc00055aeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00055afe0 sp=0xc00055afb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00055afe8 sp=0xc00055afe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 157 gp=0xc000683a40 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046ac98?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000704de8 sp=0xc000704dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046ac98, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000704e18 sp=0xc000704de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046ac80, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000704e88 sp=0xc000704e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046ac80, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000704eb0 sp=0xc000704e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046ac68, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000704fb0 sp=0xc000704eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000704fe0 sp=0xc000704fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000704fe8 sp=0xc000704fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 158 gp=0xc000683c00 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046ad28?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004bbde8 sp=0xc0004bbdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046ad28, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004bbe18 sp=0xc0004bbde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046ad10, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004bbe88 sp=0xc0004bbe18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046ad10, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004bbeb0 sp=0xc0004bbe88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046acf8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004bbfb0 sp=0xc0004bbeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004bbfe0 sp=0xc0004bbfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004bbfe8 sp=0xc0004bbfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 159 gp=0xc000683dc0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046adb8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000568de8 sp=0xc000568dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046adb8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000568e18 sp=0xc000568de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046ada0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000568e88 sp=0xc000568e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046ada0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000568eb0 sp=0xc000568e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046ad88, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000568fb0 sp=0xc000568eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000568fe0 sp=0xc000568fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000568fe8 sp=0xc000568fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 160 gp=0xc000614380 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046ae48?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0004c1de8 sp=0xc0004c1dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046ae48, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0004c1e18 sp=0xc0004c1de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046ae30, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0004c1e88 sp=0xc0004c1e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046ae30, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0004c1eb0 sp=0xc0004c1e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046ae18, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0004c1fb0 sp=0xc0004c1eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0004c1fe0 sp=0xc0004c1fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0004c1fe8 sp=0xc0004c1fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 161 gp=0xc000614540 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046aed8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000714de8 sp=0xc000714dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046aed8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000714e18 sp=0xc000714de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046aec0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000714e88 sp=0xc000714e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046aec0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000714eb0 sp=0xc000714e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046aea8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000714fb0 sp=0xc000714eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000714fe0 sp=0xc000714fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000714fe8 sp=0xc000714fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 162 gp=0xc000614700 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046af68?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000710de8 sp=0xc000710dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046af68, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000710e18 sp=0xc000710de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046af50, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000710e88 sp=0xc000710e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046af50, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000710eb0 sp=0xc000710e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046af38, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000710fb0 sp=0xc000710eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000710fe0 sp=0xc000710fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000710fe8 sp=0xc000710fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 163 gp=0xc0006148c0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046aff8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000556de8 sp=0xc000556dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046aff8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000556e18 sp=0xc000556de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046afe0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000556e88 sp=0xc000556e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046afe0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000556eb0 sp=0xc000556e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046afc8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000556fb0 sp=0xc000556eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000556fe0 sp=0xc000556fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000556fe8 sp=0xc000556fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 164 gp=0xc000614a80 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b088?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00059bde8 sp=0xc00059bdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b088, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00059be18 sp=0xc00059bde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b070, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00059be88 sp=0xc00059be18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b070, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00059beb0 sp=0xc00059be88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b058, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00059bfb0 sp=0xc00059beb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00059bfe0 sp=0xc00059bfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00059bfe8 sp=0xc00059bfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 165 gp=0xc000614c40 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b118?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0005a0de8 sp=0xc0005a0dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b118, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0005a0e18 sp=0xc0005a0de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b100, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0005a0e88 sp=0xc0005a0e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b100, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0005a0eb0 sp=0xc0005a0e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b0e8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0005a0fb0 sp=0xc0005a0eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0005a0fe0 sp=0xc0005a0fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005a0fe8 sp=0xc0005a0fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 166 gp=0xc000614e00 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b1a8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00055bde8 sp=0xc00055bdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b1a8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00055be18 sp=0xc00055bde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b190, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00055be88 sp=0xc00055be18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b190, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00055beb0 sp=0xc00055be88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b178, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00055bfb0 sp=0xc00055beb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00055bfe0 sp=0xc00055bfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00055bfe8 sp=0xc00055bfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 167 gp=0xc000614fc0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b238?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00070dde8 sp=0xc00070ddc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b238, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00070de18 sp=0xc00070dde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b220, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00070de88 sp=0xc00070de18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b220, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00070deb0 sp=0xc00070de88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b208, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00070dfb0 sp=0xc00070deb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00070dfe0 sp=0xc00070dfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00070dfe8 sp=0xc00070dfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 168 gp=0xc000615180 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b2c8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00056bde8 sp=0xc00056bdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b2c8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00056be18 sp=0xc00056bde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b2b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00056be88 sp=0xc00056be18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b2b0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00056beb0 sp=0xc00056be88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b298, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00056bfb0 sp=0xc00056beb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00056bfe0 sp=0xc00056bfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00056bfe8 sp=0xc00056bfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 169 gp=0xc000615340 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b358?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000567de8 sp=0xc000567dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b358, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000567e18 sp=0xc000567de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b340, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000567e88 sp=0xc000567e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b340, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000567eb0 sp=0xc000567e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b328, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000567fb0 sp=0xc000567eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000567fe0 sp=0xc000567fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000567fe8 sp=0xc000567fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 170 gp=0xc000615500 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b3e8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00056cde8 sp=0xc00056cdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b3e8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00056ce18 sp=0xc00056cde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b3d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00056ce88 sp=0xc00056ce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b3d0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00056ceb0 sp=0xc00056ce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b3b8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00056cfb0 sp=0xc00056ceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00056cfe0 sp=0xc00056cfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00056cfe8 sp=0xc00056cfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 171 gp=0xc0006156c0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b478?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00059fde8 sp=0xc00059fdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b478, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00059fe18 sp=0xc00059fde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b460, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00059fe88 sp=0xc00059fe18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b460, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00059feb0 sp=0xc00059fe88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b448, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00059ffb0 sp=0xc00059feb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00059ffe0 sp=0xc00059ffb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00059ffe8 sp=0xc00059ffe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 172 gp=0xc000615880 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b508?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000555de8 sp=0xc000555dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b508, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000555e18 sp=0xc000555de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b4f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000555e88 sp=0xc000555e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b4f0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000555eb0 sp=0xc000555e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b4d8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000555fb0 sp=0xc000555eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000555fe0 sp=0xc000555fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000555fe8 sp=0xc000555fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 173 gp=0xc000615a40 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b598?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00056dde8 sp=0xc00056ddc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b598, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00056de18 sp=0xc00056dde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b580, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00056de88 sp=0xc00056de18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b580, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00056deb0 sp=0xc00056de88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b568, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00056dfb0 sp=0xc00056deb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00056dfe0 sp=0xc00056dfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00056dfe8 sp=0xc00056dfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 174 gp=0xc000615c00 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b628?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00059ade8 sp=0xc00059adc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b628, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00059ae18 sp=0xc00059ade8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b610, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00059ae88 sp=0xc00059ae18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b610, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00059aeb0 sp=0xc00059ae88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b5f8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00059afb0 sp=0xc00059aeb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00059afe0 sp=0xc00059afb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00059afe8 sp=0xc00059afe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 175 gp=0xc000615dc0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b6b8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000569de8 sp=0xc000569dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b6b8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000569e18 sp=0xc000569de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b6a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000569e88 sp=0xc000569e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b6a0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000569eb0 sp=0xc000569e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b688, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000569fb0 sp=0xc000569eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000569fe0 sp=0xc000569fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000569fe8 sp=0xc000569fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 176 gp=0xc00037e000 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b748?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00059cde8 sp=0xc00059cdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b748, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00059ce18 sp=0xc00059cde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b730, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00059ce88 sp=0xc00059ce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b730, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00059ceb0 sp=0xc00059ce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b718, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00059cfb0 sp=0xc00059ceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00059cfe0 sp=0xc00059cfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00059cfe8 sp=0xc00059cfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 177 gp=0xc00037e1c0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b7d8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000718de8 sp=0xc000718dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b7d8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000718e18 sp=0xc000718de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b7c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000718e88 sp=0xc000718e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b7c0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000718eb0 sp=0xc000718e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b7a8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000718fb0 sp=0xc000718eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000718fe0 sp=0xc000718fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000718fe8 sp=0xc000718fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 178 gp=0xc00037e380 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b868?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000700de8 sp=0xc000700dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b868, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000700e18 sp=0xc000700de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b850, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000700e88 sp=0xc000700e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b850, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000700eb0 sp=0xc000700e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b838, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000700fb0 sp=0xc000700eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000700fe0 sp=0xc000700fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000700fe8 sp=0xc000700fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 179 gp=0xc00037e540 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b8f8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000701de8 sp=0xc000701dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b8f8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000701e18 sp=0xc000701de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b8e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000701e88 sp=0xc000701e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b8e0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000701eb0 sp=0xc000701e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b8c8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000701fb0 sp=0xc000701eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000701fe0 sp=0xc000701fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000701fe8 sp=0xc000701fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 180 gp=0xc00037e700 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046b988?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000702de8 sp=0xc000702dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046b988, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000702e18 sp=0xc000702de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046b970, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000702e88 sp=0xc000702e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046b970, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000702eb0 sp=0xc000702e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b958, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000702fb0 sp=0xc000702eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000702fe0 sp=0xc000702fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000702fe8 sp=0xc000702fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 181 gp=0xc00037e8c0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046ba18?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000706de8 sp=0xc000706dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046ba18, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000706e18 sp=0xc000706de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046ba00, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000706e88 sp=0xc000706e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046ba00, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000706eb0 sp=0xc000706e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046b9e8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000706fb0 sp=0xc000706eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000706fe0 sp=0xc000706fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000706fe8 sp=0xc000706fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 182 gp=0xc00037ea80 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046baa8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc0005a1de8 sp=0xc0005a1dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046baa8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc0005a1e18 sp=0xc0005a1de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046ba90, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc0005a1e88 sp=0xc0005a1e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046ba90, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc0005a1eb0 sp=0xc0005a1e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046ba78, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc0005a1fb0 sp=0xc0005a1eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc0005a1fe0 sp=0xc0005a1fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc0005a1fe8 sp=0xc0005a1fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 183 gp=0xc00037ec40 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046bb38?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000707de8 sp=0xc000707dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046bb38, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000707e18 sp=0xc000707de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046bb20, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000707e88 sp=0xc000707e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046bb20, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000707eb0 sp=0xc000707e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046bb08, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000707fb0 sp=0xc000707eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000707fe0 sp=0xc000707fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000707fe8 sp=0xc000707fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 184 gp=0xc00037ee00 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046bbc8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00071cde8 sp=0xc00071cdc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046bbc8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00071ce18 sp=0xc00071cde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046bbb0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00071ce88 sp=0xc00071ce18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046bbb0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00071ceb0 sp=0xc00071ce88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046bb98, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00071cfb0 sp=0xc00071ceb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00071cfe0 sp=0xc00071cfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00071cfe8 sp=0xc00071cfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 185 gp=0xc00037efc0 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046bc58?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000705de8 sp=0xc000705dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046bc58, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000705e18 sp=0xc000705de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046bc40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000705e88 sp=0xc000705e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046bc40, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000705eb0 sp=0xc000705e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046bc28, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000705fb0 sp=0xc000705eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000705fe0 sp=0xc000705fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000705fe8 sp=0xc000705fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 186 gp=0xc00037f180 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046bce8?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc00059dde8 sp=0xc00059ddc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046bce8, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc00059de18 sp=0xc00059dde8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046bcd0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc00059de88 sp=0xc00059de18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046bcd0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc00059deb0 sp=0xc00059de88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046bcb8, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc00059dfb0 sp=0xc00059deb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc00059dfe0 sp=0xc00059dfb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc00059dfe8 sp=0xc00059dfe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 187 gp=0xc00037f340 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046bd78?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000703de8 sp=0xc000703dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046bd78, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000703e18 sp=0xc000703de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046bd60, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000703e88 sp=0xc000703e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046bd60, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000703eb0 sp=0xc000703e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046bd48, 0xc00040e318) pkg/tcpip/transport/tcp/dispatcher.go:287 +0x15d fp=0xc000703fb0 sp=0xc000703eb0 pc=0x1e1765d gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init.gowrap2() pkg/tcpip/transport/tcp/dispatcher.go:391 +0x45 fp=0xc000703fe0 sp=0xc000703fb0 pc=0x1e17fa5 runtime.goexit({}) src/runtime/asm_amd64.s:1695 +0x1 fp=0xc000703fe8 sp=0xc000703fe0 pc=0x13968c1 created by gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*dispatcher).init in goroutine 1 pkg/tcpip/transport/tcp/dispatcher.go:391 +0x217 goroutine 188 gp=0xc00037f500 m=nil [select, 1 minutes]: runtime.gopark(0x53f4e0?, 0xc00046be08?, 0x9?, 0x3?, 0x0?) GOROOT/src/runtime/proc.go:402 +0xce fp=0xc000709de8 sp=0xc000709dc8 pc=0x135be4e gvisor.dev/gvisor/pkg/sync.Gopark(0x53f4e0, 0xc00046be08, 0x9, 0x3, 0x0) pkg/sync/runtime_unsafe.go:33 +0x48 fp=0xc000709e18 sp=0xc000709de8 pc=0x151f708 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).nextWaker(0xc00046bdf0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:210 +0x10d fp=0xc000709e88 sp=0xc000709e18 pc=0x1de484d gvisor.dev/gvisor/pkg/sleep.(*Sleeper).fetch(0xc00046bdf0, 0x1, 0x0) pkg/sleep/sleep_unsafe.go:257 +0x33 fp=0xc000709eb0 sp=0xc000709e88 pc=0x1de4a13 gvisor.dev/gvisor/pkg/sleep.(*Sleeper).Fetch(...) pkg/sleep/sleep_unsafe.go:280 gvisor.dev/gvisor/pkg/tcpip/transport/tcp.(*processor).start(0xc00046bdd8, 0xc00040e318) pkg/t VM DIAGNOSIS: I0318 16:20:38.546142 359360 main.go:194] **************** gVisor **************** I0318 16:20:38.546306 359360 main.go:195] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 359360, PPID 971561, UID 0, GID 0 D0318 16:20:38.546336 359360 main.go:196] Page size: 0x1000 (4096 bytes) I0318 16:20:38.546385 359360 main.go:197] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0318 16:20:38.546451 359360 config.go:395] Platform: systrap I0318 16:20:38.546544 359360 config.go:396] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0318 16:20:38.546605 359360 config.go:397] FileAccess: shared / Directfs: true / Overlay: none I0318 16:20:38.546640 359360 config.go:398] Network: sandbox I0318 16:20:38.546677 359360 config.go:400] Debug: true. Strace: false, max size: 1024, syscalls: D0318 16:20:38.546735 359360 config.go:418] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root D0318 16:20:38.546800 359360 config.go:418] Config.Traceback (--traceback): system D0318 16:20:38.546826 359360 config.go:418] Config.Debug (--debug): true D0318 16:20:38.546873 359360 config.go:418] Config.LogFilename (--log): (empty) D0318 16:20:38.546908 359360 config.go:418] Config.LogFormat (--log-format): text D0318 16:20:38.546956 359360 config.go:418] Config.DebugLog (--debug-log): /dev/stderr D0318 16:20:38.547007 359360 config.go:418] Config.DebugToUserLog (--debug-to-user-log): false D0318 16:20:38.547033 359360 config.go:418] Config.DebugCommand (--debug-command): (empty) D0318 16:20:38.547048 359360 config.go:418] Config.PanicLog (--panic-log): (empty) D0318 16:20:38.547075 359360 config.go:418] Config.CoverageReport (--coverage-report): (empty) D0318 16:20:38.547101 359360 config.go:418] Config.DebugLogFormat (--debug-log-format): text D0318 16:20:38.547125 359360 config.go:418] Config.FileAccess (--file-access): shared D0318 16:20:38.547157 359360 config.go:418] Config.FileAccessMounts (--file-access-mounts): shared D0318 16:20:38.547182 359360 config.go:418] Config.Overlay (--overlay): false D0318 16:20:38.547206 359360 config.go:418] Config.Overlay2 (--overlay2): none D0318 16:20:38.547222 359360 config.go:418] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0318 16:20:38.547265 359360 config.go:418] Config.HostUDS (--host-uds): none D0318 16:20:38.547283 359360 config.go:418] Config.HostFifo (--host-fifo): none D0318 16:20:38.547307 359360 config.go:418] Config.Network (--network): sandbox D0318 16:20:38.547341 359360 config.go:418] Config.EnableRaw (--net-raw): true D0318 16:20:38.547364 359360 config.go:418] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0318 16:20:38.547380 359360 config.go:418] Config.HostGSO (--gso): false D0318 16:20:38.547402 359360 config.go:418] Config.GvisorGSO (--software-gso): true D0318 16:20:38.547427 359360 config.go:418] Config.GvisorGROTimeout (--gvisor-gro): 0s D0318 16:20:38.547452 359360 config.go:418] Config.TXChecksumOffload (--tx-checksum-offload): false D0318 16:20:38.547475 359360 config.go:418] Config.RXChecksumOffload (--rx-checksum-offload): true D0318 16:20:38.547499 359360 config.go:418] Config.QDisc (--qdisc): fifo D0318 16:20:38.547526 359360 config.go:418] Config.LogPackets (--log-packets): false D0318 16:20:38.547552 359360 config.go:418] Config.PCAP (--pcap-log): (empty) D0318 16:20:38.547573 359360 config.go:418] Config.Platform (--platform): systrap D0318 16:20:38.547589 359360 config.go:418] Config.PlatformDevicePath (--platform_device_path): (empty) D0318 16:20:38.547665 359360 config.go:418] Config.MetricServer (--metric-server): (empty) D0318 16:20:38.547700 359360 config.go:418] Config.ProfilingMetrics (--profiling-metrics): (empty) D0318 16:20:38.547722 359360 config.go:418] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0318 16:20:38.547761 359360 config.go:418] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0318 16:20:38.547791 359360 config.go:418] Config.Strace (--strace): false D0318 16:20:38.547806 359360 config.go:418] Config.StraceSyscalls (--strace-syscalls): (empty) D0318 16:20:38.547831 359360 config.go:418] Config.StraceLogSize (--strace-log-size): 1024 D0318 16:20:38.547847 359360 config.go:418] Config.StraceEvent (--strace-event): false D0318 16:20:38.547862 359360 config.go:420] Config.DisableSeccomp: false D0318 16:20:38.547877 359360 config.go:418] Config.EnableCoreTags (--enable-core-tags): false D0318 16:20:38.547908 359360 config.go:418] Config.WatchdogAction (--watchdog-action): panic D0318 16:20:38.547947 359360 config.go:418] Config.PanicSignal (--panic-signal): -1 D0318 16:20:38.547962 359360 config.go:418] Config.ProfileEnable (--profile): false D0318 16:20:38.547984 359360 config.go:418] Config.ProfileBlock (--profile-block): (empty) D0318 16:20:38.548000 359360 config.go:418] Config.ProfileCPU (--profile-cpu): (empty) D0318 16:20:38.548040 359360 config.go:418] Config.ProfileHeap (--profile-heap): (empty) D0318 16:20:38.548107 359360 config.go:418] Config.ProfileMutex (--profile-mutex): (empty) D0318 16:20:38.548168 359360 config.go:418] Config.TraceFile (--trace): (empty) D0318 16:20:38.548203 359360 config.go:420] Config.RestoreFile: (empty) D0318 16:20:38.548222 359360 config.go:418] Config.NumNetworkChannels (--num-network-channels): 3 D0318 16:20:38.548264 359360 config.go:418] Config.Rootless (--rootless): false D0318 16:20:38.548302 359360 config.go:418] Config.AlsoLogToStderr (--alsologtostderr): false D0318 16:20:38.548356 359360 config.go:418] Config.ReferenceLeak (--ref-leak-mode): disabled D0318 16:20:38.548385 359360 config.go:418] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0318 16:20:38.548412 359360 config.go:418] Config.AllowFlagOverride (--allow-flag-override): false D0318 16:20:38.548434 359360 config.go:418] Config.OCISeccomp (--oci-seccomp): false D0318 16:20:38.548466 359360 config.go:418] Config.IgnoreCgroups (--ignore-cgroups): false D0318 16:20:38.548496 359360 config.go:418] Config.SystemdCgroup (--systemd-cgroup): false D0318 16:20:38.548518 359360 config.go:418] Config.PodInitConfig (--pod-init-config): (empty) D0318 16:20:38.548550 359360 config.go:418] Config.BufferPooling (--buffer-pooling): true D0318 16:20:38.548587 359360 config.go:418] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0318 16:20:38.548622 359360 config.go:418] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0318 16:20:38.548653 359360 config.go:418] Config.FDLimit (--fdlimit): -1 D0318 16:20:38.548689 359360 config.go:418] Config.DCache (--dcache): -1 D0318 16:20:38.548714 359360 config.go:418] Config.IOUring (--iouring): false D0318 16:20:38.548759 359360 config.go:418] Config.DirectFS (--directfs): true D0318 16:20:38.548803 359360 config.go:418] Config.NVProxy (--nvproxy): false D0318 16:20:38.548829 359360 config.go:418] Config.NVProxyDocker (--nvproxy-docker): false D0318 16:20:38.548844 359360 config.go:418] Config.TPUProxy (--tpuproxy): false D0318 16:20:38.548866 359360 config.go:418] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): true D0318 16:20:38.548916 359360 config.go:418] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0318 16:20:38.548948 359360 config.go:418] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0318 16:20:38.548980 359360 config.go:420] Config.explicitlySet: (unexported) D0318 16:20:38.549011 359360 config.go:418] Config.ReproduceNAT (--reproduce-nat): false D0318 16:20:38.549034 359360 config.go:418] Config.ReproduceNftables (--reproduce-nftables): false D0318 16:20:38.549073 359360 config.go:418] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) I0318 16:20:38.549087 359360 main.go:199] **************** gVisor **************** W0318 16:20:38.549111 359360 main.go:214] Block the TERM signal. This is only safe in tests! D0318 16:20:38.549201 359360 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0318 16:20:38.554164 359360 util.go:51] Found sandbox "ci-gvisor-systrap-1-race-0", PID: 355572 Found sandbox "ci-gvisor-systrap-1-race-0", PID: 355572 I0318 16:20:38.554248 359360 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0318 16:20:38.554276 359360 sandbox.go:1355] Stacks sandbox "ci-gvisor-systrap-1-race-0" D0318 16:20:38.554301 359360 sandbox.go:613] Connecting to sandbox "ci-gvisor-systrap-1-race-0" W0318 16:20:38.554416 359360 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: connecting to control server at PID 355572: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: connecting to control server at PID 355572: connection refused W0318 16:20:38.554594 359360 main.go:235] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-0"]: exit status 128 I0318 16:20:38.546142 359360 main.go:194] **************** gVisor **************** I0318 16:20:38.546306 359360 main.go:195] Version 0.0.0, go1.22.0 X:nocoverageredesign, amd64, 96 CPUs, linux, PID 359360, PPID 971561, UID 0, GID 0 D0318 16:20:38.546336 359360 main.go:196] Page size: 0x1000 (4096 bytes) I0318 16:20:38.546385 359360 main.go:197] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-0] I0318 16:20:38.546451 359360 config.go:395] Platform: systrap I0318 16:20:38.546544 359360 config.go:396] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0318 16:20:38.546605 359360 config.go:397] FileAccess: shared / Directfs: true / Overlay: none I0318 16:20:38.546640 359360 config.go:398] Network: sandbox I0318 16:20:38.546677 359360 config.go:400] Debug: true. Strace: false, max size: 1024, syscalls: D0318 16:20:38.546735 359360 config.go:418] Config.RootDir (--root): /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root D0318 16:20:38.546800 359360 config.go:418] Config.Traceback (--traceback): system D0318 16:20:38.546826 359360 config.go:418] Config.Debug (--debug): true D0318 16:20:38.546873 359360 config.go:418] Config.LogFilename (--log): (empty) D0318 16:20:38.546908 359360 config.go:418] Config.LogFormat (--log-format): text D0318 16:20:38.546956 359360 config.go:418] Config.DebugLog (--debug-log): /dev/stderr D0318 16:20:38.547007 359360 config.go:418] Config.DebugToUserLog (--debug-to-user-log): false D0318 16:20:38.547033 359360 config.go:418] Config.DebugCommand (--debug-command): (empty) D0318 16:20:38.547048 359360 config.go:418] Config.PanicLog (--panic-log): (empty) D0318 16:20:38.547075 359360 config.go:418] Config.CoverageReport (--coverage-report): (empty) D0318 16:20:38.547101 359360 config.go:418] Config.DebugLogFormat (--debug-log-format): text D0318 16:20:38.547125 359360 config.go:418] Config.FileAccess (--file-access): shared D0318 16:20:38.547157 359360 config.go:418] Config.FileAccessMounts (--file-access-mounts): shared D0318 16:20:38.547182 359360 config.go:418] Config.Overlay (--overlay): false D0318 16:20:38.547206 359360 config.go:418] Config.Overlay2 (--overlay2): none D0318 16:20:38.547222 359360 config.go:418] Config.FSGoferHostUDS (--fsgofer-host-uds): false D0318 16:20:38.547265 359360 config.go:418] Config.HostUDS (--host-uds): none D0318 16:20:38.547283 359360 config.go:418] Config.HostFifo (--host-fifo): none D0318 16:20:38.547307 359360 config.go:418] Config.Network (--network): sandbox D0318 16:20:38.547341 359360 config.go:418] Config.EnableRaw (--net-raw): true D0318 16:20:38.547364 359360 config.go:418] Config.AllowPacketEndpointWrite (--TESTONLY-allow-packet-endpoint-write): false D0318 16:20:38.547380 359360 config.go:418] Config.HostGSO (--gso): false D0318 16:20:38.547402 359360 config.go:418] Config.GvisorGSO (--software-gso): true D0318 16:20:38.547427 359360 config.go:418] Config.GvisorGROTimeout (--gvisor-gro): 0s D0318 16:20:38.547452 359360 config.go:418] Config.TXChecksumOffload (--tx-checksum-offload): false D0318 16:20:38.547475 359360 config.go:418] Config.RXChecksumOffload (--rx-checksum-offload): true D0318 16:20:38.547499 359360 config.go:418] Config.QDisc (--qdisc): fifo D0318 16:20:38.547526 359360 config.go:418] Config.LogPackets (--log-packets): false D0318 16:20:38.547552 359360 config.go:418] Config.PCAP (--pcap-log): (empty) D0318 16:20:38.547573 359360 config.go:418] Config.Platform (--platform): systrap D0318 16:20:38.547589 359360 config.go:418] Config.PlatformDevicePath (--platform_device_path): (empty) D0318 16:20:38.547665 359360 config.go:418] Config.MetricServer (--metric-server): (empty) D0318 16:20:38.547700 359360 config.go:418] Config.ProfilingMetrics (--profiling-metrics): (empty) D0318 16:20:38.547722 359360 config.go:418] Config.ProfilingMetricsLog (--profiling-metrics-log): (empty) D0318 16:20:38.547761 359360 config.go:418] Config.ProfilingMetricsRate (--profiling-metrics-rate-us): 1000 D0318 16:20:38.547791 359360 config.go:418] Config.Strace (--strace): false D0318 16:20:38.547806 359360 config.go:418] Config.StraceSyscalls (--strace-syscalls): (empty) D0318 16:20:38.547831 359360 config.go:418] Config.StraceLogSize (--strace-log-size): 1024 D0318 16:20:38.547847 359360 config.go:418] Config.StraceEvent (--strace-event): false D0318 16:20:38.547862 359360 config.go:420] Config.DisableSeccomp: false D0318 16:20:38.547877 359360 config.go:418] Config.EnableCoreTags (--enable-core-tags): false D0318 16:20:38.547908 359360 config.go:418] Config.WatchdogAction (--watchdog-action): panic D0318 16:20:38.547947 359360 config.go:418] Config.PanicSignal (--panic-signal): -1 D0318 16:20:38.547962 359360 config.go:418] Config.ProfileEnable (--profile): false D0318 16:20:38.547984 359360 config.go:418] Config.ProfileBlock (--profile-block): (empty) D0318 16:20:38.548000 359360 config.go:418] Config.ProfileCPU (--profile-cpu): (empty) D0318 16:20:38.548040 359360 config.go:418] Config.ProfileHeap (--profile-heap): (empty) D0318 16:20:38.548107 359360 config.go:418] Config.ProfileMutex (--profile-mutex): (empty) D0318 16:20:38.548168 359360 config.go:418] Config.TraceFile (--trace): (empty) D0318 16:20:38.548203 359360 config.go:420] Config.RestoreFile: (empty) D0318 16:20:38.548222 359360 config.go:418] Config.NumNetworkChannels (--num-network-channels): 3 D0318 16:20:38.548264 359360 config.go:418] Config.Rootless (--rootless): false D0318 16:20:38.548302 359360 config.go:418] Config.AlsoLogToStderr (--alsologtostderr): false D0318 16:20:38.548356 359360 config.go:418] Config.ReferenceLeak (--ref-leak-mode): disabled D0318 16:20:38.548385 359360 config.go:418] Config.CPUNumFromQuota (--cpu-num-from-quota): false D0318 16:20:38.548412 359360 config.go:418] Config.AllowFlagOverride (--allow-flag-override): false D0318 16:20:38.548434 359360 config.go:418] Config.OCISeccomp (--oci-seccomp): false D0318 16:20:38.548466 359360 config.go:418] Config.IgnoreCgroups (--ignore-cgroups): false D0318 16:20:38.548496 359360 config.go:418] Config.SystemdCgroup (--systemd-cgroup): false D0318 16:20:38.548518 359360 config.go:418] Config.PodInitConfig (--pod-init-config): (empty) D0318 16:20:38.548550 359360 config.go:418] Config.BufferPooling (--buffer-pooling): true D0318 16:20:38.548587 359360 config.go:418] Config.XDP (--EXPERIMENTAL-xdp): {0 } D0318 16:20:38.548622 359360 config.go:418] Config.AFXDPUseNeedWakeup (--EXPERIMENTAL-xdp-need-wakeup): true D0318 16:20:38.548653 359360 config.go:418] Config.FDLimit (--fdlimit): -1 D0318 16:20:38.548689 359360 config.go:418] Config.DCache (--dcache): -1 D0318 16:20:38.548714 359360 config.go:418] Config.IOUring (--iouring): false D0318 16:20:38.548759 359360 config.go:418] Config.DirectFS (--directfs): true D0318 16:20:38.548803 359360 config.go:418] Config.NVProxy (--nvproxy): false D0318 16:20:38.548829 359360 config.go:418] Config.NVProxyDocker (--nvproxy-docker): false D0318 16:20:38.548844 359360 config.go:418] Config.TPUProxy (--tpuproxy): false D0318 16:20:38.548866 359360 config.go:418] Config.TestOnlyAllowRunAsCurrentUserWithoutChroot (--TESTONLY-unsafe-nonroot): true D0318 16:20:38.548916 359360 config.go:418] Config.TestOnlyTestNameEnv (--TESTONLY-test-name-env): (empty) D0318 16:20:38.548948 359360 config.go:418] Config.TestOnlyAFSSyscallPanic (--TESTONLY-afs-syscall-panic): false D0318 16:20:38.548980 359360 config.go:420] Config.explicitlySet: (unexported) D0318 16:20:38.549011 359360 config.go:418] Config.ReproduceNAT (--reproduce-nat): false D0318 16:20:38.549034 359360 config.go:418] Config.ReproduceNftables (--reproduce-nftables): false D0318 16:20:38.549073 359360 config.go:418] Config.TestOnlyAutosaveImagePath (--TESTONLY-autosave-image-path): (empty) I0318 16:20:38.549087 359360 main.go:199] **************** gVisor **************** W0318 16:20:38.549111 359360 main.go:214] Block the TERM signal. This is only safe in tests! D0318 16:20:38.549201 359360 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0318 16:20:38.554164 359360 util.go:51] Found sandbox "ci-gvisor-systrap-1-race-0", PID: 355572 Found sandbox "ci-gvisor-systrap-1-race-0", PID: 355572 I0318 16:20:38.554248 359360 util.go:51] Retrieving sandbox stacks Retrieving sandbox stacks D0318 16:20:38.554276 359360 sandbox.go:1355] Stacks sandbox "ci-gvisor-systrap-1-race-0" D0318 16:20:38.554301 359360 sandbox.go:613] Connecting to sandbox "ci-gvisor-systrap-1-race-0" W0318 16:20:38.554416 359360 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: connecting to control server at PID 355572: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-race-0" stacks: connecting to control server at PID 355572: connection refused W0318 16:20:38.554594 359360 main.go:235] Failure to execute command, err: 1 [21398059.468670] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398060.452820] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398061.122231] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398061.422229] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398064.120038] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398065.323679] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398065.568477] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398065.699841] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398069.133494] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398069.245468] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398069.611918] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398070.653220] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398071.929764] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398075.354630] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398078.375672] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398084.365188] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398085.503944] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398085.975525] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398089.660740] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398100.814762] exe[915525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398103.149891] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398108.126400] exe[915525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398109.727655] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398114.926120] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b097 di:ffffffffff600000 [21398115.326643] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398116.464738] exe[915485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398117.363072] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398118.107760] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398119.056651] exe[915487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b070 di:ffffffffff600000 [21398122.811183] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398126.709936] exe[915487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398128.976124] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398134.017772] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398138.986826] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398144.595270] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d6d321ab9 cs:33 sp:7faeecc31858 ax:0 si:563d6d37b062 di:ffffffffff600000 [21398147.740445] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe062 di:ffffffffff600000 [21398153.836628] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe097 di:ffffffffff600000 [21398154.429724] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe062 di:ffffffffff600000 [21398170.354252] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568abea4ab9 cs:33 sp:7fbf709c7858 ax:0 si:5568abefe062 di:ffffffffff600000 [21398178.833978] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398179.226311] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398194.626602] exe[915462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae097 di:ffffffffff600000 [21398200.237249] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398201.652049] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398207.656925] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398211.429069] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398211.585670] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398211.999123] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398213.090744] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398234.875538] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398236.383763] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398246.310888] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398246.880938] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555eb8754ab9 cs:33 sp:7ff1d95a2858 ax:0 si:555eb87ae062 di:ffffffffff600000 [21398250.215371] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398250.957948] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398254.226072] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398255.486365] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398260.434278] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398265.469418] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398269.051341] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398269.513840] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398271.673795] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398272.616789] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398273.924585] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398277.831892] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398286.091207] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398286.137692] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398288.818879] exe[915485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398291.251585] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398292.528986] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398293.177860] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398296.876293] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398297.547492] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398303.631253] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398307.056962] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398309.191658] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398309.256834] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398310.586312] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398316.366362] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398317.114740] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398318.757589] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398321.659757] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398324.031872] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398324.950021] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398326.802881] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398330.243521] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398334.305590] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398334.625216] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398336.307442] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398338.072993] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398342.348139] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398342.998434] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398344.165955] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398347.141159] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398347.996114] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398350.871793] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398351.358950] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398352.559626] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398355.862755] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398357.894524] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398359.037982] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398361.795239] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398365.856348] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398369.587949] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398369.853704] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398371.898448] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398372.115864] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda097 di:ffffffffff600000 [21398373.950137] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56206cc80ab9 cs:33 sp:7f18419fe858 ax:0 si:56206ccda062 di:ffffffffff600000 [21398380.153091] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaf45a9ab9 cs:33 sp:7f00730f4858 ax:0 si:55aaf4603062 di:ffffffffff600000 [21398382.247312] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaf45a9ab9 cs:33 sp:7f00730f4858 ax:0 si:55aaf4603062 di:ffffffffff600000 [21398388.417898] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398390.819601] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398391.851429] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398392.556223] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398395.937836] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398397.879860] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86097 di:ffffffffff600000 [21398410.692769] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398410.873139] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398414.429586] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5576c3d2cab9 cs:33 sp:7fd58e991858 ax:0 si:5576c3d86062 di:ffffffffff600000 [21398416.832172] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398417.769695] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398417.823843] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398418.987019] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d097 di:ffffffffff600000 [21398419.473838] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d097 di:ffffffffff600000 [21398420.029058] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398420.590705] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398421.664358] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398422.062997] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398423.355332] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d070 di:ffffffffff600000 [21398423.399659] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d4dae3ab9 cs:33 sp:7fc2c7c6b858 ax:0 si:561d4db3d062 di:ffffffffff600000 [21398435.438023] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398437.342008] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398437.775508] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398442.909284] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398447.142962] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e7db1e4ab9 cs:33 sp:7f4234316858 ax:0 si:55e7db23e062 di:ffffffffff600000 [21398449.414905] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398449.675703] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398452.943792] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1097 di:ffffffffff600000 [21398457.970324] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398458.895332] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398459.102871] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1097 di:ffffffffff600000 [21398460.653358] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398461.032711] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398469.852084] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1097 di:ffffffffff600000 [21398470.306389] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398471.635083] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398473.905666] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55907d287ab9 cs:33 sp:7f0941e37858 ax:0 si:55907d2e1062 di:ffffffffff600000 [21398482.377237] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a358614ab9 cs:33 sp:7f61d22e8858 ax:0 si:55a35866e062 di:ffffffffff600000 [21398483.473645] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a358614ab9 cs:33 sp:7f61d22e8858 ax:0 si:55a35866e062 di:ffffffffff600000 [21398490.798263] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c824d1ab9 cs:33 sp:7f9a08e89858 ax:0 si:564c8252b062 di:ffffffffff600000 [21398491.655735] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c824d1ab9 cs:33 sp:7f9a08e89858 ax:0 si:564c8252b062 di:ffffffffff600000 [21398493.644298] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c824d1ab9 cs:33 sp:7f9a08e89858 ax:0 si:564c8252b097 di:ffffffffff600000 [21398495.354436] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398495.575138] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398496.144003] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398496.384895] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398498.502754] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398506.566138] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398506.792158] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d097 di:ffffffffff600000 [21398512.025224] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398531.302715] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398534.970820] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398535.280932] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398543.585555] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398545.214698] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398546.360752] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398560.002814] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398561.384622] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398566.765734] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398568.382722] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398573.910780] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398578.592856] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398578.729631] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0a2923ab9 cs:33 sp:7f270a172858 ax:0 si:55d0a297d062 di:ffffffffff600000 [21398585.216202] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c070 di:ffffffffff600000 [21398585.367089] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398587.445412] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c097 di:ffffffffff600000 [21398592.713622] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398595.091456] exe[906368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398596.476278] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398597.609836] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c097 di:ffffffffff600000 [21398598.430066] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398605.961078] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398607.712645] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c070 di:ffffffffff600000 [21398609.806570] exe[915396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c097 di:ffffffffff600000 [21398610.415356] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398610.477826] exe[906413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398610.705753] exe[908724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398615.445433] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398615.690695] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398621.232556] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561527be2ab9 cs:33 sp:7f3036a8a858 ax:0 si:561527c3c062 di:ffffffffff600000 [21398626.661156] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55df1f57fab9 cs:33 sp:7f8da8a50858 ax:0 si:55df1f5d9062 di:ffffffffff600000 [21398630.483392] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398630.892451] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398639.672951] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398641.355657] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398642.977955] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398649.503938] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c097 di:ffffffffff600000 [21398654.613690] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398656.518746] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398666.979397] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398672.940849] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398673.373469] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560023c42ab9 cs:33 sp:7f853823e858 ax:0 si:560023c9c062 di:ffffffffff600000 [21398681.792107] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564701ea5ab9 cs:33 sp:7f8aaa8b5858 ax:0 si:564701eff062 di:ffffffffff600000 [21398682.106959] potentially unexpected fatal signal 11. [21398682.112304] CPU: 28 PID: 909380 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21398682.124303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21398682.133947] RIP: 0033:0x55681398537b [21398682.137962] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21398682.158516] RSP: 002b:00007f8b97ad7310 EFLAGS: 00010246 [21398682.165529] RAX: 00007f8b97ad7470 RBX: 00007f8b97ad7470 RCX: 0000000000000000 [21398682.174464] RDX: 00007f8036200060 RSI: 00007f8b97ad74c8 RDI: 00007f8b97ad74f0 [21398682.183403] RBP: 0000000000000000 R08: 00007f8036200060 R09: 0000556813af9f8c [21398682.192347] R10: 0000000000000003 R11: 00000000861c4acb R12: 0000556813af9f80 [21398682.201251] R13: 0000000000000fb1 R14: 0000556813af9f80 R15: 00007f8b97ad7418 [21398682.208818] FS: 000055681462a480 GS: 0000000000000000 [21398688.469808] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074e95ab9 cs:33 sp:7f018c76a858 ax:0 si:561074eef062 di:ffffffffff600000 [21398693.037605] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074e95ab9 cs:33 sp:7f018c76a858 ax:0 si:561074eef062 di:ffffffffff600000 [21398702.194713] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561074e95ab9 cs:33 sp:7f018c76a858 ax:0 si:561074eef062 di:ffffffffff600000 [21398710.043239] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398720.138552] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398726.118726] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398726.189979] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398726.646165] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398727.364473] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398730.909567] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398732.822003] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398738.484195] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398753.504467] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398755.454272] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398759.693842] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398759.876725] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c070 di:ffffffffff600000 [21398761.144052] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398766.354293] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c097 di:ffffffffff600000 [21398766.948637] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c097 di:ffffffffff600000 [21398770.526159] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398772.258971] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398775.267631] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398775.936585] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398777.605674] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398785.006056] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398787.272278] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c097 di:ffffffffff600000 [21398790.315248] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651ce702ab9 cs:33 sp:7f4bc1f66858 ax:0 si:5651ce75c062 di:ffffffffff600000 [21398795.006207] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e097 di:ffffffffff600000 [21398802.709150] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398803.152280] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398806.960399] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398813.442765] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e097 di:ffffffffff600000 [21398813.543113] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e062 di:ffffffffff600000 [21398813.588291] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e097 di:ffffffffff600000 [21398816.108351] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604d5644ab9 cs:33 sp:7fe75e101858 ax:0 si:5604d569e070 di:ffffffffff600000 [21398819.510701] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398822.086794] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398825.279353] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398827.875294] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398833.471502] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398834.007493] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398838.257933] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398841.568493] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398841.736517] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398844.289394] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d097 di:ffffffffff600000 [21398844.478750] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398845.084800] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d097 di:ffffffffff600000 [21398847.776510] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398852.854948] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398853.662208] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398855.796453] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398858.306851] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398858.992590] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398860.047102] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398867.837647] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398868.157084] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398869.159569] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398872.276511] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398872.516084] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d097 di:ffffffffff600000 [21398872.871370] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398880.544066] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad93f858 ax:0 si:56036391d062 di:ffffffffff600000 [21398882.615843] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398889.278068] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d062 di:ffffffffff600000 [21398891.327216] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603638c3ab9 cs:33 sp:7f60ad960858 ax:0 si:56036391d070 di:ffffffffff600000 [21398898.351531] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398899.643748] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398900.387933] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398905.131201] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398906.568340] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398907.062596] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398908.887368] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398910.039620] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398918.651580] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398922.763615] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398926.051639] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398926.965741] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398931.233754] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398933.516824] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398938.282766] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398938.510930] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398941.718603] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398951.421801] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398955.367753] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398964.774783] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398965.270411] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398965.793308] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398971.486799] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398971.748600] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398973.815991] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44097 di:ffffffffff600000 [21398973.974935] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398977.339076] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398981.906985] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555cbaeeaab9 cs:33 sp:7f2f802f6858 ax:0 si:555cbaf44062 di:ffffffffff600000 [21398987.076348] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398989.808064] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398998.778280] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398999.038186] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21398999.609367] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399007.952091] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399014.293434] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399017.195113] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9dd858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399017.993219] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399022.538759] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d097 di:ffffffffff600000 [21399023.539016] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d070 di:ffffffffff600000 [21399024.064283] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399032.398231] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399038.736236] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399040.711896] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399043.141077] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399043.320658] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399053.365757] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9dd858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399053.528291] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399054.209238] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399057.839233] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399059.242500] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d097 di:ffffffffff600000 [21399059.305399] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399059.835945] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3ee343ab9 cs:33 sp:7f5d3b9fe858 ax:0 si:55a3ee39d062 di:ffffffffff600000 [21399060.302776] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399062.273940] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399062.412432] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399065.348920] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399065.836985] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399068.992600] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399069.248037] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399077.389152] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399086.551390] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399087.302079] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399089.269778] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399090.747161] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399093.678934] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399104.558244] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399105.486050] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399107.430062] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399110.506404] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399130.767649] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399134.325405] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399134.630746] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399136.972718] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd097 di:ffffffffff600000 [21399137.143270] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399139.500776] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399147.308162] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399147.436491] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399149.607720] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399151.351347] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399153.803069] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399154.225697] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399155.047011] exe[909135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399155.833942] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399165.845832] exe[906374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399173.464281] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399177.155108] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637847a3ab9 cs:33 sp:7f7859abf858 ax:0 si:5637847fd062 di:ffffffffff600000 [21399180.613675] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399186.980096] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399189.987004] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d097 di:ffffffffff600000 [21399190.754030] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d097 di:ffffffffff600000 [21399191.095139] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399192.116478] exe[906361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399196.294677] potentially unexpected fatal signal 5. [21399196.299912] CPU: 28 PID: 885408 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399196.311911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399196.321541] RIP: 0033:0x7fffffffe062 [21399196.325616] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21399196.345046] RSP: 002b:000000c00079fb90 EFLAGS: 00000297 [21399196.350665] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21399196.358215] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21399196.365800] RBP: 000000c00079fc28 R08: 0000000000000000 R09: 0000000000000000 [21399196.374738] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00079fc18 [21399196.383691] R13: 000000c0006b5f20 R14: 000000c000183dc0 R15: 00000000000d5f38 [21399196.392621] FS: 000000c00013b098 GS: 0000000000000000 [21399200.924914] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399201.041167] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399203.423036] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55726d113ab9 cs:33 sp:7f101baae858 ax:0 si:55726d16d062 di:ffffffffff600000 [21399212.866385] exe[908726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399217.630931] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399218.390790] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399220.650383] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399220.915711] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399221.518377] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399223.339394] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399224.488421] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f456858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399224.998793] exe[906363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399227.546945] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2097 di:ffffffffff600000 [21399229.460700] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399234.888808] exe[915412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399236.072167] exe[937312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399240.012586] exe[956779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9966f4ab9 cs:33 sp:7ea3b8555858 ax:0 si:55c99674e062 di:ffffffffff600000 [21399240.663828] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f2f168ab9 cs:33 sp:7f3a9f477858 ax:0 si:556f2f1c2062 di:ffffffffff600000 [21399249.645510] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399253.931457] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399254.731181] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399260.717195] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399261.115293] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399268.721351] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399270.122457] potentially unexpected fatal signal 11. [21399270.127758] CPU: 26 PID: 951648 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399270.139748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399270.149372] RIP: 0033:0x5557bcd52a80 [21399270.153350] Code: 75 d8 4c 89 e7 e8 00 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 48 c7 05 [21399270.172558] RSP: 002b:00007f8d9e0d4440 EFLAGS: 00010246 [21399270.178223] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00005557bcd52e0d [21399270.185811] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 00005557bd9b4760 [21399270.194743] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21399270.203702] R10: 00005557bd9b4750 R11: 0000000000000246 R12: 0000000000000000 [21399270.212626] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21399270.221553] FS: 00005557bd9b4480 GS: 0000000000000000 [21399276.420819] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399278.667253] exe[906377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399279.685345] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399279.851553] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399280.137711] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399296.695975] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399296.940461] exe[956578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399297.616527] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399297.667318] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399302.127576] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399302.964924] exe[956578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399306.096773] exe[915407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399307.520031] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399308.341015] exe[928020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399317.260377] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399319.791665] exe[908729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399321.164678] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399322.882547] exe[906411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399323.140915] exe[915424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3070 di:ffffffffff600000 [21399323.875742] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399324.072451] exe[906658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399325.346682] exe[905333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3097 di:ffffffffff600000 [21399329.463261] exe[906407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399335.923837] exe[928042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebfc858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399336.311887] exe[906364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562000769ab9 cs:33 sp:7f378ebdb858 ax:0 si:5620007c3062 di:ffffffffff600000 [21399344.961236] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399347.269115] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399349.967714] exe[906409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399355.310746] exe[906652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399370.633200] exe[915418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90097 di:ffffffffff600000 [21399372.575499] exe[928051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ba0e36ab9 cs:33 sp:7f50f7f81858 ax:0 si:560ba0e90062 di:ffffffffff600000 [21399393.829970] exe[905508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399394.009671] exe[905356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399395.887831] exe[928043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399410.451276] exe[905508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399417.878270] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399418.189927] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399428.562115] exe[952772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399431.170662] exe[915411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399431.903956] exe[905597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399435.570559] exe[905565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399445.928136] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399447.329820] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399457.831724] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399460.681308] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1062 di:ffffffffff600000 [21399465.454483] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e6a067ab9 cs:33 sp:7f183fdfc858 ax:0 si:557e6a0c1097 di:ffffffffff600000 [21399471.470256] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd3d33ab9 cs:33 sp:7ff9c8b45858 ax:0 si:556fd3d8d062 di:ffffffffff600000 [21399471.957576] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd3d33ab9 cs:33 sp:7ff9c8b45858 ax:0 si:556fd3d8d062 di:ffffffffff600000 [21399481.118974] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399482.331198] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399484.263582] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399488.709041] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d097 di:ffffffffff600000 [21399491.094927] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399494.307349] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399495.569879] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399501.295848] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399508.951979] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399511.721391] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399517.796815] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399519.663252] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d070 di:ffffffffff600000 [21399524.464590] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399525.817562] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399531.992311] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399534.946173] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399535.794097] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399538.995823] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399541.298332] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399542.939719] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399543.525277] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399547.064117] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399547.611028] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399549.323477] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399552.156071] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399559.043889] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399569.932242] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a489633ab9 cs:33 sp:7f49b4720858 ax:0 si:55a48968d062 di:ffffffffff600000 [21399580.245121] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399582.416356] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba097 di:ffffffffff600000 [21399582.692839] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399585.863069] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399595.342932] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbcc760ab9 cs:33 sp:7f79b3af4858 ax:0 si:55fbcc7ba062 di:ffffffffff600000 [21399601.139307] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9c06d3ab9 cs:33 sp:7f86a29bb858 ax:0 si:55b9c072d062 di:ffffffffff600000 [21399603.729357] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9c06d3ab9 cs:33 sp:7f86a29bb858 ax:0 si:55b9c072d062 di:ffffffffff600000 [21399611.049638] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399613.219724] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399616.521352] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399625.870233] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399627.339355] exe[915516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399628.622866] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399629.820018] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399630.096202] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399633.755013] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399638.321565] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399639.606616] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399642.078994] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399645.440263] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399648.464012] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399653.127322] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399661.414583] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af097 di:ffffffffff600000 [21399665.892639] exe[915483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a15055ab9 cs:33 sp:7f8901e3e858 ax:0 si:561a150af062 di:ffffffffff600000 [21399667.731240] potentially unexpected fatal signal 5. [21399667.736591] CPU: 48 PID: 943669 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21399667.748584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21399667.758195] RIP: 0033:0x7fffffffe062 [21399667.762158] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21399667.781400] RSP: 002b:000000c0001dfb90 EFLAGS: 00000297 [21399667.787068] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21399667.796019] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21399667.804946] RBP: 000000c0001dfc28 R08: 0000000000000000 R09: 0000000000000000 [21399667.813874] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001dfc18 [21399667.822803] R13: 000000c0001cdf20 R14: 000000c0002d2540 R15: 00000000000e602b [21399667.830365] FS: 000000c000580098 GS: 0000000000000000 [21399670.736599] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399672.299353] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b55888858 ax:0 si:560494263097 di:ffffffffff600000 [21399677.175869] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263097 di:ffffffffff600000 [21399677.338143] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263097 di:ffffffffff600000 [21399680.790774] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399682.258589] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399682.695687] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560494209ab9 cs:33 sp:7f8b558a9858 ax:0 si:560494263062 di:ffffffffff600000 [21399696.346278] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399696.424588] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399697.722008] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399699.115785] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6097 di:ffffffffff600000 [21399700.269625] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cfd6cab9 cs:33 sp:7fd9175f4858 ax:0 si:55c5cfdc6062 di:ffffffffff600000 [21399709.360394] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399711.609643] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399714.276681] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399717.935817] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399725.258943] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399725.913226] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399730.481543] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399731.830888] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399734.760199] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399737.828482] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399737.877164] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399738.159386] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399747.593790] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399748.864602] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399749.389031] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399755.306022] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399760.273045] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399761.678984] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399762.194726] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399769.639869] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399774.176304] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399774.568845] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399775.876698] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e355d2bab9 cs:33 sp:7fe9f13fe858 ax:0 si:55e355d85062 di:ffffffffff600000 [21399780.700260] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399781.439600] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29070 di:ffffffffff600000 [21399781.574301] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399781.889933] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399784.328506] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399788.282433] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29062 di:ffffffffff600000 [21399800.444940] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560057bcfab9 cs:33 sp:7f57dfbfe858 ax:0 si:560057c29097 di:ffffffffff600000 [21399810.764150] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399810.872863] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399811.258678] exe[915572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399813.396152] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399823.666158] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399824.943269] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399825.002685] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727097 di:ffffffffff600000 [21399825.785587] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399827.998037] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621726cdab9 cs:33 sp:7efe46793858 ax:0 si:562172727062 di:ffffffffff600000 [21399831.811778] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736062 di:ffffffffff600000 [21399832.496978] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736097 di:ffffffffff600000 [21399833.890697] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776e6dcab9 cs:33 sp:7f52ee702858 ax:0 si:55776e736062 di:ffffffffff600000 [21399841.854827] exe[915469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399842.557399] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399847.198660] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399848.680239] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399849.719862] exe[915604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399850.761088] exe[924859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399852.118759] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399852.869143] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399854.091810] exe[915577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399855.394587] exe[933461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399857.283340] exe[915445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399860.654064] exe[915444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399867.652385] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399868.959124] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399871.210482] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399879.120138] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399882.745559] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399886.157885] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399891.386825] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25062 di:ffffffffff600000 [21399902.067359] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636acecbab9 cs:33 sp:7fe586e36858 ax:0 si:5636acf25097 di:ffffffffff600000 [21399912.170315] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399912.238663] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399915.103314] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399915.209832] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6d0257ab9 cs:33 sp:7efeceafc858 ax:0 si:55d6d02b1062 di:ffffffffff600000 [21399929.912955] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399929.968328] exe[952773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399931.265499] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399934.705360] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399935.210167] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399944.679296] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79097 di:ffffffffff600000 [21399945.836845] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399949.510426] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79097 di:ffffffffff600000 [21399949.617116] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399952.777859] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399953.117078] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399955.580339] exe[924880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560a87a1fab9 cs:33 sp:7f8d088aa858 ax:0 si:560a87a79062 di:ffffffffff600000 [21399955.976693] exe[915441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399956.757684] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399956.846057] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399958.660140] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5097 di:ffffffffff600000 [21399961.334210] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399962.566470] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399963.181402] exe[915439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cfdd55bab9 cs:33 sp:7fba9267a858 ax:0 si:55cfdd5b5062 di:ffffffffff600000 [21399968.101729] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399969.550254] exe[924832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399971.611650] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c23875ab9 cs:33 sp:7f1e55ecd858 ax:0 si:556c238cf062 di:ffffffffff600000 [21399976.495031] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399978.395878] exe[924830] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399980.162700] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399983.441542] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399984.490085] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399984.918294] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399992.365538] exe[936571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21399996.829233] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be86b7ab9 cs:33 sp:7f6d565a3858 ax:0 si:558be8711062 di:ffffffffff600000 [21400006.028020] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30097 di:ffffffffff600000 [21400006.386534] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400006.436553] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400010.090497] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400011.048368] exe[915575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400011.682588] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.049570] exe[915482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.367599] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400016.497971] exe[933440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400025.498886] exe[933382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400027.014174] exe[915569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400030.553012] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400030.944828] exe[915448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400034.182832] exe[934031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400036.973661] exe[915438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400039.319684] exe[915478] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab60ed6ab9 cs:33 sp:7fa3fdc91858 ax:0 si:55ab60f30062 di:ffffffffff600000 [21400107.653737] exe[959279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce0cacb237 cs:33 sp:7edbf24d5ef8 ax:2f700000 si:55ce0cb392f7 di:ffffffffff600000 [21400267.948866] potentially unexpected fatal signal 11. [21400267.954192] CPU: 82 PID: 980016 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21400267.966192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21400267.975839] RIP: 0033:0x55fa6b33e0e9 [21400267.979819] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21400267.999085] RSP: 002b:00007f894adaf448 EFLAGS: 00010213 [21400268.004733] RAX: 0000000000000016 RBX: 000055fa6b3883b9 RCX: 000055fa6b33e0d7 [21400268.012291] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f894adb05c0 [21400268.019860] RBP: 00007f894adb059c R08: 0000000027927554 R09: 00000000000000c8 [21400268.029415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f894adb05c0 [21400268.038331] R13: 000055fa6b3883b9 R14: 0000000000018912 R15: 0000000000000002 [21400268.045910] FS: 000055fa6bf9b480 GS: 0000000000000000 [21400358.896744] exe[963136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558de269ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10900000 [21400359.036532] exe[961057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c262addb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10900000 [21400919.035079] potentially unexpected fatal signal 5. [21400919.040305] CPU: 48 PID: 995945 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21400919.052327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21400919.061978] RIP: 0033:0x7fffffffe062 [21400919.066018] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21400919.086641] RSP: 002b:000000c0004cdb90 EFLAGS: 00000297 [21400919.093604] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21400919.102531] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000555d07c00000 [21400919.111559] RBP: 000000c0004cdc28 R08: 0000000000000000 R09: 0000000000000000 [21400919.120474] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004cdc18 [21400919.129433] R13: 000000c0004f2ab0 R14: 000000c0004ada40 R15: 00000000000f2a59 [21400919.138346] FS: 000000c000180098 GS: 0000000000000000 [21401651.886459] exe[988289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589e64d9ab9 cs:33 sp:7f53882d6858 ax:0 si:5589e6533062 di:ffffffffff600000 [21401950.865701] potentially unexpected fatal signal 5. [21401950.870946] CPU: 30 PID: 948115 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21401950.882962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21401950.892637] RIP: 0033:0x7fffffffe062 [21401950.896637] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21401950.917247] RSP: 002b:000000c0005c9b90 EFLAGS: 00000297 [21401950.924235] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21401950.933191] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21401950.942095] RBP: 000000c0005c9c28 R08: 0000000000000000 R09: 0000000000000000 [21401950.951037] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c9c18 [21401950.959929] R13: 000000c0005d3f50 R14: 000000c0001656c0 R15: 00000000000e4c60 [21401950.968874] FS: 000000c00013b098 GS: 0000000000000000 [21402267.266628] exe[928606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6abc2aab9 cs:33 sp:7f011d6f7ef8 ax:0 si:20000100 di:ffffffffff600000 [21402894.686778] exe[30428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b014ec1ab9 cs:33 sp:7fabd77fe858 ax:0 si:55b014f1b062 di:ffffffffff600000 [21402979.388559] exe[30319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5e4e10db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80800000 [21403385.838442] exe[40126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fc43c9ab9 cs:33 sp:7f88a3b75858 ax:0 si:560fc4423062 di:ffffffffff600000 [21404179.602119] exe[981064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563962c30ab9 cs:33 sp:7f8e9e0baef8 ax:0 si:20000100 di:ffffffffff600000 [21404468.042989] potentially unexpected fatal signal 11. [21404468.048308] CPU: 11 PID: 39799 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404468.060392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404468.070041] RIP: 0033:0x56451ecab0d0 [21404468.074091] Code: 68 05 00 00 00 e9 70 ff ff ff ff 25 8a 3f 15 00 68 18 00 00 00 e9 60 ff ff ff ff 25 82 3f 15 00 68 04 00 00 00 e9 50 ff ff ff 25 7a 3f 15 00 68 03 00 00 00 e9 40 ff ff ff ff 25 72 3f 15 00 [21404468.093328] RSP: 002b:00007feeb4061d78 EFLAGS: 00010246 [21404468.100893] RAX: 00007feeb4062480 RBX: 00007feeb40622e0 RCX: 0000000000000000 [21404468.109813] RDX: 00007feeb4062460 RSI: 0000000000000025 RDI: 000056451ed50390 [21404468.118817] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21404468.127801] R10: 0000000000000000 R11: 0000000000000246 R12: 000056451ed50390 [21404468.137074] R13: 00007feeb4062460 R14: 0000000000000000 R15: 00007feeb40622e0 [21404468.145984] FS: 000056451f962480 GS: 0000000000000000 [21404468.166362] potentially unexpected fatal signal 11. [21404468.173256] CPU: 75 PID: 46770 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404468.186581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404468.197641] RIP: 0033:0x55dd5d726a1f [21404468.203080] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [21404468.223654] RSP: 002b:00007f96ce12ed78 EFLAGS: 00010283 [21404468.230713] RAX: 0000000000000390 RBX: 00007f96ce12f2e0 RCX: 0000000000000000 [21404468.239683] RDX: 00007f96ce12f460 RSI: 0000000000000025 RDI: 000055dd5d786390 [21404468.248621] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21404468.257566] R10: 0000000000000000 R11: 0000000000000246 R12: 000055dd5d786390 [21404468.266491] R13: 00007f96ce12f460 R14: 0000000000000000 R15: 00007f96ce12f2e0 [21404468.275462] FS: 000055dd5e398480 GS: 0000000000000000 [21404584.235595] potentially unexpected fatal signal 5. [21404584.240865] CPU: 82 PID: 66986 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21404584.252794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21404584.262434] RIP: 0033:0x7fffffffe062 [21404584.266472] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21404584.285669] RSP: 002b:000000c0004a7b90 EFLAGS: 00000297 [21404584.291344] RAX: 0000563b2a8f9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21404584.300259] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 0000563b2a8f9000 [21404584.309268] RBP: 000000c0004a7c28 R08: 0000000000000009 R09: 000000000d2a5000 [21404584.318194] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0004a7c18 [21404584.327116] R13: 000000c000300f60 R14: 000000c000516540 R15: 000000000000ff63 [21404584.336066] FS: 000000c0004da098 GS: 0000000000000000 [21405224.403174] exe[72601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1d1dbaab9 cs:33 sp:7f81d8c3fef8 ax:0 si:200013c0 di:ffffffffff600000 [21405505.198744] exe[71092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405505.350332] exe[72807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.430998] exe[70529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.467104] exe[71643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377bc858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.470001] exe[70642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405505.590081] exe[72792] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.695080] exe[72807] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405505.910677] exe[72607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611059d9ab9 cs:33 sp:7fab31223858 ax:0 si:561105a33062 di:ffffffffff600000 [21405505.994240] exe[70639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae59accab9 cs:33 sp:7fe3377fe858 ax:0 si:55ae59b26062 di:ffffffffff600000 [21405506.075811] exe[70772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d08da72ab9 cs:33 sp:7f0a7dda8858 ax:0 si:55d08dacc062 di:ffffffffff600000 [21405671.605990] potentially unexpected fatal signal 5. [21405671.611224] CPU: 20 PID: 71114 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21405671.623132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21405671.632781] RIP: 0033:0x7fffffffe062 [21405671.636809] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21405671.656007] RSP: 002b:000000c000021b90 EFLAGS: 00000297 [21405671.663037] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21405671.670588] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21405671.678139] RBP: 000000c000021c28 R08: 0000000000000000 R09: 0000000000000000 [21405671.685678] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000021c18 [21405671.693331] R13: 000000c00002ab10 R14: 000000c000165a40 R15: 00000000000112ac [21405671.702265] FS: 000000c000180098 GS: 0000000000000000 [21406247.479852] warn_bad_vsyscall: 1 callbacks suppressed [21406247.479857] exe[61396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556a0d745db1 cs:33 sp:ffffffffff600010 ax:0 si:ffffffffff600010 di:0 [21406672.952160] exe[109753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5927a6db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:e8902000 [21406828.467490] exe[80436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2a2365237 cs:33 sp:7ea7c4160ef8 ax:2f700000 si:55e2a23d32f7 di:ffffffffff600000 [21406828.550975] exe[74205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fc2c8a237 cs:33 sp:7ec91270aef8 ax:2f700000 si:557fc2cf82f7 di:ffffffffff600000 [21407145.638672] potentially unexpected fatal signal 5. [21407145.643918] CPU: 20 PID: 117093 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21407145.655893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21407145.665526] RIP: 0033:0x7fffffffe062 [21407145.669556] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21407145.690119] RSP: 002b:000000c0005fbb90 EFLAGS: 00000297 [21407145.697155] RAX: 000055b7f414a000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21407145.706062] RDX: 0000000000000003 RSI: 0000000000001000 RDI: 000055b7f414a000 [21407145.714973] RBP: 000000c0005fbc28 R08: 0000000000000009 R09: 000000000b0da000 [21407145.723881] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0005fbc18 [21407145.732799] R13: 000000c00063ff50 R14: 000000c0004ae700 R15: 000000000001bf17 [21407145.741700] FS: 0000000001f6c6b0 GS: 0000000000000000 [21407309.151218] exe[93818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631cc65bab9 cs:33 sp:7f56ce496858 ax:0 si:5631cc6b5097 di:ffffffffff600000 [21407504.435163] exe[80267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b9755237 cs:33 sp:7fe0fc55eef8 ax:2f700000 si:55c5b97c32f7 di:ffffffffff600000 [21407609.119472] exe[74196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56169a068ab9 cs:33 sp:7eb34fbfe858 ax:0 si:56169a0c2097 di:ffffffffff600000 [21407609.185560] exe[79066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f03a21cab9 cs:33 sp:7ecb9a4ae858 ax:0 si:55f03a276097 di:ffffffffff600000 [21408173.940746] exe[144391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abfdfe2ab9 cs:33 sp:7ebf70245ef8 ax:0 si:20006dc0 di:ffffffffff600000 [21408233.874309] exe[108817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623a41c6ab9 cs:33 sp:7f76f606e858 ax:0 si:5623a4220062 di:ffffffffff600000 [21408238.236050] exe[152198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581b2b6fab9 cs:33 sp:7fe655250858 ax:0 si:5581b2bc9062 di:ffffffffff600000 [21409098.156763] potentially unexpected fatal signal 5. [21409098.161987] CPU: 11 PID: 163726 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409098.173956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409098.183568] RIP: 0033:0x7fffffffe062 [21409098.187566] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21409098.206771] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21409098.213816] RAX: 000055b2570a1000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21409098.222708] RDX: 0000000000000003 RSI: 000000000015f000 RDI: 000055b2570a1000 [21409098.231691] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000e258000 [21409098.240563] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21409098.249493] R13: 000000c000181008 R14: 000000c00058a380 R15: 00000000000152f5 [21409098.258406] FS: 00007f44d4ff96c0 GS: 0000000000000000 [21409098.366349] potentially unexpected fatal signal 11. [21409098.372055] CPU: 55 PID: 87102 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409098.385354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409098.396356] RIP: 0033:0x55a52f4900e9 [21409098.401710] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21409098.422284] RSP: 002b:00007f4b50abd448 EFLAGS: 00010213 [21409098.429359] RAX: 0000000000000016 RBX: 000055a52f4da3b9 RCX: 000055a52f4900d7 [21409098.438345] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f4b50abe5c0 [21409098.447262] RBP: 00007f4b50abe59c R08: 0000000028f1e7f8 R09: 0000000000001ab4 [21409098.456179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b50abe5c0 [21409098.465161] R13: 000055a52f4da3b9 R14: 000000000036ed1d R15: 0000000000000002 [21409098.474045] FS: 000055a5300ed480 GS: 0000000000000000 [21409178.283661] potentially unexpected fatal signal 5. [21409178.288914] CPU: 72 PID: 129276 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21409178.300910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21409178.310532] RIP: 0033:0x7fffffffe062 [21409178.314511] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21409178.333725] RSP: 002b:000000c000567b90 EFLAGS: 00000297 [21409178.339364] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21409178.346909] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21409178.354503] RBP: 000000c000567c28 R08: 0000000000000000 R09: 0000000000000000 [21409178.362046] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000567c18 [21409178.369606] R13: 000000c0005703c0 R14: 000000c0001c36c0 R15: 0000000000015df7 [21409178.377190] FS: 0000000001f6c6b0 GS: 0000000000000000 [21410695.578703] exe[209437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b195ebcab9 cs:33 sp:7f844f463ef8 ax:0 si:20000140 di:ffffffffff600000 [21410745.179272] exe[215759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8ef29fab9 cs:33 sp:7f7ddc9feef8 ax:0 si:20000140 di:ffffffffff600000 [21410847.804242] exe[217676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d5cdb6ab9 cs:33 sp:7ea0051ecef8 ax:0 si:20000140 di:ffffffffff600000 [21410918.586677] exe[225895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b67ec8bab9 cs:33 sp:7ff69cdfeef8 ax:0 si:20000140 di:ffffffffff600000 [21410939.443332] exe[231251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5592f94bdab9 cs:33 sp:7f6dcbd44ef8 ax:0 si:20000140 di:ffffffffff600000 [21410963.291288] exe[228003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616e0399ab9 cs:33 sp:7ee7e0fa2ef8 ax:0 si:20000140 di:ffffffffff600000 [21410977.914153] exe[234939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4ada35ab9 cs:33 sp:7ff625524ef8 ax:0 si:20000140 di:ffffffffff600000 [21411015.800054] exe[231292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639d0a9aab9 cs:33 sp:7fec5dc80ef8 ax:0 si:20000140 di:ffffffffff600000 [21411079.323173] exe[236966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642e4282ab9 cs:33 sp:7fce88b80ef8 ax:0 si:20000140 di:ffffffffff600000 [21412580.277588] exe[237259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5629192e4237 cs:33 sp:7eac6eea6ef8 ax:2f700000 si:5629193522f7 di:ffffffffff600000 [21413091.444697] exe[271381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e8a450ab9 cs:33 sp:7effb33feef8 ax:0 si:20000140 di:ffffffffff600000 [21413094.547093] exe[272360] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f3a9a1ab9 cs:33 sp:7f26beb25858 ax:0 si:558f3a9fb062 di:ffffffffff600000 [21413677.566332] potentially unexpected fatal signal 5. [21413677.571569] CPU: 27 PID: 283136 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21413677.583551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21413677.593215] RIP: 0033:0x7fffffffe062 [21413677.597206] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21413677.616461] RSP: 002b:000000c000605b90 EFLAGS: 00000297 [21413677.622093] RAX: 000055f510639000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21413677.629653] RDX: 0000000000000001 RSI: 00000000001c7000 RDI: 000055f510639000 [21413677.638585] RBP: 000000c000605c28 R08: 0000000000000009 R09: 0000000014b94000 [21413677.647527] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000605c18 [21413677.656441] R13: 000000c0005fe150 R14: 000000c00017c8c0 R15: 0000000000043406 [21413677.664021] FS: 0000000001f6c6b0 GS: 0000000000000000 [21413874.031603] exe[227076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a7c081237 cs:33 sp:7ed56a10eef8 ax:2f700000 si:563a7c0ef2f7 di:ffffffffff600000 [21414181.873992] potentially unexpected fatal signal 5. [21414181.879201] CPU: 93 PID: 230861 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21414181.891197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21414181.900818] RIP: 0033:0x7fffffffe062 [21414181.904788] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21414181.923967] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21414181.929583] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21414181.937128] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000056252a200000 [21414181.944723] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21414181.953634] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [21414181.961221] R13: 000000c00017c008 R14: 000000c000588540 R15: 0000000000037ab8 [21414181.970154] FS: 00007feeb4b5a6c0 GS: 0000000000000000 [21414226.844684] exe[234963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563733e07237 cs:33 sp:7f69d93faef8 ax:2f700000 si:563733e752f7 di:ffffffffff600000 [21414374.531922] exe[290459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3e9963ab9 cs:33 sp:7fb827593ef8 ax:0 si:20000140 di:ffffffffff600000 [21414467.498144] exe[300889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a855fa8ab9 cs:33 sp:7f4a31072858 ax:0 si:55a856002062 di:ffffffffff600000 [21414819.731107] exe[313252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572b4bc0ab9 cs:33 sp:7eeb93c37ef8 ax:0 si:20000040 di:ffffffffff600000 [21415079.281734] exe[327751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bcaae4ab9 cs:33 sp:7f9e03a34858 ax:0 si:555bcab3e097 di:ffffffffff600000 [21415470.366210] exe[299675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56495b2e3237 cs:33 sp:7eca0fe3def8 ax:2f700000 si:56495b3512f7 di:ffffffffff600000 [21415688.076592] exe[311738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564057a6fab9 cs:33 sp:7ec9287feef8 ax:0 si:20000140 di:ffffffffff600000 [21415914.905283] exe[272401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e08999ab9 cs:33 sp:7f4d913c5ef8 ax:0 si:20000140 di:ffffffffff600000 [21416086.539575] exe[343301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d6b353ab9 cs:33 sp:7f361c279858 ax:0 si:558d6b3ad097 di:ffffffffff600000 [21416313.855746] exe[334477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55648d88aab9 cs:33 sp:7fe1398a0ef8 ax:0 si:20000040 di:ffffffffff600000 [21416476.302322] exe[299449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f41ca43ab9 cs:33 sp:7ec7eb74a858 ax:0 si:55f41ca9d070 di:ffffffffff600000 [21416992.346108] exe[343445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b011ad237 cs:33 sp:7fc51cd48ef8 ax:2f700000 si:555b0121b2f7 di:ffffffffff600000 [21416995.013634] exe[289231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef52f3e237 cs:33 sp:7f82bfee5ef8 ax:2f700000 si:55ef52fac2f7 di:ffffffffff600000 [21417004.315615] exe[361033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4a783d237 cs:33 sp:7f9c19decef8 ax:2f700000 si:55e4a78ab2f7 di:ffffffffff600000 [21417052.468372] exe[343142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56153fba7ab9 cs:33 sp:7fd13f3ec858 ax:0 si:56153fc01062 di:ffffffffff600000 [21417053.386610] exe[348835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562422cb4ab9 cs:33 sp:7f00818ec858 ax:0 si:562422d0e062 di:ffffffffff600000 [21417279.378515] exe[355136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56319d6c2237 cs:33 sp:7f663831fef8 ax:2f700000 si:56319d7302f7 di:ffffffffff600000 [21417282.068540] exe[359128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56476ba3a237 cs:33 sp:7fc09bddbef8 ax:2f700000 si:56476baa82f7 di:ffffffffff600000 [21417354.242153] exe[309352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564824e0f237 cs:33 sp:7f4641071ef8 ax:2f700000 si:564824e7d2f7 di:ffffffffff600000 [21417358.958207] exe[298270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e2506b237 cs:33 sp:7ebc3c70fef8 ax:2f700000 si:564e250d92f7 di:ffffffffff600000 [21417367.533780] exe[343241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc91188237 cs:33 sp:7f31d5a32ef8 ax:2f700000 si:55fc911f62f7 di:ffffffffff600000 [21417378.708841] exe[323581] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a631963237 cs:33 sp:7ff60a738ef8 ax:2f700000 si:55a6319d12f7 di:ffffffffff600000 [21417394.174444] exe[343585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af4d139237 cs:33 sp:7ed3ddde9ef8 ax:2f700000 si:55af4d1a72f7 di:ffffffffff600000 [21417446.157077] exe[317577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5626fb3d9237 cs:33 sp:7ec69d503ef8 ax:2f700000 si:5626fb4472f7 di:ffffffffff600000 [21417645.408545] exe[337956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56547af11ab9 cs:33 sp:7f414cd6e858 ax:0 si:56547af6b062 di:ffffffffff600000 [21417665.879520] potentially unexpected fatal signal 5. [21417665.884749] CPU: 41 PID: 355852 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21417665.896750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21417665.906417] RIP: 0033:0x7fffffffe062 [21417665.910395] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21417665.929576] RSP: 002b:000000c0005cdb90 EFLAGS: 00000297 [21417665.935249] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21417665.944151] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21417665.951861] RBP: 000000c0005cdc28 R08: 0000000000000000 R09: 0000000000000000 [21417665.960783] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005cdc18 [21417665.968364] R13: 000000c0005e23c0 R14: 000000c000164a80 R15: 0000000000056cc2 [21417665.977303] FS: 0000000001f6c6b0 GS: 0000000000000000 [21417672.128457] potentially unexpected fatal signal 5. [21417672.133695] CPU: 94 PID: 356651 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21417672.145678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21417672.155405] RIP: 0033:0x7fffffffe062 [21417672.159470] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21417672.180022] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21417672.187098] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21417672.194717] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21417672.203644] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21417672.212532] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [21417672.221459] R13: 000000c000030b10 R14: 000000c0004cddc0 R15: 0000000000056cc3 [21417672.230396] FS: 000000c000580098 GS: 0000000000000000 [21417795.857646] exe[372952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0c1b74237 cs:33 sp:7fa71c89bef8 ax:2f700000 si:55e0c1be22f7 di:ffffffffff600000 [21417811.018308] exe[322365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a13dd237 cs:33 sp:7fd4ed19aef8 ax:2f700000 si:55d1a144b2f7 di:ffffffffff600000 [21418869.563407] potentially unexpected fatal signal 5. [21418869.568635] CPU: 84 PID: 400098 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418869.580633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418869.590266] RIP: 0033:0x7fffffffe062 [21418869.594253] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21418869.613440] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21418869.619084] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21418869.626670] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21418869.635703] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21418869.644638] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21418869.653678] R13: 000000c000030b10 R14: 000000c000492380 R15: 000000000005aaaa [21418869.662619] FS: 0000000001f6c6b0 GS: 0000000000000000 [21418882.881935] potentially unexpected fatal signal 11. [21418882.887258] CPU: 72 PID: 375225 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418882.899263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418882.908973] RIP: 0033:0x556abcfd4d97 [21418882.913013] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [21418882.933675] RSP: 002b:00007fd6c974bc90 EFLAGS: 00010206 [21418882.935443] potentially unexpected fatal signal 5. [21418882.939296] RAX: 00007fd6c974c500 RBX: 00007fd6c974c1f0 RCX: 0000000000000000 [21418882.945894] CPU: 6 PID: 372495 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21418882.945897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21418882.945905] RIP: 0033:0x7fffffffe062 [21418882.945908] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21418882.945909] RSP: 002b:000000c0005f9b90 EFLAGS: 00000297 [21418882.945911] RAX: 000000000006311e RBX: 0000000000000000 RCX: 00007fffffffe05a [21418882.945912] RDX: 0000000000000000 RSI: 000000c0005fa000 RDI: 0000000000012f00 [21418882.945913] RBP: 000000c0005f9c28 R08: 000000c000609a50 R09: 0000000000000000 [21418882.945914] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005f9c18 [21418882.945915] R13: 000000c000601f50 R14: 000000c0004c6a80 R15: 000000000005aab0 [21418882.945920] FS: 000000c000180098 GS: 0000000000000000 [21418882.954792] RDX: 00007fd6c974c370 RSI: 0000556abd0573d8 RDI: 00007fd6c974c1f0 [21418882.954794] RBP: 00007fd6c974c2e0 R08: 0000000000000000 R09: 0000000000000000 [21418882.954795] R10: 0000000000001000 R11: 0000000000000293 R12: 0000556abd0573d8 [21418882.954796] R13: 00007fd6c974c370 R14: 0000000000000000 R15: 00007fd6c974c1f0 [21418882.954798] FS: 0000556abdc6a480 GS: 0000000000000000 [21418920.255201] exe[387465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639567da237 cs:33 sp:7fe1f9554ef8 ax:2f700000 si:5639568482f7 di:ffffffffff600000 [21419227.581174] exe[413105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f6c104ab9 cs:33 sp:7f64497afef8 ax:0 si:20000040 di:ffffffffff600000 [21419227.714228] exe[390319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c763cbab9 cs:33 sp:7fd90e2feef8 ax:0 si:20000040 di:ffffffffff600000 [21419496.098609] exe[399043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563659024ab9 cs:33 sp:7fe944867858 ax:0 si:56365907e097 di:ffffffffff600000 [21419627.711405] exe[410343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651cffdc237 cs:33 sp:7f98a7d88ef8 ax:2f700000 si:5651d004a2f7 di:ffffffffff600000 [21419952.928000] exe[382306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560619adc237 cs:33 sp:7f801e926ef8 ax:2f700000 si:560619b4a2f7 di:ffffffffff600000 [21420135.989010] exe[379783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ee7e53ab9 cs:33 sp:7ff75390d858 ax:0 si:560ee7ead062 di:ffffffffff600000 [21420149.162911] exe[428734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8d5b17ab9 cs:33 sp:7f0de753a858 ax:0 si:55f8d5b71062 di:ffffffffff600000 [21420165.434399] exe[392340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557601ea6ab9 cs:33 sp:7fb25bd89858 ax:0 si:557601f00062 di:ffffffffff600000 [21420182.749924] exe[439583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56311a977ab9 cs:33 sp:7f629cdf6858 ax:0 si:56311a9d1062 di:ffffffffff600000 [21420186.574670] exe[272414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56146968cab9 cs:33 sp:7f365b6e1858 ax:0 si:5614696e6062 di:ffffffffff600000 [21420196.519938] exe[405618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5583eed66ab9 cs:33 sp:7f60ca22a858 ax:0 si:5583eedc0062 di:ffffffffff600000 [21420204.480305] exe[399868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608e9f55ab9 cs:33 sp:7ed736ce9858 ax:0 si:5608e9faf062 di:ffffffffff600000 [21420232.163961] exe[432620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd834f9ab9 cs:33 sp:7eada6122858 ax:0 si:55bd83553062 di:ffffffffff600000 [21420329.551403] exe[429279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da7f475ab9 cs:33 sp:7f354a725858 ax:0 si:55da7f4cf062 di:ffffffffff600000 [21420329.964186] exe[375874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557189982ab9 cs:33 sp:7fd2faada858 ax:0 si:5571899dc062 di:ffffffffff600000 [21420334.991102] exe[427890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563048d35ab9 cs:33 sp:7fd4a2c88858 ax:0 si:563048d8f062 di:ffffffffff600000 [21420349.544016] potentially unexpected fatal signal 5. [21420349.549265] CPU: 66 PID: 441220 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21420349.561260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21420349.570947] RIP: 0033:0x7fffffffe062 [21420349.574942] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21420349.595512] RSP: 002b:000000c000609b90 EFLAGS: 00000297 [21420349.602546] RAX: 0000557bf2c00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21420349.611481] RDX: 0000000000000001 RSI: 00000000000ef000 RDI: 0000557bf2c00000 [21420349.620409] RBP: 000000c000609c28 R08: 0000000000000009 R09: 0000000015b46000 [21420349.629368] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000609c18 [21420349.638329] R13: 000000c00040ee10 R14: 000000c000228540 R15: 000000000006a54e [21420349.645870] FS: 000000c00013a898 GS: 0000000000000000 [21420406.153110] exe[431787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565476397ab9 cs:33 sp:7ebd7759d858 ax:0 si:5654763f1062 di:ffffffffff600000 [21420479.492378] exe[443288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55805818aab9 cs:33 sp:7ef02d731858 ax:0 si:5580581e4062 di:ffffffffff600000 [21420659.373746] exe[442359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564a0308ab9 cs:33 sp:7ef018e96858 ax:0 si:5564a0362070 di:ffffffffff600000 [21421168.683021] exe[456523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56442ee92ab9 cs:33 sp:7f2a5a725ef8 ax:0 si:20000040 di:ffffffffff600000 [21421168.836524] exe[455536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b73da1ab9 cs:33 sp:7fc06c3c4ef8 ax:0 si:20000040 di:ffffffffff600000 [21421168.878803] exe[455534] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b73da1ab9 cs:33 sp:7fc06c3c4ef8 ax:0 si:20000040 di:ffffffffff600000 [21421667.104325] exe[472591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615d9d47ab9 cs:33 sp:7f627e1f7858 ax:0 si:5615d9da1062 di:ffffffffff600000 [21421935.874941] exe[473074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eec7bcab9 cs:33 sp:7fa9107a7858 ax:0 si:563eec816062 di:ffffffffff600000 [21422389.181534] potentially unexpected fatal signal 5. [21422389.186781] CPU: 75 PID: 476143 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21422389.198767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21422389.208385] RIP: 0033:0x7fffffffe062 [21422389.212380] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21422389.231586] RSP: 002b:000000c0005f1b90 EFLAGS: 00000297 [21422389.237305] RAX: 00007fb37088a000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21422389.244877] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007fb37088a000 [21422389.253818] RBP: 000000c0005f1c28 R08: 0000000000000009 R09: 00000000045e0000 [21422389.262744] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005f1c18 [21422389.271675] R13: 000000c0005f9f50 R14: 000000c000521dc0 R15: 0000000000070eab [21422389.280603] FS: 000000c000180098 GS: 0000000000000000 [21422714.122087] potentially unexpected fatal signal 5. [21422714.127525] CPU: 46 PID: 475747 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21422714.139553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21422714.149183] RIP: 0033:0x7fffffffe062 [21422714.153174] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21422714.172440] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21422714.179472] RAX: 0000563cb8b07000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21422714.188406] RDX: 0000000000000003 RSI: 0000000000065000 RDI: 0000563cb8b07000 [21422714.195965] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000c6ff000 [21422714.204894] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21422714.213825] R13: 0000000002883b00 R14: 000000c000478700 R15: 0000000000072300 [21422714.222794] FS: 0000000003ce43c0 GS: 0000000000000000 [21422781.815126] exe[480206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cca865fab9 cs:33 sp:7fa5b5798ef8 ax:0 si:20000100 di:ffffffffff600000 [21422781.862979] exe[473398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559370016ab9 cs:33 sp:7fea99afcef8 ax:0 si:20000100 di:ffffffffff600000 [21422782.432156] exe[501469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555858d47ab9 cs:33 sp:7f9ef4501ef8 ax:0 si:20000100 di:ffffffffff600000 [21422798.792530] exe[495270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d155300ab9 cs:33 sp:7f3b4d1feef8 ax:0 si:20000100 di:ffffffffff600000 [21422800.168510] exe[501598] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e93e360ab9 cs:33 sp:7ee4e6dfeef8 ax:0 si:20000100 di:ffffffffff600000 [21422886.598314] exe[492672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561375d88ab9 cs:33 sp:7f8c0c350858 ax:0 si:561375de2097 di:ffffffffff600000 [21423064.075030] exe[500036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580178e6ab9 cs:33 sp:7eab8c981ef8 ax:0 si:20000100 di:ffffffffff600000 [21423115.423770] exe[507029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56125d61bab9 cs:33 sp:7fda9b15def8 ax:0 si:20000100 di:ffffffffff600000 [21423245.610238] exe[492162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfa9c9bab9 cs:33 sp:7f8f23e9eef8 ax:0 si:20000100 di:ffffffffff600000 [21423253.973916] exe[503545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6c256ab9 cs:33 sp:7ead26e64ef8 ax:0 si:20000100 di:ffffffffff600000 [21423257.872556] exe[515379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e5fe17ab9 cs:33 sp:7f96765bcef8 ax:0 si:20000100 di:ffffffffff600000 [21423259.150903] exe[494752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f579554ab9 cs:33 sp:7f04f1882ef8 ax:0 si:20000100 di:ffffffffff600000 [21423260.857545] exe[515178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556ba768ab9 cs:33 sp:7f7be64ceef8 ax:0 si:20000100 di:ffffffffff600000 [21423774.494340] exe[533990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561211dc1ab9 cs:33 sp:7ff80f9feef8 ax:0 si:20000100 di:ffffffffff600000 [21423788.333423] exe[453563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d1b1d8ab9 cs:33 sp:7fb2138ab858 ax:0 si:558d1b232097 di:ffffffffff600000 [21424176.137134] exe[543495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d064b99237 cs:33 sp:7eac176f5ef8 ax:2f700000 si:55d064c072f7 di:ffffffffff600000 [21424359.943496] exe[539219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6f9d14ab9 cs:33 sp:7ef3b70ff858 ax:0 si:55b6f9d6e062 di:ffffffffff600000 [21424737.360543] potentially unexpected fatal signal 11. [21424737.365844] CPU: 50 PID: 535063 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21424737.371332] potentially unexpected fatal signal 11. [21424737.377836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21424737.383129] CPU: 15 PID: 531887 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21424737.383131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21424737.383136] RIP: 0033:0x55821dacb37b [21424737.383139] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21424737.383140] RSP: 002b:00007fa94f4d0310 EFLAGS: 00010246 [21424737.383141] RAX: 00007fa94f4d0470 RBX: 00007fa94f4d0470 RCX: 0000000000000000 [21424737.383142] RDX: 00007f7d64c000a8 RSI: 00007fa94f4d04d0 RDI: 00007fa94f4d04f0 [21424737.383142] RBP: 0000000000000000 R08: 00007f7d64c000a8 R09: 000055821dc3ff8c [21424737.383143] R10: 0000000000000004 R11: 00000000861c4adb R12: 000055821dc3ff80 [21424737.383144] R13: 0000000000000af9 R14: 000055821dc3ff80 R15: 00007fa94f4d0418 [21424737.383144] FS: 000055821e770480 GS: 0000000000000000 [21424737.494775] RIP: 0033:0x556cd89cc6ac [21424737.500170] Code: 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 89 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 fa 7f 07 c5 fa 7f 4c 17 f0 c3 66 0f 1f 84 00 00 00 00 00 48 8b [21424737.520729] RSP: 002b:00007f7d130ae308 EFLAGS: 00010206 [21424737.527710] RAX: 0000000020000100 RBX: 00007f7d130ae418 RCX: 00007fad42400000 [21424737.536646] RDX: 0000000000000013 RSI: 00007fad42400020 RDI: 0000000020000100 [21424737.545567] RBP: 0000000000000001 R08: 00007fad42800000 R09: 000000000000083c [21424737.553101] R10: 00ab42c8fa2b88ab R11: 00000000861c4adb R12: 00007fad42400000 [21424737.562021] R13: fffffffffffffffe R14: 00007fad42400000 R15: 00007fad42400008 [21424737.570958] FS: 0000556cd964a480 GS: 0000000000000000 [21424814.428219] exe[484275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c97c069ab9 cs:33 sp:7f7e21294858 ax:0 si:55c97c0c3097 di:ffffffffff600000 [21424879.096426] exe[553983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e3d8b0ab9 cs:33 sp:7ed196e35ef8 ax:0 si:20000100 di:ffffffffff600000 [21424909.191034] exe[533584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e069feab9 cs:33 sp:7f71852b9858 ax:0 si:555e06a58062 di:ffffffffff600000 [21424977.742936] exe[554425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ce7185ab9 cs:33 sp:7f3da09bbef8 ax:0 si:20000100 di:ffffffffff600000 [21425077.834799] potentially unexpected fatal signal 5. [21425077.840013] CPU: 46 PID: 472772 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21425077.851998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21425077.861649] RIP: 0033:0x7fffffffe062 [21425077.865630] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21425077.884864] RSP: 002b:000000c0007b7b90 EFLAGS: 00000297 [21425077.891873] RAX: 000056453acd9000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21425077.900803] RDX: 0000000000000003 RSI: 0000000000127000 RDI: 000056453acd9000 [21425077.909718] RBP: 000000c0007b7c28 R08: 0000000000000009 R09: 00000000104bc000 [21425077.918695] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0007b7c18 [21425077.927568] R13: 000000c0007c0b10 R14: 000000c0001b16c0 R15: 00000000000727c8 [21425077.936467] FS: 000000c000180098 GS: 0000000000000000 [21425179.152800] exe[481605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bf37d5ab9 cs:33 sp:7fd617363ef8 ax:0 si:20001080 di:ffffffffff600000 [21425260.659314] exe[565057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602369a4ab9 cs:33 sp:7ee53a0d2858 ax:0 si:5602369fe062 di:ffffffffff600000 [21425510.766958] potentially unexpected fatal signal 5. [21425510.772176] CPU: 26 PID: 569353 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21425510.784159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21425510.793829] RIP: 0033:0x7fffffffe062 [21425510.797817] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21425510.817044] RSP: 002b:000000c0007fbbe8 EFLAGS: 00000297 [21425510.822738] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21425510.831649] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21425510.839189] RBP: 000000c0007fbc80 R08: 0000000000000000 R09: 0000000000000000 [21425510.848259] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007fbc70 [21425510.857207] R13: 000000c00043b000 R14: 000000c000496fc0 R15: 0000000000074fc4 [21425510.866111] FS: 000000c00013a898 GS: 0000000000000000 [21425669.438140] exe[538951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561713bc3ab9 cs:33 sp:7f5319eb5858 ax:0 si:561713c1d062 di:ffffffffff600000 [21425672.977026] exe[539103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561713bc3ab9 cs:33 sp:7f5319eb5858 ax:0 si:561713c1d062 di:ffffffffff600000 [21425673.088074] exe[539103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561713bc3ab9 cs:33 sp:7f5319e94858 ax:0 si:561713c1d062 di:ffffffffff600000 [21426112.590278] potentially unexpected fatal signal 5. [21426112.595488] CPU: 95 PID: 544897 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21426112.607494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21426112.617283] RIP: 0033:0x7fffffffe062 [21426112.621259] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21426112.640544] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21426112.646224] RAX: 00007f81ef359000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21426112.655140] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007f81ef359000 [21426112.664066] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000baec000 [21426112.673030] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21426112.681944] R13: 0000000002883b00 R14: 000000c000582700 R15: 0000000000081dfa [21426112.690890] FS: 00000000052e33c0 GS: 0000000000000000 [21426378.945349] exe[589220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5f9c41db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30020000 [21426378.996648] exe[586911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec54de8db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30020000 [21426379.008138] exe[589115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec54de8db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30020000 [21426828.608820] exe[581221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579927f3ab9 cs:33 sp:7f1bb05d1858 ax:0 si:55799284d062 di:ffffffffff600000 [21427735.979112] exe[594404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55739392bab9 cs:33 sp:7ec64745f858 ax:0 si:557393985097 di:ffffffffff600000 [21427737.253852] potentially unexpected fatal signal 5. [21427737.259095] CPU: 90 PID: 542877 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21427737.271095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21427737.280736] RIP: 0033:0x7fffffffe062 [21427737.284763] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21427737.304013] RSP: 002b:000000c000209b90 EFLAGS: 00000297 [21427737.311022] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21427737.319957] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21427737.328889] RBP: 000000c000209c28 R08: 0000000000000000 R09: 0000000000000000 [21427737.338169] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000209c18 [21427737.347110] R13: 000000c0001b0b10 R14: 000000c00015ea80 R15: 0000000000084622 [21427737.356043] FS: 000000c00013b098 GS: 0000000000000000 [21428569.550553] potentially unexpected fatal signal 11. [21428569.555874] CPU: 25 PID: 608073 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21428569.567878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21428569.577520] RIP: 0033:0x564960a78a1f [21428569.581521] Code: 66 2e 0f 1f 84 00 00 00 00 00 90 c5 f9 6e c6 89 f8 25 ff 0f 00 00 c4 e2 7d 78 c0 c5 f1 ef c9 3d e0 0f 00 00 0f 87 91 01 00 00 fe 6f 17 c5 fd 74 da c5 f5 74 d2 c5 ed eb db c5 fd d7 c3 85 c0 [21428569.600827] RSP: 002b:00007f7d1eb7dd78 EFLAGS: 00010283 [21428569.606476] RAX: 0000000000000390 RBX: 00007f7d1eb7e2e0 RCX: 0000000000000000 [21428569.614075] RDX: 00007f7d1eb7e460 RSI: 0000000000000025 RDI: 0000564960ad8390 [21428569.623087] RBP: 00000000fbad8001 R08: 0000000000000000 R09: 0000000000000000 [21428569.630629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000564960ad8390 [21428569.639573] R13: 00007f7d1eb7e460 R14: 0000000000000000 R15: 00007f7d1eb7e2e0 [21428569.648536] FS: 00005649616ea480 GS: 0000000000000000 [21428694.433657] potentially unexpected fatal signal 5. [21428694.439009] CPU: 24 PID: 629512 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21428694.447321] potentially unexpected fatal signal 11. [21428694.450994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21428694.456298] CPU: 42 PID: 625503 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21428694.456300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21428694.456305] RIP: 0033:0x7fadfe9ed20b [21428694.456308] Code: 48 89 16 48 69 d2 00 ca 9a 3b 49 29 d0 4c 89 46 08 c3 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 53 48 89 fe 48 8d 0d f5 dd ff ff <48> 8b 39 83 e7 fe 48 8b 59 08 4c 8b 41 18 4c 8b 51 10 4c 8b 59 20 [21428694.456310] RSP: 002b:00007f7e572fb2d0 EFLAGS: 00010202 [21428694.456312] RAX: 0000000000000002 RBX: 0000000000000003 RCX: 00007fadfe9eb000 [21428694.456313] RDX: 0000001b2c220004 RSI: 00007f7e572fb2f0 RDI: 00007f7e572fb2f0 [21428694.456314] RBP: 0000000000000001 R08: 0000001b2c260000 R09: 0000000000000000 [21428694.456315] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [21428694.456316] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21428694.456317] FS: 00005584115ea480 GS: 0000000000000000 [21428694.561033] RIP: 0033:0x7fffffffe062 [21428694.565046] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21428694.585621] RSP: 002b:000000c0005dbb90 EFLAGS: 00000297 [21428694.592643] RAX: 00007f438d0b5000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21428694.601586] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f438d0b5000 [21428694.610508] RBP: 000000c0005dbc28 R08: 0000000000000009 R09: 0000000006df9000 [21428694.619458] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005dbc18 [21428694.628371] R13: 000000c0005e5f50 R14: 000000c000160fc0 R15: 00000000000988da [21428694.637276] FS: 0000000001f6c6b0 GS: 0000000000000000 [21429188.677114] exe[642538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67de227ef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.785521] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.805062] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.824531] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.844626] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.864681] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.886689] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.910230] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.931177] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429191.951547] exe[649721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfcc3aeab9 cs:33 sp:7f67dd5feef8 ax:0 si:20000080 di:ffffffffff600000 [21429933.425603] warn_bad_vsyscall: 24 callbacks suppressed [21429933.425607] exe[640758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a86f9cab9 cs:33 sp:7edce0bd4ef8 ax:0 si:20010000 di:ffffffffff600000 [21431590.769269] exe[680470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db8d4a9ab9 cs:33 sp:7f1740045ef8 ax:0 si:200001c0 di:ffffffffff600000 [21431751.762947] potentially unexpected fatal signal 5. [21431751.768195] CPU: 86 PID: 699136 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21431751.780200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21431751.789870] RIP: 0033:0x7fffffffe062 [21431751.793870] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21431751.814493] RSP: 002b:000000c0005e3b90 EFLAGS: 00000297 [21431751.821453] RAX: 00007fb2af491000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21431751.830398] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007fb2af491000 [21431751.839336] RBP: 000000c0005e3c28 R08: 0000000000000009 R09: 000000000b5db000 [21431751.848256] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005e3c18 [21431751.857184] R13: 000000c0003b1f50 R14: 000000c0001a7a40 R15: 00000000000a8b80 [21431751.866089] FS: 000000c00013a898 GS: 0000000000000000 [21431964.683880] potentially unexpected fatal signal 5. [21431964.689105] CPU: 29 PID: 676257 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21431964.701096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21431964.710759] RIP: 0033:0x7fffffffe062 [21431964.714818] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21431964.735345] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21431964.742402] RAX: 0000001b31e20000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21431964.751341] RDX: 0000000000000003 RSI: 0000000000040000 RDI: 0000001b31e20000 [21431964.760268] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000001ea00000 [21431964.769209] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21431964.778148] R13: 000000c000143808 R14: 000000c0002f08c0 R15: 0000000000099f66 [21431964.787118] FS: 00007fd3a4f9d6c0 GS: 0000000000000000 [21432163.247809] exe[710159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557031b55ab9 cs:33 sp:7fbcd7b06858 ax:0 si:557031baf062 di:ffffffffff600000 [21432389.667880] exe[710626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647dc726ab9 cs:33 sp:7f7cf6f92858 ax:0 si:5647dc780062 di:ffffffffff600000 [21432428.881541] exe[710485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d10d695ab9 cs:33 sp:7eba9e059858 ax:0 si:55d10d6ef062 di:ffffffffff600000 [21432428.949789] exe[710485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d10d695ab9 cs:33 sp:7eba9e059858 ax:0 si:55d10d6ef062 di:ffffffffff600000 [21432439.221265] exe[710668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558368e0aab9 cs:33 sp:7fd6c8fc7ef8 ax:0 si:20002f00 di:ffffffffff600000 [21432899.802297] exe[720179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3083bdab9 cs:33 sp:7ebf2be27858 ax:0 si:55a308417062 di:ffffffffff600000 [21434471.207008] potentially unexpected fatal signal 5. [21434471.212251] CPU: 9 PID: 743711 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21434471.224157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21434471.233797] RIP: 0033:0x7fffffffe062 [21434471.237783] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21434471.257076] RSP: 002b:000000c000177b90 EFLAGS: 00000297 [21434471.264011] RAX: 00000000000baa3d RBX: 0000000000000000 RCX: 00007fffffffe05a [21434471.272922] RDX: 0000000000000000 RSI: 000000c000178000 RDI: 0000000000012f00 [21434471.281823] RBP: 000000c000177c28 R08: 000000c000612100 R09: 0000000000000000 [21434471.289447] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000177c18 [21434471.298355] R13: 000000c000154b10 R14: 000000c000520fc0 R15: 00000000000b590e [21434471.307349] FS: 000000c00013a898 GS: 0000000000000000 [21434898.249079] exe[754112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ca1540ab9 cs:33 sp:7f896d102858 ax:0 si:563ca159a062 di:ffffffffff600000 [21434912.779819] exe[729417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564f57e2fab9 cs:33 sp:7ea2e2d84858 ax:0 si:564f57e89097 di:ffffffffff600000 [21435018.256422] exe[742742] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e86f8f237 cs:33 sp:7fc1a6660ef8 ax:2f700000 si:562e86ffd2f7 di:ffffffffff600000 [21435027.261075] exe[752755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e522a1e237 cs:33 sp:7fb6dc3feef8 ax:2f700000 si:55e522a8c2f7 di:ffffffffff600000 [21435058.934676] exe[712756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fad20c237 cs:33 sp:7f7970d92ef8 ax:2f700000 si:560fad27a2f7 di:ffffffffff600000 [21435061.086039] exe[759052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613f4023237 cs:33 sp:7f3491affef8 ax:2f700000 si:5613f40912f7 di:ffffffffff600000 [21435062.680374] exe[733013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f219d4237 cs:33 sp:7fa7a8352ef8 ax:2f700000 si:562f21a422f7 di:ffffffffff600000 [21435070.802628] exe[738348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab78188237 cs:33 sp:7f4913b50ef8 ax:2f700000 si:55ab781f62f7 di:ffffffffff600000 [21435089.543566] exe[738731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581275bf237 cs:33 sp:7ff20788fef8 ax:2f700000 si:55812762d2f7 di:ffffffffff600000 [21435101.538703] exe[758396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c200e3a237 cs:33 sp:7eb1e4e94ef8 ax:2f700000 si:55c200ea82f7 di:ffffffffff600000 [21435117.794990] exe[768312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558126b73237 cs:33 sp:7f7090944ef8 ax:2f700000 si:558126be12f7 di:ffffffffff600000 [21435141.841988] exe[717389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55919af3ddb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200000 [21435141.990599] exe[733100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56055e446db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200000 [21435178.642760] exe[735334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628a58b4ab9 cs:33 sp:7fed11b93858 ax:0 si:5628a590e062 di:ffffffffff600000 [21435556.812886] exe[757440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a9c8779ab9 cs:33 sp:7ff0bd9fe858 ax:0 si:55a9c87d3062 di:ffffffffff600000 [21435636.093884] exe[737891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625376f9237 cs:33 sp:7fbca8296ef8 ax:2f700000 si:5625377672f7 di:ffffffffff600000 [21435658.773234] exe[739338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55768aea1ab9 cs:33 sp:7fe8f7c66ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435720.148295] exe[782278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ab177aaab9 cs:33 sp:7ebf11d06ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435725.082334] exe[780474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f95af03ab9 cs:33 sp:7fa4e8ffeef8 ax:0 si:20000b40 di:ffffffffff600000 [21435726.709609] exe[719358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acf2e9dab9 cs:33 sp:7f17766f3ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435733.259669] exe[750485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572632aaab9 cs:33 sp:7f7dc6b41ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435735.097883] exe[776852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b02ff2ab9 cs:33 sp:7f0c19acbef8 ax:0 si:20000b40 di:ffffffffff600000 [21435757.531361] exe[783013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633c9154ab9 cs:33 sp:7ed5913a0ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435766.395683] exe[778549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564fb0f1fab9 cs:33 sp:7f1783447ef8 ax:0 si:20000b40 di:ffffffffff600000 [21435815.586089] exe[783059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5633c9150237 cs:33 sp:7ed5913a0ef8 ax:2f700000 si:5633c91be2f7 di:ffffffffff600000 [21435994.083734] exe[787496] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561230c35ab9 cs:33 sp:7feca3d04ef8 ax:0 si:20000b40 di:ffffffffff600000 [21436134.849853] exe[759518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d82a08ab9 cs:33 sp:7effd1f0bef8 ax:0 si:20000b40 di:ffffffffff600000 [21436227.287630] exe[776519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562427370ab9 cs:33 sp:7fabb3144ef8 ax:0 si:20000b40 di:ffffffffff600000 [21436347.050890] potentially unexpected fatal signal 5. [21436347.056127] CPU: 7 PID: 726699 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21436347.068133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21436347.077789] RIP: 0033:0x7fffffffe062 [21436347.081792] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21436347.101013] RSP: 002b:000000c0007b5be8 EFLAGS: 00000297 [21436347.106656] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21436347.115605] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21436347.124497] RBP: 000000c0007b5c80 R08: 0000000000000000 R09: 0000000000000000 [21436347.133407] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007b5c70 [21436347.142309] R13: 000000c0007c0000 R14: 000000c00058ca80 R15: 00000000000b152f [21436347.151227] FS: 000000c000180898 GS: 0000000000000000 [21436452.039827] exe[797561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55decff2dab9 cs:33 sp:7f6ff9e2def8 ax:0 si:20000b40 di:ffffffffff600000 [21436462.866410] exe[785171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55decff29237 cs:33 sp:7f6ff9e2def8 ax:2f700000 si:55decff972f7 di:ffffffffff600000 [21436596.434022] exe[786694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bade2b9ab9 cs:33 sp:7ecdf30e7ef8 ax:0 si:20000b40 di:ffffffffff600000 [21436862.244475] exe[807416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3dfd9d237 cs:33 sp:7ef2ceda4ef8 ax:2f700000 si:55b3dfe0b2f7 di:ffffffffff600000 [21437376.184571] potentially unexpected fatal signal 5. [21437376.189790] CPU: 81 PID: 776579 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21437376.201754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21437376.211389] RIP: 0033:0x7fffffffe062 [21437376.215405] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21437376.234642] RSP: 002b:000000c000775be8 EFLAGS: 00000297 [21437376.240324] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21437376.247900] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21437376.255445] RBP: 000000c000775c80 R08: 0000000000000000 R09: 0000000000000000 [21437376.264405] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000775c70 [21437376.273314] R13: 000000c0004cd800 R14: 000000c00037d6c0 R15: 00000000000b823c [21437376.282282] FS: 000000c00048c098 GS: 0000000000000000 [21437433.745115] exe[815747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aebb92dab9 cs:33 sp:7ea1ac068ef8 ax:0 si:20000b40 di:ffffffffff600000 [21437448.265841] exe[815707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c79ad237 cs:33 sp:7ecdade21ef8 ax:2f700000 si:55a1c7a1b2f7 di:ffffffffff600000 [21438032.466280] potentially unexpected fatal signal 11. [21438032.471576] CPU: 23 PID: 825418 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21438032.483821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21438032.493479] RIP: 0033:0x5591a892669b [21438032.497482] Code: fa 10 73 2d 83 fa 08 73 46 83 fa 04 73 16 83 fa 01 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 <89> 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 c5 fa 7f 07 c5 [21438032.518074] RSP: 002b:00007f725b6fc308 EFLAGS: 00010202 [21438032.523716] RAX: 00000000200001c0 RBX: 00007f725b6fc418 RCX: 00000000aaaaaaaa [21438032.531283] RDX: 0000000000000005 RSI: 00000000aaaaaaaa RDI: 00000000200001c0 [21438032.540193] RBP: 0000000000000001 R08: 00007f714ca00000 R09: 0000000000000660 [21438032.547761] R10: 00ab5dfe1fe97b85 R11: 00000000861c4ac9 R12: 00007f714c600000 [21438032.555334] R13: fffffffffffffffe R14: 00007f714c600000 R15: 00007f714c600008 [21438032.562987] FS: 00005591a95a4480 GS: 0000000000000000 [21438064.081998] potentially unexpected fatal signal 5. [21438064.087253] CPU: 47 PID: 815735 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21438064.099263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21438064.108911] RIP: 0033:0x7fffffffe062 [21438064.112957] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21438064.133565] RSP: 002b:000000c000651b90 EFLAGS: 00000297 [21438064.140571] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21438064.149492] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000560c09000000 [21438064.158570] RBP: 000000c000651c28 R08: 0000000000000000 R09: 0000000000000000 [21438064.167499] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000651c18 [21438064.176459] R13: 000000c000674ab0 R14: 000000c000247a40 R15: 00000000000c54f4 [21438064.185413] FS: 000000c000180098 GS: 0000000000000000 [21438235.776629] potentially unexpected fatal signal 11. [21438235.781942] CPU: 28 PID: 826989 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21438235.793947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21438235.803557] RIP: 0033:0x55ea73e76a80 [21438235.807513] Code: 75 d8 4c 89 e7 e8 00 68 fd ff 48 8b 80 88 00 00 00 48 c7 00 00 00 00 00 48 c7 40 08 00 00 00 00 eb b8 0f 1f 84 00 00 00 00 00 <48> 83 05 d8 fc c5 00 04 48 8b 05 59 08 c6 00 66 0f ef c0 48 c7 05 [21438235.826690] RSP: 002b:00007ff5164cc440 EFLAGS: 00010246 [21438235.832298] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000055ea73e76e0d [21438235.839854] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000055ea74ad8760 [21438235.847410] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21438235.854981] R10: 000055ea74ad8750 R11: 0000000000000246 R12: 0000000000000000 [21438235.862521] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21438235.870049] FS: 000055ea74ad8480 GS: 0000000000000000 [21438263.019582] exe[829702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638742caab9 cs:33 sp:7fc5dea3def8 ax:0 si:20000b40 di:ffffffffff600000 [21438278.626485] exe[814739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563296cf2237 cs:33 sp:7f498b4dcef8 ax:2f700000 si:563296d602f7 di:ffffffffff600000 [21439959.504740] potentially unexpected fatal signal 5. [21439959.510003] CPU: 9 PID: 895163 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21439959.521896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21439959.531652] RIP: 0033:0x7fffffffe062 [21439959.535674] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21439959.554911] RSP: 002b:000000c00076bbe8 EFLAGS: 00000297 [21439959.561887] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21439959.570830] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21439959.579751] RBP: 000000c00076bc80 R08: 0000000000000000 R09: 0000000000000000 [21439959.588666] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00076bc70 [21439959.597592] R13: 000000c00077a000 R14: 000000c0004b1a40 R15: 00000000000c265c [21439959.606512] FS: 000000c00013a898 GS: 0000000000000000 [21440506.641205] exe[906202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ced093cab9 cs:33 sp:7f1024cb1858 ax:0 si:55ced0996097 di:ffffffffff600000 [21440929.410111] exe[906118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614939eeab9 cs:33 sp:7fa270ede858 ax:0 si:561493a48062 di:ffffffffff600000 [21441741.040609] exe[899030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559abe6b7ab9 cs:33 sp:7f9d2831f858 ax:0 si:559abe711070 di:ffffffffff600000 [21441801.531426] exe[930335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56464edd8ab9 cs:33 sp:7ed6db245858 ax:0 si:56464ee32070 di:ffffffffff600000 [21441867.132921] exe[900006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563005357237 cs:33 sp:7efe11ca1ef8 ax:2f700000 si:5630053c52f7 di:ffffffffff600000 [21441924.439739] exe[900681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e362e79ab9 cs:33 sp:7fb6e9f40858 ax:0 si:55e362ed3097 di:ffffffffff600000 [21441968.182112] exe[918729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e362e79ab9 cs:33 sp:7fb6e9f40858 ax:0 si:55e362ed3070 di:ffffffffff600000 [21442141.932482] exe[941550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e88c533ab9 cs:33 sp:7ff4c3bbaef8 ax:0 si:20000b40 di:ffffffffff600000 [21442183.243140] potentially unexpected fatal signal 5. [21442183.248371] CPU: 5 PID: 897702 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21442183.260256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21442183.269983] RIP: 0033:0x7fffffffe062 [21442183.274069] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21442183.294644] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21442183.301673] RAX: 0000562103400000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21442183.310620] RDX: 0000000000000001 RSI: 00000000000c6000 RDI: 0000562103400000 [21442183.319535] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000015e6a000 [21442183.328477] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21442183.337423] R13: 0000000002883b00 R14: 000000c000261340 R15: 00000000000d83f2 [21442183.346355] FS: 00000000056d63c0 GS: 0000000000000000 [21442276.464039] exe[937687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563deeb82237 cs:33 sp:7ff3e3626ef8 ax:2f700000 si:563deebf02f7 di:ffffffffff600000 [21443247.854800] potentially unexpected fatal signal 5. [21443247.860022] CPU: 87 PID: 960703 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21443247.872037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21443247.881703] RIP: 0033:0x7fffffffe062 [21443247.885749] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21443247.905003] RSP: 002b:000000c0005ddb90 EFLAGS: 00000297 [21443247.912026] RAX: 000055d4a3ddc000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21443247.920977] RDX: 0000000000000005 RSI: 00000000000a3000 RDI: 000055d4a3ddc000 [21443247.929945] RBP: 000000c0005ddc28 R08: 000000000000001d R09: 0000000000025000 [21443247.938889] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0005ddc18 [21443247.947861] R13: 000000c000604ab0 R14: 000000c0001a2540 R15: 00000000000ea2f8 [21443247.956837] FS: 000000c0004c4098 GS: 0000000000000000 [21443319.546280] exe[963762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a272b05ab9 cs:33 sp:7f70190fc858 ax:0 si:55a272b5f062 di:ffffffffff600000 [21443590.793684] exe[940494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559df4e07ab9 cs:33 sp:7f98ef5c2858 ax:0 si:559df4e61062 di:ffffffffff600000 [21443590.892110] exe[938734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559091c0dab9 cs:33 sp:7f0a77b55858 ax:0 si:559091c67062 di:ffffffffff600000 [21443590.928779] exe[950791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559091c0dab9 cs:33 sp:7f0a77b55858 ax:0 si:559091c67062 di:ffffffffff600000 [21443744.166654] exe[837833] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f75f9fab9 cs:33 sp:7efe9862d858 ax:0 si:563f75ff9062 di:ffffffffff600000 [21444759.685018] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444759.788450] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444759.871641] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444759.957795] exe[962147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.027836] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.102763] exe[962147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.180507] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.254623] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.339473] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444760.439215] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.745687] warn_bad_vsyscall: 119 callbacks suppressed [21444764.745691] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.829242] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.880001] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444764.930499] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.033109] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.161342] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.227547] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.290090] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.366607] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444765.437303] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444769.771003] warn_bad_vsyscall: 162 callbacks suppressed [21444769.771007] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfae7858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444769.831043] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444769.989792] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.155493] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.176230] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.373775] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.452276] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444770.571678] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af097 di:ffffffffff600000 [21444770.662426] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af097 di:ffffffffff600000 [21444770.705979] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444774.839250] warn_bad_vsyscall: 22 callbacks suppressed [21444774.839254] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af097 di:ffffffffff600000 [21444774.917700] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.007565] exe[959403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.103870] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.180498] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.250561] exe[959403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.325031] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.351860] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfac6858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.446972] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444775.534307] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444780.140380] warn_bad_vsyscall: 72 callbacks suppressed [21444780.140384] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444780.643337] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444780.947124] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444784.632292] exe[962147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444785.386823] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444792.865757] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444793.551179] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af070 di:ffffffffff600000 [21444794.857777] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af070 di:ffffffffff600000 [21444795.272022] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444796.751398] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444800.120920] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5598e6655ab9 cs:33 sp:7f68dfb08858 ax:0 si:5598e66af062 di:ffffffffff600000 [21444801.450170] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444804.767331] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476097 di:ffffffffff600000 [21444805.633435] exe[959441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444805.772372] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444805.921237] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444811.297593] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444812.146654] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444813.508582] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444814.929121] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444819.248469] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444824.585881] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444827.871681] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444832.360581] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444834.925364] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444838.288823] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444838.720001] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476097 di:ffffffffff600000 [21444841.688511] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444845.617356] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444845.690034] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2b941cab9 cs:33 sp:7fede4a86858 ax:0 si:55b2b9476062 di:ffffffffff600000 [21444851.187230] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561192214ab9 cs:33 sp:7f8c6b1ae858 ax:0 si:56119226e062 di:ffffffffff600000 [21444853.140443] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561192214ab9 cs:33 sp:7f8c6b1ae858 ax:0 si:56119226e062 di:ffffffffff600000 [21444854.978943] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444855.997434] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444860.846154] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444860.956772] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444865.048334] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444867.699730] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444870.008061] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558bf71f4ab9 cs:33 sp:7f697313f858 ax:0 si:558bf724e062 di:ffffffffff600000 [21444874.057095] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444874.584649] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444878.150838] exe[962199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444888.187996] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444888.592827] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861070 di:ffffffffff600000 [21444888.747586] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861097 di:ffffffffff600000 [21444890.457520] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444891.294252] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444893.971964] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444896.397298] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444902.556293] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444904.197522] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861097 di:ffffffffff600000 [21444904.677291] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861097 di:ffffffffff600000 [21444904.784817] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444906.703025] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444917.894799] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564742807ab9 cs:33 sp:7fc7156f3858 ax:0 si:564742861062 di:ffffffffff600000 [21444928.650542] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444937.061576] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444939.873384] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444943.278042] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444950.506046] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444956.631679] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444958.608427] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444965.379337] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444966.588096] exe[958037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7097 di:ffffffffff600000 [21444971.015726] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444972.464198] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444978.505399] exe[958037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444982.026980] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7097 di:ffffffffff600000 [21444983.360867] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444986.978698] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444992.675657] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444995.165519] exe[962199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444995.503074] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56362454dab9 cs:33 sp:7fcd9069e858 ax:0 si:5636245a7062 di:ffffffffff600000 [21444998.928894] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445004.399798] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445004.661551] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531097 di:ffffffffff600000 [21445015.325564] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445017.454777] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445019.945854] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445025.910525] exe[957023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445026.083519] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445026.301379] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445035.365566] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445035.559238] exe[958037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445046.974609] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531070 di:ffffffffff600000 [21445047.901825] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4824d7ab9 cs:33 sp:7ff00fd21858 ax:0 si:55a482531062 di:ffffffffff600000 [21445052.095269] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445054.571345] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445060.673513] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445068.266639] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445070.231625] exe[962199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445070.779294] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445070.831508] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445079.233360] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b097 di:ffffffffff600000 [21445081.128574] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445083.161127] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5b06c1ab9 cs:33 sp:7f63ce264858 ax:0 si:55c5b071b062 di:ffffffffff600000 [21445083.914812] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445086.016119] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445090.878336] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445097.681485] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445102.543209] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445104.966329] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445110.226832] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445114.088409] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff3889ad858 ax:0 si:563a810da062 di:ffffffffff600000 [21445116.798978] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a81080ab9 cs:33 sp:7ff38898c858 ax:0 si:563a810da062 di:ffffffffff600000 [21445118.746297] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445126.363396] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebb3858 ax:0 si:555673e01062 di:ffffffffff600000 [21445129.789237] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445130.298837] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445130.946721] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445136.356780] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673da7ab9 cs:33 sp:7fea8ebd4858 ax:0 si:555673e01062 di:ffffffffff600000 [21445140.476028] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55853a7f6ab9 cs:33 sp:7fe4f74ca858 ax:0 si:55853a850062 di:ffffffffff600000 [21445144.730796] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611d5740ab9 cs:33 sp:7ff45e779858 ax:0 si:5611d579a070 di:ffffffffff600000 [21445148.028348] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f889a7ab9 cs:33 sp:7fd0e7a66858 ax:0 si:559f88a01062 di:ffffffffff600000 [21445148.790663] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f889a7ab9 cs:33 sp:7fd0e7a66858 ax:0 si:559f88a01062 di:ffffffffff600000 [21445152.325550] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445154.790652] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445156.052088] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445157.741556] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445160.391485] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445160.739901] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445161.428544] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561979111ab9 cs:33 sp:7fc2e55e0858 ax:0 si:56197916b062 di:ffffffffff600000 [21445173.223042] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445173.594048] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445178.199774] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc845dfe858 ax:0 si:556c04023062 di:ffffffffff600000 [21445181.218769] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445183.023651] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445184.355158] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445188.022808] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445189.127364] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445192.258056] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445193.061695] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445197.889603] exe[961941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445200.301619] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445202.763703] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023062 di:ffffffffff600000 [21445207.380242] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c03fc9ab9 cs:33 sp:7fc846a3f858 ax:0 si:556c04023097 di:ffffffffff600000 [21445212.537971] exe[961951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445220.899130] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445224.604790] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445226.330275] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445229.587615] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445237.145301] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445237.916690] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445238.332376] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445240.003174] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445244.800071] exe[959403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445252.622244] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d097 di:ffffffffff600000 [21445252.839739] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.156479] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.344846] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.710821] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445257.770559] exe[961929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d097 di:ffffffffff600000 [21445260.357515] exe[962151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445261.260396] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445262.268465] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445265.664065] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445267.031408] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445270.603396] exe[962206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b1f913ab9 cs:33 sp:7ff47d47a858 ax:0 si:561b1f96d062 di:ffffffffff600000 [21445280.492226] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445291.428186] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445292.706553] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445292.761657] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6097 di:ffffffffff600000 [21445293.297774] potentially unexpected fatal signal 5. [21445293.303025] CPU: 45 PID: 980394 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21445293.315033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21445293.324690] RIP: 0033:0x7fffffffe062 [21445293.328690] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21445293.347937] RSP: 002b:000000c00002bb90 EFLAGS: 00000297 [21445293.354945] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21445293.362524] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21445293.371428] RBP: 000000c00002bc28 R08: 0000000000000000 R09: 0000000000000000 [21445293.380368] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00002bc18 [21445293.389391] R13: 000000c000331f20 R14: 000000c0004a5880 R15: 00000000000e3608 [21445293.398275] FS: 000000c00047e098 GS: 0000000000000000 [21445298.698236] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ee338cab9 cs:33 sp:7f3c5ebe1858 ax:0 si:555ee33e6062 di:ffffffffff600000 [21445312.450965] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445319.934972] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a097 di:ffffffffff600000 [21445320.623469] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a097 di:ffffffffff600000 [21445322.344040] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445322.851138] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445324.902121] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445326.332009] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445329.060107] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445332.696951] exe[5993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc17136ab9 cs:33 sp:7f59c259f858 ax:0 si:55dc17190097 di:ffffffffff600000 [21445332.778180] exe[8270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc17136ab9 cs:33 sp:7f59c259f858 ax:0 si:55dc17190097 di:ffffffffff600000 [21445333.380151] exe[9095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445334.730615] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445335.552590] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a097 di:ffffffffff600000 [21445341.447239] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445352.481836] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f6eb30ab9 cs:33 sp:7fa2add30858 ax:0 si:562f6eb8a062 di:ffffffffff600000 [21445373.333280] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12062 di:ffffffffff600000 [21445374.513228] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12062 di:ffffffffff600000 [21445375.420796] exe[962146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12070 di:ffffffffff600000 [21445377.734758] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb07bb8ab9 cs:33 sp:7f8fce4e7858 ax:0 si:55fb07c12062 di:ffffffffff600000 [21445383.851003] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445384.291148] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445386.485928] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445386.637748] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445392.972332] exe[962145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445401.691244] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445403.610793] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638a41d6ab9 cs:33 sp:7f4916b54858 ax:0 si:5638a4230062 di:ffffffffff600000 [21445408.086576] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445412.296386] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445412.390719] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445412.637394] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445414.276789] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51741858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445416.954944] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445420.283379] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040070 di:ffffffffff600000 [21445421.888092] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445425.103348] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445438.478434] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445438.915067] exe[9757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445440.279176] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445444.426181] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445445.430466] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445446.103854] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445449.378881] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640dcfe6ab9 cs:33 sp:7f7c51762858 ax:0 si:5640dd040062 di:ffffffffff600000 [21445452.324233] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445453.152912] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445453.506655] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445454.531178] exe[9757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445456.649265] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445462.405107] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445462.747278] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fff8ab9 cs:33 sp:7f9841041858 ax:0 si:560840052062 di:ffffffffff600000 [21445463.497766] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec532858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445465.932667] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445468.014560] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445472.357804] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445472.824410] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110097 di:ffffffffff600000 [21445474.191417] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445474.690410] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110097 di:ffffffffff600000 [21445475.419937] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5dc0b6ab9 cs:33 sp:7fb0ec553858 ax:0 si:55e5dc110062 di:ffffffffff600000 [21445480.449668] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e3809dab9 cs:33 sp:7f21ee779858 ax:0 si:563e380f7062 di:ffffffffff600000 [21445489.626684] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7df32ab9 cs:33 sp:7fa3009fe858 ax:0 si:55dc7df8c062 di:ffffffffff600000 [21445490.471870] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7df32ab9 cs:33 sp:7fa3009fe858 ax:0 si:55dc7df8c062 di:ffffffffff600000 [21445490.957406] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7df32ab9 cs:33 sp:7fa3009fe858 ax:0 si:55dc7df8c062 di:ffffffffff600000 [21445493.670957] exe[962138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fce84a3ab9 cs:33 sp:7f15a998f858 ax:0 si:55fce84fd062 di:ffffffffff600000 [21445510.318045] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445510.530251] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445513.575315] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445515.944344] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.114859] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.227701] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.417928] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445517.896972] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445518.240395] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445518.289894] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445518.739748] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5097 di:ffffffffff600000 [21445524.601943] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445526.765728] exe[961957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445528.840735] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445531.101086] exe[962034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5097 di:ffffffffff600000 [21445534.919354] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445537.911447] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445540.810846] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445547.137370] exe[962058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445548.456107] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445550.616270] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e77c7bab9 cs:33 sp:7f57611d3858 ax:0 si:564e77cd5062 di:ffffffffff600000 [21445555.719420] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37da6eab9 cs:33 sp:7f55ab065858 ax:0 si:55e37dac8062 di:ffffffffff600000 [21445557.608202] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37da6eab9 cs:33 sp:7f55ab065858 ax:0 si:55e37dac8062 di:ffffffffff600000 [21445571.989529] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445572.730693] exe[962204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445572.782182] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445574.380165] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445574.976456] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445575.440647] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445577.076717] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1097 di:ffffffffff600000 [21445577.124137] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445578.944960] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1097 di:ffffffffff600000 [21445586.631588] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c929687ab9 cs:33 sp:7fc715993858 ax:0 si:55c9296e1062 di:ffffffffff600000 [21445592.262472] exe[961947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445606.583570] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445611.591671] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445615.962245] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445616.622804] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445621.256455] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56082deb7ab9 cs:33 sp:7fd0021eb858 ax:0 si:56082df11062 di:ffffffffff600000 [21445627.369382] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7cd858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445629.884683] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7cd858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445633.085867] exe[962078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7aa858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445634.161560] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ac6a8dab9 cs:33 sp:7fa64e7cd858 ax:0 si:561ac6ae7062 di:ffffffffff600000 [21445638.196216] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445640.718018] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445641.234792] exe[961942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445646.716123] exe[962078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445649.320269] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445649.968227] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445650.701018] exe[957187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab097 di:ffffffffff600000 [21445651.990887] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445652.569758] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445654.950020] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445656.099429] exe[962096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445657.461786] exe[961955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445666.423388] exe[962014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445668.641084] exe[961959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab097 di:ffffffffff600000 [21445670.229840] exe[962088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445676.931016] exe[961949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab097 di:ffffffffff600000 [21445677.071672] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c822251ab9 cs:33 sp:7fe93f35f858 ax:0 si:55c8222ab062 di:ffffffffff600000 [21445692.131653] exe[962089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e308e73ab9 cs:33 sp:7f114578f858 ax:0 si:55e308ecd062 di:ffffffffff600000 [21445700.127714] exe[962076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e308e73ab9 cs:33 sp:7f114578f858 ax:0 si:55e308ecd062 di:ffffffffff600000 [21445706.043938] exe[962253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e308e73ab9 cs:33 sp:7f114578f858 ax:0 si:55e308ecd062 di:ffffffffff600000 [21445715.492611] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445716.617799] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445716.905056] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445719.125360] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24097 di:ffffffffff600000 [21445723.226831] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445724.327624] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f84dcaab9 cs:33 sp:7f6fdc96e858 ax:0 si:562f84e24062 di:ffffffffff600000 [21445727.014260] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445727.334147] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445730.242432] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445736.359701] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d62b02dab9 cs:33 sp:7f1e18af9858 ax:0 si:55d62b087062 di:ffffffffff600000 [21445742.212894] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445749.894875] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445751.063639] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445751.548472] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445752.071678] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e59feadab9 cs:33 sp:7fca87e35858 ax:0 si:55e59ff07062 di:ffffffffff600000 [21445753.696048] exe[992339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5612b4d1eab9 cs:33 sp:7f7aef1c5858 ax:0 si:5612b4d78070 di:ffffffffff600000 [21445753.851474] exe[993503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cd4b40ab9 cs:33 sp:7fdc5e3a8858 ax:0 si:562cd4b9a070 di:ffffffffff600000 [21445753.968181] exe[993657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445754.005129] exe[993800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445754.037758] exe[993800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445754.069914] exe[993483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5589cdbabab9 cs:33 sp:7f6b9e51c858 ax:0 si:5589cdc05070 di:ffffffffff600000 [21445764.549150] warn_bad_vsyscall: 53 callbacks suppressed [21445764.549153] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445764.992101] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445769.355907] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7097 di:ffffffffff600000 [21445769.686753] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445771.956228] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445774.717978] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445783.613648] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445784.559157] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445789.453117] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7097 di:ffffffffff600000 [21445789.682993] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445790.389406] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445792.681618] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445794.019841] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445794.676499] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445799.488275] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445800.893573] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445802.821225] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445803.400839] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445803.492549] exe[959404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee0747dab9 cs:33 sp:7f92515e4858 ax:0 si:55ee074d7062 di:ffffffffff600000 [21445809.911687] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445814.190618] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445814.252565] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445820.215245] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445822.755904] exe[962555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445837.243941] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445843.601113] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445843.772389] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445849.364312] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb097 di:ffffffffff600000 [21445866.630843] exe[959441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445869.189417] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445869.326705] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445875.619873] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445877.437862] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445891.892716] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445894.632615] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445903.139034] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb097 di:ffffffffff600000 [21445907.349482] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445912.966079] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445915.390092] exe[975041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559287e71ab9 cs:33 sp:7ebefdb8bef8 ax:0 si:20000040 di:ffffffffff600000 [21445923.564337] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb097 di:ffffffffff600000 [21445923.621637] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445928.760191] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445935.813587] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445943.472902] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445957.613048] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445958.348242] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555664d81ab9 cs:33 sp:7f2bdb519858 ax:0 si:555664ddb062 di:ffffffffff600000 [21445965.673905] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445968.011572] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445969.194893] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445981.004158] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445984.446826] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21445987.354963] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445987.430634] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445987.588337] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445988.275306] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445991.227962] exe[14505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4fc9d6237 cs:33 sp:7fb3db97def8 ax:2f700000 si:55c4fca442f7 di:ffffffffff600000 [21445994.428433] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445998.827036] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21445998.942082] exe[959400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21445999.493291] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21446005.631028] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446010.118455] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446011.395855] exe[962091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446012.112688] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446013.771033] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446016.685515] exe[962091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446019.026346] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446019.628704] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21446025.547663] exe[959443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446030.896060] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446034.115619] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446039.988186] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d062 di:ffffffffff600000 [21446052.045116] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbfabd3ab9 cs:33 sp:7f76f9f79858 ax:0 si:55bbfac2d097 di:ffffffffff600000 [21446055.957256] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c062 di:ffffffffff600000 [21446056.492658] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c062 di:ffffffffff600000 [21446059.232830] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c097 di:ffffffffff600000 [21446069.887004] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2fa6e2ab9 cs:33 sp:7f1e32db9858 ax:0 si:55c2fa73c097 di:ffffffffff600000 [21446073.301104] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446078.145896] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446078.310813] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e097 di:ffffffffff600000 [21446080.736650] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e097 di:ffffffffff600000 [21446083.229851] exe[959412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446088.237648] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446091.879414] exe[962086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446095.729502] exe[959441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446098.522121] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8c4858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446099.516786] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562ae17d4ab9 cs:33 sp:7f5eac8a3858 ax:0 si:562ae182e062 di:ffffffffff600000 [21446197.718660] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446198.511944] exe[966039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55db9991cdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:a0040000 [21446208.726128] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446212.516308] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446212.986750] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446217.271828] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a097 di:ffffffffff600000 [21446221.418781] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bd7f20ab9 cs:33 sp:7ff4221fe858 ax:0 si:557bd7f7a062 di:ffffffffff600000 [21446231.747967] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446244.735122] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446251.091003] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446253.795886] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446257.619944] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e097 di:ffffffffff600000 [21446259.808765] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446260.287816] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446272.305879] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446273.451184] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446274.196385] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446277.660781] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446279.499654] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b4bfe4ab9 cs:33 sp:7faafa054858 ax:0 si:562b4c03e062 di:ffffffffff600000 [21446285.029421] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f779acab9 cs:33 sp:7f52e1a3e858 ax:0 si:559f77a06062 di:ffffffffff600000 [21446287.214019] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f779acab9 cs:33 sp:7f52e1a3e858 ax:0 si:559f77a06062 di:ffffffffff600000 [21446289.786912] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f779acab9 cs:33 sp:7f52e1a3e858 ax:0 si:559f77a06062 di:ffffffffff600000 [21446298.503266] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56230778fab9 cs:33 sp:7fb0b6e6a858 ax:0 si:5623077e9062 di:ffffffffff600000 [21446300.730450] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56230778fab9 cs:33 sp:7fb0b6e6a858 ax:0 si:5623077e9062 di:ffffffffff600000 [21446304.124472] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec062 di:ffffffffff600000 [21446328.652395] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec062 di:ffffffffff600000 [21446333.672163] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec097 di:ffffffffff600000 [21446339.050167] exe[959405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be70892ab9 cs:33 sp:7fbbdc83a858 ax:0 si:55be708ec062 di:ffffffffff600000 [21446342.754732] exe[959414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b4f37fab9 cs:33 sp:7f1711f86858 ax:0 si:557b4f3d9062 di:ffffffffff600000 [21446355.441686] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555d9b1b3ab9 cs:33 sp:7fb4600fa858 ax:0 si:555d9b20d062 di:ffffffffff600000 [21446356.801248] exe[962208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446358.879935] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446359.683149] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446365.884476] exe[959420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446366.050240] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446378.847894] exe[959399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446378.922860] exe[962711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446379.074947] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446385.962092] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446386.184050] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446386.806333] exe[959594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446387.425707] exe[962252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446391.344316] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446394.619546] exe[959413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446400.789725] exe[962306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446400.842952] exe[962091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446406.750719] exe[959416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259097 di:ffffffffff600000 [21446410.385036] exe[959410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446412.205864] exe[17670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446413.935473] exe[962035] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446418.015251] exe[19160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ea51ffab9 cs:33 sp:7f423c99f858 ax:0 si:561ea5259062 di:ffffffffff600000 [21446983.840910] exe[24076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f4bb16ab9 cs:33 sp:7edc3ced7ef8 ax:0 si:200001c0 di:ffffffffff600000 [21447481.641149] exe[26590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d12723ab9 cs:33 sp:7ede07fc7858 ax:0 si:559d1277d062 di:ffffffffff600000 [21447487.779471] exe[49042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f84acbab9 cs:33 sp:7eeb669df858 ax:0 si:561f84b25062 di:ffffffffff600000 [21447556.264537] exe[45380] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2f79d1db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200 [21447556.362445] exe[45479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a3dcf10db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200 [21447804.810843] exe[68090] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b86030ab9 cs:33 sp:7f552e2a0858 ax:0 si:558b8608a097 di:ffffffffff600000 [21447804.908178] exe[45023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555910ddfab9 cs:33 sp:7fba77a74858 ax:0 si:555910e39097 di:ffffffffff600000 [21447804.987976] exe[49166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b86030ab9 cs:33 sp:7f552e2a0858 ax:0 si:558b8608a097 di:ffffffffff600000 [21447805.031762] exe[68288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559215d3eab9 cs:33 sp:7f62094e1858 ax:0 si:559215d98097 di:ffffffffff600000 [21447805.139075] exe[33136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555910ddfab9 cs:33 sp:7fba77a74858 ax:0 si:555910e39097 di:ffffffffff600000 [21447805.242166] exe[68364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b86030ab9 cs:33 sp:7f552e2a0858 ax:0 si:558b8608a097 di:ffffffffff600000 [21447805.405505] exe[49083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557ef086aab9 cs:33 sp:7f715c98b858 ax:0 si:557ef08c4097 di:ffffffffff600000 [21447805.540221] exe[68285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555910ddfab9 cs:33 sp:7fba77a74858 ax:0 si:555910e39062 di:ffffffffff600000 [21447990.996286] exe[70744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577b0cd6ab9 cs:33 sp:7f6919eb6ef8 ax:0 si:20002340 di:ffffffffff600000 [21447991.363192] exe[75684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632a65afab9 cs:33 sp:7f2e591feef8 ax:0 si:20002340 di:ffffffffff600000 [21448041.536408] potentially unexpected fatal signal 5. [21448041.541641] CPU: 30 PID: 80640 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448041.553580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448041.563252] RIP: 0033:0x7fffffffe062 [21448041.567286] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21448041.575629] potentially unexpected fatal signal 11. [21448041.587913] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21448041.593211] CPU: 78 PID: 75653 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448041.593212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448041.593215] RIP: 0033:0x5606400ce6ac [21448041.593218] Code: 7c 10 8a 0e 74 0a 0f b7 74 16 fe 66 89 74 17 fe 88 0f c3 8b 4c 16 fc 8b 36 89 4c 17 fc 89 37 c3 c5 fa 6f 06 c5 fa 6f 4c 16 f0 fa 7f 07 c5 fa 7f 4c 17 f0 c3 66 0f 1f 84 00 00 00 00 00 48 8b [21448041.593219] RSP: 002b:00007f5d26bdb308 EFLAGS: 00010206 [21448041.598836] RAX: 00007f9498215000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21448041.598837] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f9498215000 [21448041.598837] RBP: 000000c00004db30 R08: 0000000000000009 R09: 00000000041fe000 [21448041.598838] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21448041.598839] R13: 000000c000178808 R14: 000000c0004b3c00 R15: 0000000000012055 [21448041.598840] FS: 00007f3143fff6c0 GS: 0000000000000000 [21448041.699881] RAX: 0000000020000300 RBX: 00007f5d26bdb418 RCX: 00007f3680a00000 [21448041.707437] RDX: 0000000000000013 RSI: 00007f3680a00020 RDI: 0000000020000300 [21448041.716339] RBP: 0000000000000001 R08: 00007f3680e00000 R09: 0000000000000188 [21448041.725263] R10: 00ab72794e84070c R11: 00000000861c4a91 R12: 00007f3680a00000 [21448041.734185] R13: fffffffffffffffe R14: 00007f3680a00000 R15: 00007f3680a00008 [21448041.743104] FS: 0000560640d4c480 GS: 0000000000000000 [21448079.551197] potentially unexpected fatal signal 11. [21448079.556536] CPU: 47 PID: 73160 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448079.568434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448079.578070] RIP: 0033:0x5600822ab939 [21448079.582041] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [21448079.601255] RSP: 002b:00007f3f8af82440 EFLAGS: 00010206 [21448079.606944] RAX: 0000000000000147 RBX: 0000000000000000 RCX: 00005600822abdd3 [21448079.615934] RDX: 0000000000000147 RSI: 0000000000000000 RDI: 0000000001200011 [21448079.624897] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21448079.633843] R10: 0000560082f0d750 R11: 0000000000000246 R12: 0000000000000147 [21448079.642755] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [21448079.651670] FS: 0000560082f0d480 GS: 0000000000000000 [21448142.862707] exe[53476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609c40d0ab9 cs:33 sp:7ecedf1feef8 ax:0 si:20002340 di:ffffffffff600000 [21448149.802562] exe[53561] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93eba7ab9 cs:33 sp:7ed727fdbef8 ax:0 si:20002340 di:ffffffffff600000 [21448203.817495] exe[83585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641788daab9 cs:33 sp:7fee94d66ef8 ax:0 si:20001180 di:ffffffffff600000 [21448232.473098] exe[83465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eebc403ab9 cs:33 sp:7f0aab8ccef8 ax:0 si:20002340 di:ffffffffff600000 [21448233.545483] exe[14014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556199d11ab9 cs:33 sp:7f3034bfeef8 ax:0 si:20002340 di:ffffffffff600000 [21448235.446700] exe[60971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561f446bbab9 cs:33 sp:7fd8a5b84ef8 ax:0 si:20002340 di:ffffffffff600000 [21448251.754946] exe[90183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd70d33ab9 cs:33 sp:7efca399fef8 ax:0 si:20002340 di:ffffffffff600000 [21448294.917060] exe[92485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55918d21eab9 cs:33 sp:7f4b894f0ef8 ax:0 si:20002340 di:ffffffffff600000 [21448345.356696] exe[95188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55968ad39ab9 cs:33 sp:7eb9532dfef8 ax:0 si:20002340 di:ffffffffff600000 [21448423.166017] exe[91824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a6aca9ab9 cs:33 sp:7ff63595eef8 ax:0 si:20002240 di:ffffffffff600000 [21448546.744563] exe[100705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56404ab50ab9 cs:33 sp:7f661bfd6ef8 ax:0 si:20002340 di:ffffffffff600000 [21448911.587611] potentially unexpected fatal signal 5. [21448911.592838] CPU: 31 PID: 60810 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448911.604726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448911.614333] RIP: 0033:0x7fffffffe062 [21448911.618295] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21448911.637514] RSP: 002b:000000c000553b90 EFLAGS: 00000297 [21448911.643205] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21448911.650749] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21448911.659687] RBP: 000000c000553c28 R08: 0000000000000000 R09: 0000000000000000 [21448911.668905] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000553c18 [21448911.677807] R13: 000000c000203410 R14: 000000c000170e00 R15: 0000000000001fb0 [21448911.686745] FS: 000000c000180898 GS: 0000000000000000 [21448911.940149] potentially unexpected fatal signal 5. [21448911.945383] CPU: 14 PID: 8130 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21448911.957209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21448911.966899] RIP: 0033:0x7fffffffe062 [21448911.970882] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21448911.990092] RSP: 002b:000000c000553b90 EFLAGS: 00000297 [21448911.997126] RAX: 000000000001b4db RBX: 0000000000000000 RCX: 00007fffffffe05a [21448912.004698] RDX: 0000000000000000 RSI: 000000c000554000 RDI: 0000000000012f00 [21448912.013644] RBP: 000000c000553c28 R08: 000000c00055a2e0 R09: 0000000000000000 [21448912.022578] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000553c18 [21448912.031546] R13: 000000c000203410 R14: 000000c000170e00 R15: 0000000000001fb0 [21448912.040482] FS: 000000c000180898 GS: 0000000000000000 [21448943.731044] exe[108824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4dd463ab9 cs:33 sp:7f30d2c83ef8 ax:0 si:20002340 di:ffffffffff600000 [21449044.520442] exe[105882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5588eef65ab9 cs:33 sp:7f2ed2105858 ax:0 si:5588eefbf070 di:ffffffffff600000 [21449053.615099] exe[991268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556623419ab9 cs:33 sp:7fb739ce3ef8 ax:0 si:20002340 di:ffffffffff600000 [21449317.532790] exe[81936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449317.685224] exe[84190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5562336f9ab9 cs:33 sp:7fac431a6858 ax:0 si:556233753097 di:ffffffffff600000 [21449317.698966] exe[82785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449317.813087] exe[105113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449317.929349] exe[82442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564be2fd4ab9 cs:33 sp:7f312dfed858 ax:0 si:564be302e097 di:ffffffffff600000 [21449318.092061] exe[105091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56402c458ab9 cs:33 sp:7f295ed08858 ax:0 si:56402c4b2097 di:ffffffffff600000 [21449318.210423] exe[104422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564be2fd4ab9 cs:33 sp:7f312dfed858 ax:0 si:564be302e062 di:ffffffffff600000 [21449585.710504] exe[124975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5a89bdab9 cs:33 sp:7eefae34def8 ax:0 si:20002340 di:ffffffffff600000 [21449797.733840] exe[89795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560127b8cab9 cs:33 sp:7fc40b790ef8 ax:0 si:20000800 di:ffffffffff600000 [21450018.251903] exe[108224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f1ff64ab9 cs:33 sp:7ed7af6daef8 ax:0 si:20002280 di:ffffffffff600000 [21450160.422392] exe[39838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370d369ab9 cs:33 sp:7f40c7a57ef8 ax:0 si:20001980 di:ffffffffff600000 [21450160.589605] exe[131437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e3c219ab9 cs:33 sp:7f090efb1ef8 ax:0 si:20001980 di:ffffffffff600000 [21450160.622086] exe[76745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e3c219ab9 cs:33 sp:7f090efb1ef8 ax:0 si:20001980 di:ffffffffff600000 [21450421.448398] exe[108372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fe3858 ax:0 si:55f93e429097 di:ffffffffff600000 [21450421.957225] exe[116518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fe3858 ax:0 si:55f93e429097 di:ffffffffff600000 [21450451.773435] exe[139817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2ed15ab9 cs:33 sp:7f226d987858 ax:0 si:562f2ed6f062 di:ffffffffff600000 [21450548.798590] exe[146816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562463594ab9 cs:33 sp:7f9a1a163858 ax:0 si:5624635ee062 di:ffffffffff600000 [21450846.563279] exe[99118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c8f1e6ab9 cs:33 sp:7eabe5a8a858 ax:0 si:556c8f240062 di:ffffffffff600000 [21451174.354726] exe[81661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561500b1aab9 cs:33 sp:7f7dfeffe858 ax:0 si:561500b74062 di:ffffffffff600000 [21451174.512873] exe[100407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564eedd21ab9 cs:33 sp:7ff14e304858 ax:0 si:564eedd7b062 di:ffffffffff600000 [21451345.299799] exe[108469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fe3858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.720121] exe[116518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.759670] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.795169] exe[108364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.834305] exe[108364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.870415] exe[113009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.907890] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.946869] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451345.982038] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451346.014160] exe[129524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93e3cfab9 cs:33 sp:7f65c1fc2858 ax:0 si:55f93e429097 di:ffffffffff600000 [21451427.289290] potentially unexpected fatal signal 11. [21451427.294633] CPU: 0 PID: 145474 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21451427.306524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21451427.316334] RIP: 0033:0x55ec2eec51ef [21451427.320381] Code: 00 00 00 e9 33 0c 05 00 0f 1f 00 e9 3b f8 ff ff 0f 1f 00 81 fa 00 01 00 00 74 d6 8b 57 10 83 e2 7f 83 fa 01 0f 85 92 00 00 00 <64> 8b 04 25 d0 02 00 00 39 47 08 75 30 8b 47 04 83 f8 ff 0f 84 bc [21451427.339701] RSP: 002b:00007f2b6c89f150 EFLAGS: 00010246 [21451427.346663] RAX: 0000000000000000 RBX: 000055ec2fb4e7f0 RCX: 000055ec2fb4e7d0 [21451427.355626] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 000055ec2eff0f20 [21451427.364542] RBP: 0000000000000000 R08: 00000000ffffffff R09: 0000000000000000 [21451427.373512] R10: 0000000000021000 R11: 0000000000000010 R12: 00007f2b6c89f470 [21451427.382414] R13: ffffffffffffffc0 R14: 0000000000001000 R15: 0000000000000000 [21451427.391351] FS: 000055ec2fb4d480 GS: 0000000000000000 [21451450.941030] warn_bad_vsyscall: 13 callbacks suppressed [21451450.941034] exe[82819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6ee0b1ab9 cs:33 sp:7fe40077b858 ax:0 si:55c6ee10b062 di:ffffffffff600000 [21451451.080867] exe[82424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5fda91ab9 cs:33 sp:7fd5c4e34858 ax:0 si:55f5fdaeb062 di:ffffffffff600000 [21451723.104775] potentially unexpected fatal signal 5. [21451723.110064] CPU: 8 PID: 140157 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21451723.121970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21451723.131602] RIP: 0033:0x7fffffffe062 [21451723.135590] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21451723.154816] RSP: 002b:000000c00051fb90 EFLAGS: 00000297 [21451723.160495] RAX: 0000560022cbb000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21451723.169428] RDX: 0000000000000001 RSI: 0000000000065000 RDI: 0000560022cbb000 [21451723.178408] RBP: 000000c00051fc28 R08: 0000000000000009 R09: 000000000eeca000 [21451723.187327] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00051fc18 [21451723.196328] R13: 000000c0006c0150 R14: 000000c000172c40 R15: 0000000000021e97 [21451723.205247] FS: 0000000001f6c6b0 GS: 0000000000000000 [21452267.679193] potentially unexpected fatal signal 5. [21452267.684431] CPU: 53 PID: 197184 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452267.696403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452267.706032] RIP: 0033:0x7fffffffe062 [21452267.710009] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452267.729271] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21452267.736273] RAX: 000055b277603000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452267.745215] RDX: 0000000000000003 RSI: 00000000000b9000 RDI: 000055b277603000 [21452267.754131] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000017846000 [21452267.763057] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21452267.771985] R13: 000000c000143008 R14: 000000c0001fe8c0 R15: 000000000002fa54 [21452267.780900] FS: 00007f159a19e6c0 GS: 0000000000000000 [21452468.159193] potentially unexpected fatal signal 5. [21452468.164418] CPU: 19 PID: 165360 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452468.176405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452468.186044] RIP: 0033:0x7fffffffe062 [21452468.190016] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452468.209398] RSP: 002b:000000c0005cfb90 EFLAGS: 00000297 [21452468.216341] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452468.225292] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21452468.234229] RBP: 000000c0005cfc28 R08: 0000000000000000 R09: 0000000000000000 [21452468.242055] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005cfc18 [21452468.250978] R13: 000000c0005d8b10 R14: 000000c000168700 R15: 00000000000283f3 [21452468.259957] FS: 000000c00013b098 GS: 0000000000000000 [21452478.300026] potentially unexpected fatal signal 5. [21452478.305253] CPU: 73 PID: 173701 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452478.317255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452478.326943] RIP: 0033:0x7fffffffe062 [21452478.330964] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452478.351551] RSP: 002b:000000c000645b90 EFLAGS: 00000297 [21452478.358565] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452478.367466] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21452478.375003] RBP: 000000c000645c28 R08: 0000000000000000 R09: 0000000000000000 [21452478.383965] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000645c18 [21452478.392937] R13: 000000c000574990 R14: 000000c000518700 R15: 0000000000029ee5 [21452478.401850] FS: 000000c00013a898 GS: 0000000000000000 [21452549.148066] potentially unexpected fatal signal 5. [21452549.153287] CPU: 64 PID: 208050 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21452549.165256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21452549.174896] RIP: 0033:0x7fffffffe062 [21452549.178893] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21452549.198078] RSP: 002b:000000c00063fb90 EFLAGS: 00000297 [21452549.203724] RAX: 000056450fe79000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21452549.211325] RDX: 0000000000000003 RSI: 0000000000065000 RDI: 000056450fe79000 [21452549.220243] RBP: 000000c00063fc28 R08: 0000000000000009 R09: 000000001d314000 [21452549.229221] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00063fc18 [21452549.238149] R13: 000000c00016e6f0 R14: 000000c00046d6c0 R15: 0000000000032589 [21452549.247061] FS: 0000000001f6c6b0 GS: 0000000000000000 [21452921.656857] exe[175762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566a1a22ab9 cs:33 sp:7f9102aefef8 ax:0 si:200020c0 di:ffffffffff600000 [21453766.501683] potentially unexpected fatal signal 5. [21453766.506906] CPU: 1 PID: 234052 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21453766.518797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21453766.528439] RIP: 0033:0x7fffffffe062 [21453766.532443] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21453766.551630] RSP: 002b:000000c000635b90 EFLAGS: 00000297 [21453766.557247] RAX: 00007f09bd033000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21453766.566174] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f09bd033000 [21453766.575123] RBP: 000000c000635c28 R08: 0000000000000009 R09: 000000000ba82000 [21453766.584046] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000635c18 [21453766.592970] R13: 000000c00063df50 R14: 000000c000528a80 R15: 0000000000038d89 [21453766.601914] FS: 000000c00013a898 GS: 0000000000000000 [21453885.538095] exe[193302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c141e4bab9 cs:33 sp:7f4bc67b1858 ax:0 si:55c141ea5062 di:ffffffffff600000 [21453926.740056] exe[244983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55782ab5dab9 cs:33 sp:7f911c7cf858 ax:0 si:55782abb7062 di:ffffffffff600000 [21453926.878261] exe[243215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56326103cab9 cs:33 sp:7f1a643ee858 ax:0 si:563261096062 di:ffffffffff600000 [21453926.920773] exe[243215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56326103cab9 cs:33 sp:7f1a643ac858 ax:0 si:563261096062 di:ffffffffff600000 [21454125.554702] exe[252512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019188c237 cs:33 sp:7f044616aef8 ax:2f700000 si:5601918fa2f7 di:ffffffffff600000 [21454289.936490] exe[254568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624fe7a1ab9 cs:33 sp:7f99d7e41858 ax:0 si:5624fe7fb062 di:ffffffffff600000 [21454421.038312] exe[185490] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9cbdcab9 cs:33 sp:7ed17925b858 ax:0 si:55eb9cc36062 di:ffffffffff600000 [21454524.053375] exe[260691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f966a9ab9 cs:33 sp:7f2d22193858 ax:0 si:558f96703062 di:ffffffffff600000 [21454524.226734] exe[260197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56117462dab9 cs:33 sp:7f2582c89858 ax:0 si:561174687062 di:ffffffffff600000 [21454524.339878] exe[260304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454524.433650] exe[261887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454524.438807] exe[260385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56117462dab9 cs:33 sp:7f2582c89858 ax:0 si:561174687062 di:ffffffffff600000 [21454524.707563] exe[260673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56117462dab9 cs:33 sp:7f2582c89858 ax:0 si:561174687062 di:ffffffffff600000 [21454524.877490] exe[260394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454524.989904] exe[260311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1afb64ab9 cs:33 sp:7f1987fb4858 ax:0 si:55e1afbbe062 di:ffffffffff600000 [21454525.106822] exe[260718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56019e306ab9 cs:33 sp:7f4900e7a858 ax:0 si:56019e360062 di:ffffffffff600000 [21454527.268639] exe[260316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558f966a9ab9 cs:33 sp:7f2d22193858 ax:0 si:558f96703062 di:ffffffffff600000 [21454672.580477] warn_bad_vsyscall: 1 callbacks suppressed [21454672.580486] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.671718] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.773413] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.870160] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1097 di:ffffffffff600000 [21454672.984607] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1062 di:ffffffffff600000 [21454673.093042] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1b277ab9 cs:33 sp:7faf28f2d858 ax:0 si:55eb1b2d1062 di:ffffffffff600000 [21454673.343804] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454673.502958] exe[223043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454673.623689] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454673.945005] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.622286] warn_bad_vsyscall: 38 callbacks suppressed [21454677.622289] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.649306] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.797837] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454677.924303] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.033247] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.147541] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.243578] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.365198] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.366559] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454678.734316] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454682.725313] warn_bad_vsyscall: 110 callbacks suppressed [21454682.725318] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454682.854399] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454683.340519] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.468246] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.597270] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.704896] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454683.854189] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454683.965811] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454684.065528] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454684.142715] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454687.786376] warn_bad_vsyscall: 41 callbacks suppressed [21454687.786380] exe[198211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454687.878404] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454687.964450] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454688.059011] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.139467] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.258420] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.372343] exe[198211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.462994] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.603797] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454688.629959] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454692.814259] warn_bad_vsyscall: 101 callbacks suppressed [21454692.814263] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454692.982278] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.075832] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.186846] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.289633] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.315779] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454693.432820] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454693.554328] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbcb858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454693.555912] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbaa858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454693.662706] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454703.286388] warn_bad_vsyscall: 65 callbacks suppressed [21454703.286392] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454714.254956] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454720.956406] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454723.784515] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454729.460866] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454733.533072] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454733.950996] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8097 di:ffffffffff600000 [21454740.815666] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454741.353885] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454741.865771] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454748.197216] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454750.830160] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a51915eab9 cs:33 sp:7fd6ddbec858 ax:0 si:55a5191b8062 di:ffffffffff600000 [21454753.204914] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454753.453123] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454760.155279] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320097 di:ffffffffff600000 [21454761.088939] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454762.176865] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454766.253097] exe[198211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454770.056364] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454775.976498] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454784.363973] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454791.081015] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454795.338769] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454797.152832] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454797.835586] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454799.853774] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454799.912408] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454803.283261] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454803.407491] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454805.714772] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454816.461537] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454821.067549] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454825.301874] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55732c2c6ab9 cs:33 sp:7f8cdfa38858 ax:0 si:55732c320062 di:ffffffffff600000 [21454838.800653] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454839.522411] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454853.269546] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454856.821693] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454857.163577] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454858.154674] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454858.258545] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454869.435932] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454870.431232] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454880.007912] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454888.879181] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454890.119239] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454891.913923] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454892.878024] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454897.149573] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454899.451558] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a097 di:ffffffffff600000 [21454903.522908] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454908.436793] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454909.546162] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454915.414130] exe[223032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454920.724451] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454922.263618] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454925.150933] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454931.595224] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454935.444256] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454937.335030] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564313f40ab9 cs:33 sp:7f8b6a458858 ax:0 si:564313f9a062 di:ffffffffff600000 [21454938.062634] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454938.253807] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454939.094683] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454945.980467] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454947.685408] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556727f95ab9 cs:33 sp:7f6dd7756858 ax:0 si:556727fef062 di:ffffffffff600000 [21454955.929818] exe[223032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557afd52eab9 cs:33 sp:7fe4f1e6d858 ax:0 si:557afd588062 di:ffffffffff600000 [21454957.106591] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557afd52eab9 cs:33 sp:7fe4f1e6d858 ax:0 si:557afd588097 di:ffffffffff600000 [21454961.440587] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b8b87aab9 cs:33 sp:7f4dd3dfe858 ax:0 si:559b8b8d4062 di:ffffffffff600000 [21454965.555639] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b8b87aab9 cs:33 sp:7f4dd3dfe858 ax:0 si:559b8b8d4062 di:ffffffffff600000 [21454965.733943] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b8b87aab9 cs:33 sp:7f4dd3dfe858 ax:0 si:559b8b8d4097 di:ffffffffff600000 [21454975.626983] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454978.283843] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454980.415851] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454980.894727] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454986.182028] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798097 di:ffffffffff600000 [21454987.023053] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454989.684589] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454991.165438] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21454997.033758] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798097 di:ffffffffff600000 [21455000.415990] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455002.358861] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798097 di:ffffffffff600000 [21455013.494354] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455018.602736] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455018.729393] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5c773eab9 cs:33 sp:7f0871a7a858 ax:0 si:55e5c7798062 di:ffffffffff600000 [21455035.204155] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455036.456375] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455038.102573] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa097 di:ffffffffff600000 [21455046.099565] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455051.117778] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa070 di:ffffffffff600000 [21455054.756211] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455058.958891] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455060.631627] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455063.652702] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455067.052887] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455068.605314] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455070.486133] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455071.601968] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa097 di:ffffffffff600000 [21455071.666713] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c907850ab9 cs:33 sp:7f2095114858 ax:0 si:55c9078aa062 di:ffffffffff600000 [21455082.985936] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455083.589062] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455087.903179] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455090.783586] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560ea369eab9 cs:33 sp:7f98e95bb858 ax:0 si:560ea36f8062 di:ffffffffff600000 [21455099.350284] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ea8f4ab9 cs:33 sp:7efe952f0858 ax:0 si:5630ea94e097 di:ffffffffff600000 [21455102.124766] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5630ea8f4ab9 cs:33 sp:7efe952f0858 ax:0 si:5630ea94e097 di:ffffffffff600000 [21455115.361282] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455118.778260] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455119.585109] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455120.744777] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455124.502346] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455127.077113] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455129.774803] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455134.524468] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455137.241007] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455151.651115] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455152.253216] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455153.366354] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455155.229796] exe[200460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2070 di:ffffffffff600000 [21455158.687434] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455161.507899] exe[223032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455165.032147] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455167.184284] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455169.099538] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455169.401736] exe[209190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455169.634895] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455179.867172] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455193.872123] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455201.622707] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2097 di:ffffffffff600000 [21455203.960413] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455214.821327] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455215.163111] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455219.403074] exe[229379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455225.110631] exe[257676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455231.821414] exe[229379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455233.587400] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455244.997718] exe[221369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455260.320983] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455260.379397] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455269.230669] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455269.518412] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455269.935542] exe[229278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4ee488ab9 cs:33 sp:7fc9f8421858 ax:0 si:55a4ee4e2062 di:ffffffffff600000 [21455274.465274] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455276.626872] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455277.282208] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455279.595154] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455280.145748] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455286.229144] exe[221369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455290.507873] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b097 di:ffffffffff600000 [21455291.778256] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b070 di:ffffffffff600000 [21455293.176860] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b097 di:ffffffffff600000 [21455303.307164] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455305.363844] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455305.682574] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b070 di:ffffffffff600000 [21455307.275079] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b017ef1ab9 cs:33 sp:7f189d844858 ax:0 si:55b017f4b062 di:ffffffffff600000 [21455309.241817] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dc059cab9 cs:33 sp:7f782e79a858 ax:0 si:562dc05f6062 di:ffffffffff600000 [21455311.129886] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455322.860148] exe[221359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c097 di:ffffffffff600000 [21455332.589722] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455332.700931] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455334.339658] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557020ed2ab9 cs:33 sp:7f53cc1c2858 ax:0 si:557020f2c062 di:ffffffffff600000 [21455337.645000] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455339.687680] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455347.975800] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1097 di:ffffffffff600000 [21455353.540316] exe[221359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455361.261161] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455364.920682] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455367.889612] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455369.798717] exe[229273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455380.530402] exe[229379] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1097 di:ffffffffff600000 [21455383.340410] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1062 di:ffffffffff600000 [21455386.700812] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584e8267ab9 cs:33 sp:7eff1484e858 ax:0 si:5584e82c1097 di:ffffffffff600000 [21455388.035247] exe[221367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455388.502494] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455388.846054] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455393.899065] exe[229273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455397.882514] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455398.304499] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455399.487090] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455400.015083] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455401.175928] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455402.510494] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455403.104031] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455403.456675] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455409.959752] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455411.741970] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455420.695502] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455420.886275] exe[257676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455421.977215] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455422.480950] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455424.616833] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455426.514731] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455427.906277] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455428.885023] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455429.688117] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455430.181407] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455431.620573] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0062 di:ffffffffff600000 [21455431.887496] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b3c5276ab9 cs:33 sp:7f14cd44a858 ax:0 si:55b3c52d0097 di:ffffffffff600000 [21455436.831722] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8f7e4ab9 cs:33 sp:7f00506ec858 ax:0 si:558e8f83e062 di:ffffffffff600000 [21455440.163203] exe[229278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8f7e4ab9 cs:33 sp:7f00506ec858 ax:0 si:558e8f83e062 di:ffffffffff600000 [21455444.356958] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e8f7e4ab9 cs:33 sp:7f00506ec858 ax:0 si:558e8f83e070 di:ffffffffff600000 [21455447.715063] exe[257676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030643aab9 cs:33 sp:7f58acf13858 ax:0 si:560306494062 di:ffffffffff600000 [21455451.872533] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030643aab9 cs:33 sp:7f58acf13858 ax:0 si:560306494062 di:ffffffffff600000 [21455453.367796] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56030643aab9 cs:33 sp:7f58acf13858 ax:0 si:560306494062 di:ffffffffff600000 [21455456.529530] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455458.269051] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6097 di:ffffffffff600000 [21455458.907214] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455464.483039] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455471.610323] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455479.155044] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6097 di:ffffffffff600000 [21455482.641860] exe[229278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455484.878898] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a97ee7cab9 cs:33 sp:7f79aae9f858 ax:0 si:55a97eed6062 di:ffffffffff600000 [21455489.117478] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5587f5f5cab9 cs:33 sp:7fb178cf3858 ax:0 si:5587f5fb6062 di:ffffffffff600000 [21455494.241499] exe[229512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455500.248834] exe[222219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455501.843485] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455502.688126] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792097 di:ffffffffff600000 [21455508.247012] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455508.378730] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455512.119932] exe[221358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455513.946981] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792097 di:ffffffffff600000 [21455518.676302] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455519.224262] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee51738ab9 cs:33 sp:7f164e3af858 ax:0 si:55ee51792062 di:ffffffffff600000 [21455536.874916] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558d713fab9 cs:33 sp:7f64060f3858 ax:0 si:5558d7199062 di:ffffffffff600000 [21455538.183411] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558d713fab9 cs:33 sp:7f64060f3858 ax:0 si:5558d7199070 di:ffffffffff600000 [21455540.907737] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558d713fab9 cs:33 sp:7f64060f3858 ax:0 si:5558d7199062 di:ffffffffff600000 [21455554.070102] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a1225fab9 cs:33 sp:7f49bf945858 ax:0 si:562a122b9062 di:ffffffffff600000 [21455556.597971] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a1225fab9 cs:33 sp:7f49bf945858 ax:0 si:562a122b9062 di:ffffffffff600000 [21455566.166792] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455567.356169] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455567.741223] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455569.553311] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455572.950611] exe[221440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399097 di:ffffffffff600000 [21455574.231556] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560b4f33fab9 cs:33 sp:7fa111425858 ax:0 si:560b4f399062 di:ffffffffff600000 [21455577.045483] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455580.011335] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455580.324463] exe[229276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455586.419520] exe[221401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56401d427ab9 cs:33 sp:7f3cab0ef858 ax:0 si:56401d481062 di:ffffffffff600000 [21455599.164433] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455599.663806] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455600.370593] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455601.617755] exe[221362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455602.568034] exe[222480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455603.932952] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf097 di:ffffffffff600000 [21455611.900772] exe[221512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455613.037794] exe[221514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455624.475093] exe[221464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455625.938343] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455626.770998] exe[262790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558eca2a2ab9 cs:33 sp:7f94696b4ef8 ax:0 si:20000140 di:ffffffffff600000 [21455626.909133] exe[236204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c15b8f2ab9 cs:33 sp:7f7908ba0ef8 ax:0 si:20000140 di:ffffffffff600000 [21455627.685288] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637b5d75ab9 cs:33 sp:7f7b301bf858 ax:0 si:5637b5dcf062 di:ffffffffff600000 [21455630.058756] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455630.102857] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557097 di:ffffffffff600000 [21455631.690925] exe[221401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455631.839303] exe[254739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455634.586555] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455636.119592] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455638.399557] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455640.161047] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455641.979261] exe[254547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455642.611888] exe[229282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455643.231970] exe[221367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455644.065895] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455650.578375] exe[222230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455655.559316] exe[221445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455661.102114] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455661.549752] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455662.275653] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578464fdab9 cs:33 sp:7f1b4dfa7858 ax:0 si:557846557062 di:ffffffffff600000 [21455666.501867] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455667.977274] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455674.753406] exe[229696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455676.371178] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455685.906028] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455693.267970] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455696.630499] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d062 di:ffffffffff600000 [21455701.477095] exe[202735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562288b43ab9 cs:33 sp:7ff03fd7c858 ax:0 si:562288b9d097 di:ffffffffff600000 [21455709.992418] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455711.360715] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455712.164761] exe[200486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455713.490919] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455714.065206] exe[223042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455721.056465] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455725.704028] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455727.826709] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455729.520361] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455729.880799] exe[205370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f834a08ab9 cs:33 sp:7fa33adf2858 ax:0 si:55f834a62062 di:ffffffffff600000 [21455739.712038] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455740.658732] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455742.184305] exe[205523] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455749.813084] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455753.426205] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455760.077282] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455761.980566] exe[205441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455762.980724] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455765.412714] exe[209187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455767.605899] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455767.794929] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455768.810620] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455777.444820] exe[198158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6097 di:ffffffffff600000 [21455777.567378] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455782.478847] exe[255104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202628cab9 cs:33 sp:7f2f0b4c7858 ax:0 si:5620262e6062 di:ffffffffff600000 [21455788.240306] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ce5bb7ab9 cs:33 sp:7fb59ad64858 ax:0 si:558ce5c11062 di:ffffffffff600000 [21455805.186522] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638621a8ab9 cs:33 sp:7fdad3558858 ax:0 si:563862202062 di:ffffffffff600000 [21455807.413415] exe[223028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638621a8ab9 cs:33 sp:7fdad3558858 ax:0 si:563862202062 di:ffffffffff600000 [21455813.042457] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5638621a8ab9 cs:33 sp:7fdad3558858 ax:0 si:563862202097 di:ffffffffff600000 [21455815.027260] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455817.074043] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455819.606700] exe[223043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455819.882974] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55601325eab9 cs:33 sp:7fea20b74858 ax:0 si:5560132b8062 di:ffffffffff600000 [21455825.572639] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3c8f10ab9 cs:33 sp:7f5fd4c6b858 ax:0 si:55f3c8f6a062 di:ffffffffff600000 [21455834.668963] exe[198209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56515df14ab9 cs:33 sp:7f2c3b52f858 ax:0 si:56515df6e062 di:ffffffffff600000 [21455850.728499] exe[205373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f51f3ab9 cs:33 sp:7ffa28dfe858 ax:0 si:5631f524d062 di:ffffffffff600000 [21455851.441178] exe[223044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f51f3ab9 cs:33 sp:7ffa28dfe858 ax:0 si:5631f524d062 di:ffffffffff600000 [21455854.377874] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631f51f3ab9 cs:33 sp:7ffa28dfe858 ax:0 si:5631f524d062 di:ffffffffff600000 [21455862.232590] exe[216470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21455865.672576] exe[216504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455869.961062] exe[205525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21455870.133984] exe[205385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455870.240747] exe[200473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21455871.369073] exe[200481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455879.085834] exe[221441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207097 di:ffffffffff600000 [21455881.447717] exe[221367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd061adab9 cs:33 sp:7fbbe10c8858 ax:0 si:55cd06207062 di:ffffffffff600000 [21456118.721770] potentially unexpected fatal signal 11. [21456118.727094] CPU: 30 PID: 280467 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21456118.739098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21456118.748734] RIP: 0033:0x55d7c59cee48 [21456118.752705] Code: 8b 54 15 10 48 39 15 d7 e8 c4 00 0f 82 c6 01 00 00 4c 8b 80 78 04 00 00 49 39 d6 48 8b 0c 24 4c 0f 42 f2 48 8b b0 70 04 00 00 <66> 0f 6f 05 20 81 06 00 4c 89 c2 48 c1 e2 04 4c 8d 5e 01 48 01 ca [21456118.771891] RSP: 002b:00007f8aed372170 EFLAGS: 00010246 [21456118.777557] RAX: 000055d7c5ac80c0 RBX: 000055d7c66257f0 RCX: 000055d7c66257f0 [21456118.785112] RDX: 0000000000000000 RSI: 0000000000000148 RDI: 0000000000000001 [21456118.794059] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 [21456118.803014] R10: 0000000000021000 R11: 0000000000000010 R12: 0000000000000001 [21456118.811941] R13: 000055d7c661db60 R14: 0000000000000000 R15: 0000000000000001 [21456118.820883] FS: 000055d7c6624480 GS: 0000000000000000 [21456368.022678] exe[292956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868026ab9 cs:33 sp:7f2b44340858 ax:0 si:556868080062 di:ffffffffff600000 [21456494.905253] exe[289384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456495.370778] exe[289369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456495.418194] exe[262400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8daf81858 ax:0 si:564966704062 di:ffffffffff600000 [21456496.608351] exe[290038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456496.800773] exe[298034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456498.466626] exe[272159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456499.006290] exe[272411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456503.143136] exe[289694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456503.333939] exe[298563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456503.638016] exe[262196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456503.883772] exe[276612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f35d858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456504.112958] exe[262195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456504.340089] exe[289392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456504.539187] exe[262195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456504.759838] exe[265386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456504.978607] exe[272995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456505.261093] exe[262943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456508.402863] warn_bad_vsyscall: 6 callbacks suppressed [21456508.402867] exe[289388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456508.537669] exe[262029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456508.546984] exe[298042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8daf81858 ax:0 si:564966704062 di:ffffffffff600000 [21456508.679746] exe[260202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456508.847149] exe[298575] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456509.043512] exe[289494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456509.230462] exe[276603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456509.266566] exe[277017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456509.328375] exe[276638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456509.369582] exe[276638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456513.441233] warn_bad_vsyscall: 81 callbacks suppressed [21456513.441236] exe[262029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b097 di:ffffffffff600000 [21456513.549367] exe[290024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187097 di:ffffffffff600000 [21456513.845149] exe[298042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456514.013889] exe[262209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456514.178607] exe[276603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456514.319553] exe[262195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456514.466224] exe[289378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456514.651231] exe[261001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456514.688730] exe[297845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456514.874248] exe[289310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456518.596191] warn_bad_vsyscall: 25 callbacks suppressed [21456518.596195] exe[260381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456518.739075] exe[265289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456518.906730] exe[289485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456518.951481] exe[289653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456519.136672] exe[298568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456519.261055] exe[282634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa2d858 ax:0 si:564140187062 di:ffffffffff600000 [21456519.376198] exe[272988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456519.485841] exe[289388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456519.596218] exe[289694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456519.747608] exe[272411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456523.701767] warn_bad_vsyscall: 32 callbacks suppressed [21456523.701771] exe[297849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704097 di:ffffffffff600000 [21456523.851927] exe[278227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456523.968029] exe[260293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456524.138529] exe[260326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456524.293183] exe[272441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456524.487610] exe[289916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555abe847ab9 cs:33 sp:7fc7d7ee4858 ax:0 si:555abe8a1062 di:ffffffffff600000 [21456524.636601] exe[272066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456524.898325] exe[260181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456525.111467] exe[289337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f37e858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456525.144268] exe[289678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f37e858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456528.735258] warn_bad_vsyscall: 54 callbacks suppressed [21456528.735261] exe[266467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456528.857051] exe[262407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8daf81858 ax:0 si:564966704062 di:ffffffffff600000 [21456528.989301] exe[305450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456529.258166] exe[298720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456529.305603] exe[262431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456529.492372] exe[282638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b062 di:ffffffffff600000 [21456529.639379] exe[262462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456529.702267] exe[262425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187062 di:ffffffffff600000 [21456529.838656] exe[281364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56233ced1ab9 cs:33 sp:7f958f3c0858 ax:0 si:56233cf2b070 di:ffffffffff600000 [21456529.982536] exe[261855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81fa4e858 ax:0 si:564140187070 di:ffffffffff600000 [21456533.833300] warn_bad_vsyscall: 26 callbacks suppressed [21456533.833304] exe[260385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649666aaab9 cs:33 sp:7ff8dafa2858 ax:0 si:564966704062 di:ffffffffff600000 [21456533.974542] exe[260319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.002319] exe[260319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.030287] exe[260276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.057690] exe[260276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.085170] exe[260397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.113883] exe[260361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.143265] exe[260361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.169860] exe[262396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456534.196693] exe[262396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56414012dab9 cs:33 sp:7fd81f5fe858 ax:0 si:564140187062 di:ffffffffff600000 [21456576.862970] warn_bad_vsyscall: 60 callbacks suppressed [21456576.862973] exe[304276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593c2c4eab9 cs:33 sp:7faf15832858 ax:0 si:5593c2ca8062 di:ffffffffff600000 [21456577.038604] exe[281314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2e71f9ab9 cs:33 sp:7fd2ea4fa858 ax:0 si:55f2e7253062 di:ffffffffff600000 [21456778.595862] exe[312068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cd60affab9 cs:33 sp:7f99faf12ef8 ax:0 si:20001600 di:ffffffffff600000 [21457156.932066] potentially unexpected fatal signal 5. [21457156.937297] CPU: 66 PID: 308290 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21457156.949328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21457156.958973] RIP: 0033:0x7fffffffe062 [21457156.962988] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21457156.982203] RSP: 002b:000000c0005c5b90 EFLAGS: 00000297 [21457156.989227] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21457156.996784] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000556685a00000 [21457157.004354] RBP: 000000c0005c5c28 R08: 0000000000000000 R09: 0000000000000000 [21457157.013301] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005c5c18 [21457157.022242] R13: 000000c0005c9f50 R14: 000000c0005281c0 R15: 000000000004a9d9 [21457157.031159] FS: 0000000001f6c6b0 GS: 0000000000000000 [21457350.981244] exe[314203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c4eba0aab9 cs:33 sp:7f4b38ad3ef8 ax:0 si:20002340 di:ffffffffff600000 [21457840.978269] potentially unexpected fatal signal 5. [21457840.983500] CPU: 40 PID: 300043 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21457840.995498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21457841.005209] RIP: 0033:0x7fffffffe062 [21457841.010578] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21457841.031187] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21457841.038224] RAX: 00007fb2b8bb0000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21457841.047153] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007fb2b8bb0000 [21457841.056096] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000a915000 [21457841.065031] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21457841.073966] R13: 0000000002883b00 R14: 000000c0002fd500 R15: 0000000000049000 [21457841.082902] FS: 000000000463f3c0 GS: 0000000000000000 [21458571.829891] potentially unexpected fatal signal 5. [21458571.835121] CPU: 33 PID: 351394 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21458571.847148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21458571.856777] RIP: 0033:0x7fffffffe062 [21458571.860810] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21458571.880147] RSP: 002b:000000c0006afb90 EFLAGS: 00000297 [21458571.887161] RAX: 0000564ea5e00000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21458571.896117] RDX: 0000000000000003 RSI: 0000000000196000 RDI: 0000564ea5e00000 [21458571.905100] RBP: 000000c0006afc28 R08: 0000000000000009 R09: 000000000a248000 [21458571.914067] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0006afc18 [21458571.923015] R13: 000000c0006b7620 R14: 000000c000007c00 R15: 0000000000055934 [21458571.931987] FS: 000000c00013b098 GS: 0000000000000000 [21458972.601295] exe[353364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e3e519ab9 cs:33 sp:7f57c6abd858 ax:0 si:555e3e573062 di:ffffffffff600000 [21459088.679755] exe[347574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620e88afab9 cs:33 sp:7f21018a4ef8 ax:0 si:20000040 di:ffffffffff600000 [21459597.368617] exe[327770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a21a1c6237 cs:33 sp:7ee82d39fef8 ax:2f700000 si:55a21a2342f7 di:ffffffffff600000 [21460278.285743] exe[339917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55764e71cab9 cs:33 sp:7fdf6c512858 ax:0 si:55764e776097 di:ffffffffff600000 [21460671.403584] exe[377114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c4c49f237 cs:33 sp:7f27dc2a7ef8 ax:2f700000 si:558c4c50d2f7 di:ffffffffff600000 [21461089.227994] exe[420544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55672df6dab9 cs:33 sp:7f4699cb4858 ax:0 si:55672dfc7070 di:ffffffffff600000 [21461274.972092] exe[423796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e202a8ab9 cs:33 sp:7fef9d91def8 ax:0 si:20000b00 di:ffffffffff600000 [21461459.019602] exe[396466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d7d1a66ab9 cs:33 sp:7f2e13aad858 ax:0 si:55d7d1ac0062 di:ffffffffff600000 [21461495.056352] exe[344611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bf6d19ab9 cs:33 sp:7f4a3a92eef8 ax:0 si:20000240 di:ffffffffff600000 [21461495.216417] exe[396962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d5eb93ab9 cs:33 sp:7f0c034d7ef8 ax:0 si:20000240 di:ffffffffff600000 [21461525.259533] exe[416934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b7c37aab9 cs:33 sp:7f1428487858 ax:0 si:559b7c3d4070 di:ffffffffff600000 [21461631.466325] potentially unexpected fatal signal 5. [21461631.471581] CPU: 9 PID: 343536 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21461631.483578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21461631.493219] RIP: 0033:0x7fffffffe062 [21461631.497243] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21461631.517838] RSP: 002b:000000c000395be8 EFLAGS: 00000297 [21461631.523514] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21461631.531165] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21461631.538718] RBP: 000000c000395c80 R08: 0000000000000000 R09: 0000000000000000 [21461631.546266] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000395c70 [21461631.553813] R13: 000000c0004a2000 R14: 000000c000007340 R15: 0000000000052e7b [21461631.561361] FS: 000000c000510098 GS: 0000000000000000 [21461882.371487] exe[403778] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560d205eab9 cs:33 sp:7fcb61180858 ax:0 si:5560d20b8097 di:ffffffffff600000 [21462027.546570] exe[432030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562a88979ab9 cs:33 sp:7ec07bfe3858 ax:0 si:562a889d3062 di:ffffffffff600000 [21462400.064490] potentially unexpected fatal signal 5. [21462400.069762] CPU: 91 PID: 413916 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21462400.081743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21462400.091378] RIP: 0033:0x7fffffffe062 [21462400.095371] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21462400.114583] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21462400.120216] RAX: 00007ff3de963000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21462400.127820] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007ff3de963000 [21462400.135401] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000b3ef000 [21462400.144331] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21462400.153281] R13: 000000c000200008 R14: 000000c0002028c0 R15: 00000000000645cd [21462400.162222] FS: 00007fb88f7fe6c0 GS: 0000000000000000 [21462419.648958] potentially unexpected fatal signal 5. [21462419.654207] CPU: 80 PID: 450647 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21462419.666237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21462419.675869] RIP: 0033:0x7fffffffe062 [21462419.679856] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21462419.699052] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21462419.704743] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21462419.713675] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055ffe0400000 [21462419.722596] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21462419.731532] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [21462419.740450] R13: 000000c000143008 R14: 000000c000429a40 R15: 000000000006dbce [21462419.749346] FS: 00007f8083fff6c0 GS: 0000000000000000 [21462500.503105] potentially unexpected fatal signal 5. [21462500.508330] CPU: 2 PID: 408775 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21462500.520233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21462500.529866] RIP: 0033:0x7fffffffe062 [21462500.533841] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21462500.553017] RSP: 002b:000000c00016fb90 EFLAGS: 00000297 [21462500.558696] RAX: 000055acd50d1000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21462500.567600] RDX: 0000000000000001 RSI: 0000000000054000 RDI: 000055acd50d1000 [21462500.576550] RBP: 000000c00016fc28 R08: 0000000000000009 R09: 000000000cb7f000 [21462500.585501] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00016fc18 [21462500.594474] R13: 000000c000167f20 R14: 000000c00015d340 R15: 0000000000063841 [21462500.603441] FS: 000000c000180898 GS: 0000000000000000 [21462554.601170] exe[455149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d2cc78ab9 cs:33 sp:7f26b9e7a858 ax:0 si:558d2ccd2062 di:ffffffffff600000 [21463728.603384] potentially unexpected fatal signal 5. [21463728.608621] CPU: 10 PID: 461475 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21463728.620590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21463728.630236] RIP: 0033:0x7fffffffe062 [21463728.634282] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21463728.654885] RSP: 002b:000000c0006c1b90 EFLAGS: 00000297 [21463728.661863] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21463728.670825] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 0000561707200000 [21463728.679754] RBP: 000000c0006c1c28 R08: 0000000000000000 R09: 0000000000000000 [21463728.688662] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006c1c18 [21463728.697606] R13: 000000c0004357d0 R14: 000000c00047d880 R15: 000000000006f840 [21463728.706564] FS: 000000c00013b098 GS: 0000000000000000 [21463918.363665] exe[498331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e37d1aaab9 cs:33 sp:7faae6ff0858 ax:0 si:55e37d204062 di:ffffffffff600000 [21464978.895311] exe[513103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565e578b237 cs:33 sp:7ee19ecf6ef8 ax:2f700000 si:5565e57f92f7 di:ffffffffff600000 [21465814.712561] exe[532275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581817deab9 cs:33 sp:7f7372e73858 ax:0 si:558181838062 di:ffffffffff600000 [21465970.933597] exe[531225] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56275ec32ab9 cs:33 sp:7fb8148e7858 ax:0 si:56275ec8c062 di:ffffffffff600000 [21465998.713880] exe[530024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5575ef52dab9 cs:33 sp:7fb51ad60858 ax:0 si:5575ef587062 di:ffffffffff600000 [21466073.649116] exe[489951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55850896a6a2 cs:33 sp:7f793ead4f98 ax:7f793ead4fb0 si:ffffffffff600000 di:7f793ead4fb0 [21466214.704919] exe[512754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5634298ce237 cs:33 sp:7ea8b58b3ef8 ax:2f700000 si:56342993c2f7 di:ffffffffff600000 [21467351.746990] potentially unexpected fatal signal 5. [21467351.752328] CPU: 67 PID: 493396 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21467351.764322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21467351.773934] RIP: 0033:0x7fffffffe062 [21467351.777897] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21467351.797143] RSP: 002b:000000c0002c1b90 EFLAGS: 00000297 [21467351.802824] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21467351.811731] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21467351.820668] RBP: 000000c0002c1c28 R08: 0000000000000000 R09: 0000000000000000 [21467351.829589] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0002c1c18 [21467351.838487] R13: 000000c000432150 R14: 000000c0004d6a80 R15: 0000000000078237 [21467351.847425] FS: 000000c00013b898 GS: 0000000000000000 [21467364.667673] exe[520501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bc06efbab9 cs:33 sp:7f303b88b858 ax:0 si:55bc06f55062 di:ffffffffff600000 [21467469.112354] exe[561975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556feb65e237 cs:33 sp:7f41d63aaef8 ax:2f700000 si:556feb6cc2f7 di:ffffffffff600000 [21467749.282585] potentially unexpected fatal signal 5. [21467749.287818] CPU: 24 PID: 554176 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21467749.299863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21467749.309507] RIP: 0033:0x7fffffffe062 [21467749.313506] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21467749.332713] RSP: 002b:000000c0002c1b90 EFLAGS: 00000297 [21467749.338351] RAX: 00007fa409800000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21467749.345893] RDX: 0000000000000001 RSI: 0000000000400000 RDI: 00007fa409800000 [21467749.353432] RBP: 000000c0002c1c28 R08: 0000000000000009 R09: 0000000021a00000 [21467749.360223] potentially unexpected fatal signal 5. [21467749.360989] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0002c1c18 [21467749.366181] CPU: 39 PID: 560755 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21467749.366185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21467749.373719] R13: 000000c0002b7da0 R14: 000000c0002956c0 R15: 0000000000085c57 [21467749.373721] FS: 000000c00013b098 GS: 0000000000000000 [21467749.408585] RIP: 0033:0x7fffffffe062 [21467749.413949] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21467749.433154] RSP: 002b:000000c0002c1b90 EFLAGS: 00000297 [21467749.440241] RAX: 0000558eeee11000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21467749.449180] RDX: 0000000000000001 RSI: 0000000000065000 RDI: 0000558eeee11000 [21467749.458129] RBP: 000000c0002c1c28 R08: 0000000000000009 R09: 0000000014a9b000 [21467749.467042] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0002c1c18 [21467749.475991] R13: 000000c0002b7da0 R14: 000000c0002956c0 R15: 0000000000085c57 [21467749.484910] FS: 000000c00013b098 GS: 0000000000000000 [21467759.095320] exe[570907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d255a9adb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f006faf7fb0 [21467760.423716] exe[520433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5625160dbdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f2b1c924fb0 [21467763.640219] exe[559748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c91627db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f54467fefb0 [21467842.868358] exe[577457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56398add9237 cs:33 sp:7ec359a47ef8 ax:2f700000 si:56398ae472f7 di:ffffffffff600000 [21467866.934382] exe[572482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55739bbf8db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7efddcc3ffb0 [21467886.984744] exe[576231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee683cbdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f6ae76ecfb0 [21467890.678766] exe[576497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605b6f1cdb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7fd8be6acfb0 [21467892.542036] exe[576023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1b1db3db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7eef2a7e2fb0 [21467899.102611] exe[574692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555a1e1b6db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7fb40c7fefb0 [21467899.244024] exe[574672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d5e2533db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f304e5c2fb0 [21467904.440820] exe[559762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5581f3792db1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7ed9d844afb0 [21467918.653559] exe[535838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a09259edb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7ed8df9dbfb0 [21468226.191778] exe[512974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cde925aab9 cs:33 sp:7eb9254d5858 ax:0 si:55cde92b4062 di:ffffffffff600000 [21468246.434472] exe[592923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614c89f0ab9 cs:33 sp:7ece0823eef8 ax:0 si:20002780 di:ffffffffff600000 [21468599.402746] exe[533564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c14e08ddb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f2261f17fb0 [21468710.682821] exe[595403] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ebd1687ab9 cs:33 sp:7ecea8dfeef8 ax:0 si:200000c0 di:ffffffffff600000 [21469178.740239] exe[553398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0c9270ab9 cs:33 sp:7f3347cae858 ax:0 si:55b0c92ca062 di:ffffffffff600000 [21469178.847277] exe[554800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c484ecfab9 cs:33 sp:7f9e2c0ca858 ax:0 si:55c484f29062 di:ffffffffff600000 [21469178.890347] exe[554800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c484ecfab9 cs:33 sp:7f9e2c0a9858 ax:0 si:55c484f29062 di:ffffffffff600000 [21469178.899337] exe[555134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55afb5d21ab9 cs:33 sp:7fd254341858 ax:0 si:55afb5d7b062 di:ffffffffff600000 [21469179.063525] exe[552157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a02698aab9 cs:33 sp:7f65a9d21858 ax:0 si:55a0269e4062 di:ffffffffff600000 [21469179.236431] exe[552242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c484ecfab9 cs:33 sp:7f9e2c0ca858 ax:0 si:55c484f29062 di:ffffffffff600000 [21469179.386465] exe[587752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b0c9270ab9 cs:33 sp:7f3347cae858 ax:0 si:55b0c92ca062 di:ffffffffff600000 [21469179.551832] exe[552188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a02698aab9 cs:33 sp:7f65a9d21858 ax:0 si:55a0269e4062 di:ffffffffff600000 [21469297.758573] potentially unexpected fatal signal 5. [21469297.763809] CPU: 78 PID: 608449 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469297.775843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469297.785468] RIP: 0033:0x7fffffffe062 [21469297.789441] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469297.808598] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469297.814206] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469297.821729] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469297.829250] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469297.836772] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21469297.844286] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469297.851826] FS: 000000c00013b098 GS: 0000000000000000 [21469298.163765] potentially unexpected fatal signal 5. [21469298.168991] CPU: 41 PID: 602132 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469298.180980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469298.190676] RIP: 0033:0x7fffffffe062 [21469298.194636] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469298.213831] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469298.219866] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469298.227452] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469298.236394] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469298.243954] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000029c18 [21469298.252900] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469298.261834] FS: 000000c00013b098 GS: 0000000000000000 [21469298.598127] potentially unexpected fatal signal 5. [21469298.603348] CPU: 78 PID: 618111 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469298.615334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469298.617411] potentially unexpected fatal signal 5. [21469298.625001] RIP: 0033:0x7fffffffe062 [21469298.625006] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469298.630286] CPU: 25 PID: 604302 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469298.630288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469298.630294] RIP: 0033:0x7fffffffe062 [21469298.630298] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21469298.630299] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469298.630302] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469298.630302] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469298.630304] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469298.630304] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21469298.630305] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469298.630306] FS: 000000c00013b098 GS: 0000000000000000 [21469298.757094] RSP: 002b:000000c000029b90 EFLAGS: 00000297 [21469298.762778] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21469298.771718] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21469298.780660] RBP: 000000c000029c28 R08: 0000000000000000 R09: 0000000000000000 [21469298.789618] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000029c18 [21469298.798584] R13: 000000c0002dc150 R14: 000000c0001fefc0 R15: 0000000000080931 [21469298.807504] FS: 000000c00013b098 GS: 0000000000000000 [21469574.669749] potentially unexpected fatal signal 11. [21469574.675076] CPU: 32 PID: 620584 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21469574.687178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21469574.696819] RIP: 0033:0x564aa86f1c25 [21469574.700813] Code: c0 0f 85 46 01 00 00 41 0f 11 82 c0 02 00 00 48 89 15 17 07 c6 00 48 89 15 08 07 c6 00 48 89 da 89 ee bf 01 00 00 00 45 31 e4 b6 06 00 00 e9 28 fd ff ff 90 e8 7b 01 00 00 41 89 c4 85 c0 0f [21469574.720112] RSP: 002b:00007f3f689e4440 EFLAGS: 00010246 [21469574.725790] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000564aa86f1e0d [21469574.733364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [21469574.740950] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000564aa9352320 [21469574.748536] R10: 0000564aa9353480 R11: 0000564aa9352320 R12: 0000000000000000 [21469574.756110] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21469574.763681] FS: 0000564aa9353480 GS: 0000000000000000 [21470980.613558] potentially unexpected fatal signal 5. [21470980.618804] CPU: 89 PID: 655177 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21470980.630782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21470980.640410] RIP: 0033:0x7fffffffe062 [21470980.644376] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21470980.663560] RSP: 002b:000000c0005d9b90 EFLAGS: 00000297 [21470980.669251] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21470980.678162] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 00007f6afe600000 [21470980.687125] RBP: 000000c0005d9c28 R08: 0000000000000000 R09: 0000000000000000 [21470980.694685] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005d9c18 [21470980.703643] R13: 000000c000296f60 R14: 000000c000498e00 R15: 000000000009ed0e [21470980.712558] FS: 000000c00013b098 GS: 0000000000000000 [21471310.267546] exe[632672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acda42fab9 cs:33 sp:7f04176f0858 ax:0 si:55acda489062 di:ffffffffff600000 [21471753.283716] exe[679113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55776f0caab9 cs:33 sp:7fe5489ea858 ax:0 si:55776f124062 di:ffffffffff600000 [21471761.906531] exe[594577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558308062ab9 cs:33 sp:7f2e6bfacef8 ax:0 si:20000100 di:ffffffffff600000 [21471762.104739] exe[594663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2d81e3ab9 cs:33 sp:7f42fd486ef8 ax:0 si:20000100 di:ffffffffff600000 [21472111.523931] exe[623095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a646ed237 cs:33 sp:7fc3e4737ef8 ax:2f700000 si:563a6475b2f7 di:ffffffffff600000 [21472569.034266] exe[689624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472569.308129] exe[690338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56243b26cab9 cs:33 sp:7f089bd02858 ax:0 si:56243b2c6097 di:ffffffffff600000 [21472569.555031] exe[689413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472569.807115] exe[688626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56243b26cab9 cs:33 sp:7f089bd02858 ax:0 si:56243b2c6097 di:ffffffffff600000 [21472570.054573] exe[672615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472570.231706] exe[690344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596591d5ab9 cs:33 sp:7f311c543858 ax:0 si:55965922f097 di:ffffffffff600000 [21472570.484629] exe[690352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e062 di:ffffffffff600000 [21472571.749834] exe[689805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c213c04ab9 cs:33 sp:7f144407b858 ax:0 si:55c213c5e097 di:ffffffffff600000 [21472684.647192] exe[684550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5596591d5ab9 cs:33 sp:7f311c543858 ax:0 si:55965922f062 di:ffffffffff600000 [21472684.800694] exe[670931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b18da7ab9 cs:33 sp:7f6b6e842858 ax:0 si:562b18e01062 di:ffffffffff600000 [21472727.258715] exe[694910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5636eea98ab9 cs:33 sp:7f2d5b6e4ef8 ax:0 si:20000980 di:ffffffffff600000 [21472832.318082] exe[679524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556287e96ab9 cs:33 sp:7ecd6a756ef8 ax:0 si:20002780 di:ffffffffff600000 [21472917.771566] potentially unexpected fatal signal 5. [21472917.776782] CPU: 89 PID: 621861 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21472917.788766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21472917.798417] RIP: 0033:0x7fffffffe062 [21472917.800096] potentially unexpected fatal signal 5. [21472917.802400] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21472917.807814] CPU: 29 PID: 661226 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21472917.807816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21472917.807820] RIP: 0033:0x7fffffffe062 [21472917.807824] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21472917.827032] RSP: 002b:000000c0004e7b90 EFLAGS: 00000297 [21472917.827034] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21472917.827035] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21472917.827035] RBP: 000000c0004e7c28 R08: 0000000000000000 R09: 0000000000000000 [21472917.827036] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004e7c18 [21472917.827036] R13: 000000c0001a1800 R14: 000000c0003fe540 R15: 00000000000975d1 [21472917.827037] FS: 000000c000180898 GS: 0000000000000000 [21472917.837444] potentially unexpected fatal signal 5. [21472917.840387] RSP: 002b:000000c0004e7b90 EFLAGS: 00000297 [21472917.850027] CPU: 94 PID: 697815 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21472917.850029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21472917.850033] RIP: 0033:0x7fffffffe062 [21472917.850035] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21472917.850036] RSP: 002b:000000c0004e7b90 EFLAGS: 00000297 [21472917.855365] RAX: 0000561133622000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21472917.855366] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000561133622000 [21472917.855366] RBP: 000000c0004e7c28 R08: 0000000000000009 R09: 0000000000dfc000 [21472917.855367] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0004e7c18 [21472917.855367] R13: 000000c0001a1800 R14: 000000c0003fe540 R15: 00000000000975d1 [21472917.855368] FS: 000000c000180898 GS: 0000000000000000 [21472918.041108] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21472918.048674] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21472918.057581] RBP: 000000c0004e7c28 R08: 0000000000000000 R09: 0000000000000000 [21472918.065169] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004e7c18 [21472918.074097] R13: 000000c0001a1800 R14: 000000c0003fe540 R15: 00000000000975d1 [21472918.083027] FS: 000000c000180898 GS: 0000000000000000 [21473050.901525] exe[675123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb0359ab9 cs:33 sp:7eff9c3fd858 ax:0 si:556fb03b3062 di:ffffffffff600000 [21473051.090358] exe[707647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b863faab9 cs:33 sp:7f375bd07858 ax:0 si:557b86454062 di:ffffffffff600000 [21473161.005410] exe[706242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56188ba59ab9 cs:33 sp:7f5da51af858 ax:0 si:56188bab3062 di:ffffffffff600000 [21473273.199113] potentially unexpected fatal signal 5. [21473273.204361] CPU: 45 PID: 641771 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21473273.216341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21473273.226010] RIP: 0033:0x7fffffffe062 [21473273.230031] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21473273.254833] RSP: 002b:000000c0007e9be8 EFLAGS: 00000297 [21473273.261825] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21473273.270749] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21473273.279737] RBP: 000000c0007e9c80 R08: 0000000000000000 R09: 0000000000000000 [21473273.288645] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0007e9c70 [21473273.297597] R13: 000000c000709000 R14: 000000c0004508c0 R15: 0000000000099c66 [21473273.306549] FS: 000000c000181098 GS: 0000000000000000 [21473639.198103] exe[713242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f99343237 cs:33 sp:7facd3edbef8 ax:2f700000 si:556f993b12f7 di:ffffffffff600000 [21473639.309251] exe[719280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584975a6237 cs:33 sp:7f54d430def8 ax:2f700000 si:5584976142f7 di:ffffffffff600000 [21474433.226169] potentially unexpected fatal signal 11. [21474433.231508] CPU: 47 PID: 732070 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21474433.243494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21474433.253144] RIP: 0033:0x55ababf92939 [21474433.257194] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [21474433.276444] RSP: 002b:00007faacfe42440 EFLAGS: 00010206 [21474433.283894] RAX: 00000000000000ac RBX: 0000000000000000 RCX: 000055ababf92dd3 [21474433.292879] RDX: 00000000000000ac RSI: 0000000000000000 RDI: 0000000001200011 [21474433.301848] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21474433.310787] R10: 000055abacbf4750 R11: 0000000000000246 R12: 00000000000000ac [21474433.319760] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [21474433.328713] FS: 000055abacbf4480 GS: 0000000000000000 [21474486.052660] exe[724386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e48931bab9 cs:33 sp:7f9d7503c858 ax:0 si:55e489375070 di:ffffffffff600000 [21474522.088569] exe[727745] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568f7a82ab9 cs:33 sp:7fda66dbf858 ax:0 si:5568f7adc062 di:ffffffffff600000 [21474832.760128] exe[747400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5594970afab9 cs:33 sp:7fbe7b3a0858 ax:0 si:559497109070 di:ffffffffff600000 [21474857.677082] exe[692971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619cf693ab9 cs:33 sp:7fdf7ee49858 ax:0 si:5619cf6ed062 di:ffffffffff600000 [21474879.155450] potentially unexpected fatal signal 11. [21474879.160783] CPU: 9 PID: 747410 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21474879.172687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21474879.182332] RIP: 0033:0x56223dc70939 [21474879.186369] Code: 40 0f 94 c5 89 ef e8 56 08 00 00 48 89 c3 45 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff <64> 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 e8 93 09 00 00 45 85 [21474879.205574] RSP: 002b:00007fbd2884b440 EFLAGS: 00010202 [21474879.212684] RAX: 00000000000002b9 RBX: 0000000000000000 RCX: 000056223dc70dd3 [21474879.220206] RDX: 00000000000002b9 RSI: 0000000000000000 RDI: 0000000001200011 [21474879.227745] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [21474879.236670] R10: 000056223e8d2750 R11: 0000000000000246 R12: 00000000000002b9 [21474879.245643] R13: ffffffffffffffb0 R14: 0000000000000001 R15: 0000000000000000 [21474879.254548] FS: 000056223e8d2480 GS: 0000000000000000 [21474970.540643] potentially unexpected fatal signal 11. [21474970.545979] CPU: 93 PID: 743608 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21474970.557964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21474970.567624] RIP: 0033:0x559dac617ae7 [21474970.571663] Code: 54 10 00 01 00 00 00 48 c7 05 71 54 10 00 00 00 00 00 c7 05 57 54 10 00 01 00 00 00 0f 11 05 c0 54 10 00 0f 11 05 39 54 10 00 <64> 4c 8b 14 25 10 00 00 00 48 85 c0 74 52 48 89 c2 48 83 e2 fe a8 [21474970.590863] RSP: 002b:00007fe06f67d440 EFLAGS: 00010202 [21474970.597914] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000559dac617e0d [21474970.605494] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 0000559dad279760 [21474970.614429] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000559dad278320 [21474970.623350] R10: 0000559dad279750 R11: 0000559dad278320 R12: 0000000000000000 [21474970.630910] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21474970.639841] FS: 0000559dad279480 GS: 0000000000000000 [21475909.194964] exe[773601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639a39eadb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:21002000 [21475909.561124] exe[747828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560474c7bdb1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:21002000 [21476127.975264] exe[771443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bd617edb1 cs:33 sp:ffffffffff600000 ax:0 si:58 di:7f90c6aecfb0 [21476783.706034] exe[794571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5df63cab9 cs:33 sp:7f8ed6ab1ef8 ax:0 si:20003700 di:ffffffffff600000 [21477144.587669] exe[804852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dcaf42ab9 cs:33 sp:7eb087e4def8 ax:0 si:20000280 di:ffffffffff600000 [21477156.677327] exe[791612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b82e17ab9 cs:33 sp:7ebff14f8858 ax:0 si:559b82e71062 di:ffffffffff600000 [21477165.321006] exe[744296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591ec74fab9 cs:33 sp:7faa65eecef8 ax:0 si:20000280 di:ffffffffff600000 [21477189.114957] exe[745613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556cc5e5dab9 cs:33 sp:7fbd89ad3858 ax:0 si:556cc5eb7062 di:ffffffffff600000 [21477542.320802] exe[782266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cb9a348ab9 cs:33 sp:7f3271423858 ax:0 si:55cb9a3a2062 di:ffffffffff600000 [21477544.431619] exe[784210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b7f1154ab9 cs:33 sp:7f87ef6f6858 ax:0 si:55b7f11ae062 di:ffffffffff600000 [21477548.287765] exe[761064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ec31b1ab9 cs:33 sp:7f0e195fc858 ax:0 si:563ec320b062 di:ffffffffff600000 [21477549.352357] exe[780574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ed757bab9 cs:33 sp:7fb2b8aac858 ax:0 si:558ed75d5062 di:ffffffffff600000 [21477549.607344] exe[808166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56141b2fbab9 cs:33 sp:7eceea3db858 ax:0 si:56141b355062 di:ffffffffff600000 [21477551.490360] exe[806743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558e54051ab9 cs:33 sp:7f7f4c46c858 ax:0 si:558e540ab062 di:ffffffffff600000 [21477554.129888] exe[793703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563fb3d42ab9 cs:33 sp:7ee0876e8858 ax:0 si:563fb3d9c062 di:ffffffffff600000 [21477656.470322] exe[782858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea247c7ab9 cs:33 sp:7fbe55948858 ax:0 si:55ea24821062 di:ffffffffff600000 [21477660.861385] exe[760596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55745aee5ab9 cs:33 sp:7f1756f33858 ax:0 si:55745af3f062 di:ffffffffff600000 [21477664.663480] exe[809737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fb07b8ab9 cs:33 sp:7f213effe858 ax:0 si:555fb0812062 di:ffffffffff600000 [21477665.350795] exe[796310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc68005ab9 cs:33 sp:7f7989ca3ef8 ax:0 si:20000280 di:ffffffffff600000 [21477700.557299] exe[810118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c5cbef4ab9 cs:33 sp:7ef66b5a1ef8 ax:0 si:20003e80 di:ffffffffff600000 [21477919.026029] exe[806393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565142328237 cs:33 sp:7ed0f5243ef8 ax:2f700000 si:5651423962f7 di:ffffffffff600000 [21478171.460680] exe[809767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce1302d237 cs:33 sp:7ed796effef8 ax:2f700000 si:55ce1309b2f7 di:ffffffffff600000 [21478384.056987] exe[824026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56095dcd1ab9 cs:33 sp:7f2096b9b858 ax:0 si:56095dd2b062 di:ffffffffff600000 [21478420.407252] potentially unexpected fatal signal 5. [21478420.412488] CPU: 16 PID: 811262 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478420.424472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478420.434095] RIP: 0033:0x7fffffffe062 [21478420.438078] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478420.457284] RSP: 002b:000000c0004d3b90 EFLAGS: 00000297 [21478420.462951] RAX: 0000001b2c020000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478420.470502] RDX: 0000000000000003 RSI: 0000000000040000 RDI: 0000001b2c020000 [21478420.478074] RBP: 000000c0004d3c28 R08: 0000000000000009 R09: 000000001de00000 [21478420.485617] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0004d3c18 [21478420.494536] R13: 000000c0004dcb10 R14: 000000c00050a380 R15: 00000000000c5d8a [21478420.503654] FS: 000000c000478098 GS: 0000000000000000 [21478510.223216] potentially unexpected fatal signal 5. [21478510.228464] CPU: 31 PID: 792294 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478510.240476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478510.250181] RIP: 0033:0x7fffffffe062 [21478510.254179] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478510.273408] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21478510.280428] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478510.289402] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21478510.298318] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21478510.307259] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00004d9c8 [21478510.316229] R13: 0000000002883b00 R14: 000000c000183180 R15: 00000000000b6d3d [21478510.325169] FS: 0000000004b153c0 GS: 0000000000000000 [21478577.469029] exe[824326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe53ef3ab9 cs:33 sp:7fa3cdb3f858 ax:0 si:55fe53f4d062 di:ffffffffff600000 [21478700.342208] exe[830651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a8c7aed6a2 cs:33 sp:7f5b6cf6bf98 ax:7f5b6cf6bfb0 si:ffffffffff600000 di:7f5b6cf6bfb0 [21478872.906529] potentially unexpected fatal signal 5. [21478872.911810] CPU: 63 PID: 810753 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478872.923829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478872.933491] RIP: 0033:0x7fffffffe062 [21478872.937541] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478872.958122] RSP: 002b:000000c0005fdb90 EFLAGS: 00000297 [21478872.965131] RAX: 00000000000cd2d4 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478872.974040] RDX: 0000000000000000 RSI: 000000c0005fe000 RDI: 0000000000012f00 [21478872.981610] RBP: 000000c0005fdc28 R08: 000000c00050e100 R09: 0000000000000000 [21478872.989152] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0005fdc18 [21478872.996699] R13: 000000c00035ff50 R14: 000000c000501500 R15: 00000000000c5eeb [21478873.004247] FS: 000000c00013b098 GS: 0000000000000000 [21478884.173897] potentially unexpected fatal signal 5. [21478884.179115] CPU: 66 PID: 829817 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21478884.191098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21478884.200794] RIP: 0033:0x7fffffffe062 [21478884.204767] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21478884.225334] RSP: 002b:000000c0005fbb90 EFLAGS: 00000297 [21478884.232345] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21478884.241299] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21478884.250196] RBP: 000000c0005fbc28 R08: 0000000000000000 R09: 0000000000000000 [21478884.257729] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005fbc18 [21478884.266661] R13: 000000c000018b10 R14: 000000c00033f500 R15: 00000000000ca695 [21478884.275592] FS: 000000c000180898 GS: 0000000000000000 [21479052.894729] exe[805774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569c9517ab9 cs:33 sp:7efbab512858 ax:0 si:5569c9571062 di:ffffffffff600000 [21479161.680204] exe[816693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55567124eab9 cs:33 sp:7ff98fb24ef8 ax:0 si:20001400 di:ffffffffff600000 [21479250.728328] potentially unexpected fatal signal 5. [21479250.733567] CPU: 18 PID: 847524 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21479250.745571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21479250.755218] RIP: 0033:0x7fffffffe062 [21479250.759278] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21479250.779877] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21479250.786884] RAX: 0000562b4c097000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21479250.795796] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 0000562b4c097000 [21479250.804752] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000013743000 [21479250.813641] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21479250.822596] R13: 000000c000180808 R14: 000000c000512540 R15: 00000000000cec0b [21479250.831524] FS: 00007f0184bbf6c0 GS: 0000000000000000 [21479337.250524] potentially unexpected fatal signal 11. [21479337.255835] CPU: 29 PID: 851022 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21479337.267814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21479337.277450] RIP: 0033:0x558de0e8dc25 [21479337.281422] Code: c0 0f 85 46 01 00 00 41 0f 11 82 c0 02 00 00 48 89 15 17 07 c6 00 48 89 15 08 07 c6 00 48 89 da 89 ee bf 01 00 00 00 45 31 e4 b6 06 00 00 e9 28 fd ff ff 90 e8 7b 01 00 00 41 89 c4 85 c0 0f [21479337.300642] RSP: 002b:00007f74c4800440 EFLAGS: 00010246 [21479337.306271] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000558de0e8de0d [21479337.313914] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [21479337.322786] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000558de1aee320 [21479337.331716] R10: 0000558de1aef480 R11: 0000558de1aee320 R12: 0000000000000000 [21479337.340732] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [21479337.349670] FS: 0000558de1aef480 GS: 0000000000000000 [21479649.942904] potentially unexpected fatal signal 11. [21479649.948222] CPU: 94 PID: 842697 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21479649.960207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21479649.969834] RIP: 0033:0x5593fc59437b [21479649.973849] Code: d0 00 00 00 83 fd 20 0f 84 95 05 00 00 41 80 7c 24 04 00 4d 89 e6 4d 8d 4c 24 0c 75 d2 80 3d 50 e3 c9 00 00 0f 85 55 03 00 00 <41> c6 44 24 04 01 41 89 2c 24 41 c6 44 24 20 00 49 c7 46 08 00 00 [21479649.993047] RSP: 002b:00007fe5bfc60310 EFLAGS: 00010246 [21479650.000106] RAX: 00007fe5bfc60470 RBX: 00007fe5bfc60470 RCX: 0000000000000000 [21479650.009030] RDX: 00007fec7c0000a8 RSI: 00007fe5bfc604e0 RDI: 00007fe5bfc604f0 [21479650.016578] RBP: 0000000000000000 R08: 00007fec7c0000a8 R09: 00005593fc708f8c [21479650.025522] R10: 0000000000000006 R11: 00000000861c4adf R12: 00005593fc708f80 [21479650.034458] R13: 0000000000000ff4 R14: 00005593fc708f80 R15: 00007fe5bfc60418 [21479650.043391] FS: 00005593fd239480 GS: 0000000000000000 [21479699.397909] exe[859624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623330aaab9 cs:33 sp:7ea5cf5ec858 ax:0 si:562333104062 di:ffffffffff600000 [21480023.529021] exe[865602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2a9a66db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:20000 [21480243.333785] potentially unexpected fatal signal 5. [21480243.339027] CPU: 1 PID: 801895 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21480243.350926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21480243.360596] RIP: 0033:0x7fffffffe062 [21480243.364610] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21480243.385199] RSP: 002b:000000c000619b90 EFLAGS: 00000297 [21480243.392215] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21480243.401117] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21480243.410032] RBP: 000000c000619c28 R08: 0000000000000000 R09: 0000000000000000 [21480243.418937] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000619c18 [21480243.427866] R13: 000000c00027f3e0 R14: 000000c00047cfc0 R15: 00000000000c2cbf [21480243.436880] FS: 0000000001f6c6b0 GS: 0000000000000000 [21480244.143323] potentially unexpected fatal signal 5. [21480244.148538] CPU: 70 PID: 881452 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21480244.160506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21480244.170154] RIP: 0033:0x7fffffffe062 [21480244.174145] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21480244.193378] RSP: 002b:000000c0006bdb90 EFLAGS: 00000297 [21480244.200354] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21480244.209243] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21480244.218167] RBP: 000000c0006bdc28 R08: 0000000000000000 R09: 0000000000000000 [21480244.227081] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006bdc18 [21480244.235993] R13: 000000c0006d12f0 R14: 000000c000582700 R15: 00000000000d6880 [21480244.244903] FS: 0000000001f6c6b0 GS: 0000000000000000 [21481121.618219] potentially unexpected fatal signal 11. [21481121.623525] CPU: 17 PID: 902823 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21481121.635530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21481121.645154] RIP: 0033:0x562def94d0e9 [21481121.649162] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [21481121.668331] RSP: 002b:00007f0a074b9448 EFLAGS: 00010213 [21481121.673970] RAX: 0000000000000016 RBX: 0000562def9973b9 RCX: 0000562def94d0d7 [21481121.681498] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007f0a074ba5c0 [21481121.689070] RBP: 00007f0a074ba59c R08: 000000000ff9287e R09: 000000000000064a [21481121.696600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0a074ba5c0 [21481121.704150] R13: 0000562def9973b9 R14: 00000000000c4511 R15: 0000000000000001 [21481121.711687] FS: 0000562df05aa480 GS: 0000000000000000 [21481121.740008] potentially unexpected fatal signal 5. [21481121.746288] CPU: 0 PID: 872651 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21481121.758220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21481121.767921] RIP: 0033:0x7fffffffe062 [21481121.771910] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21481121.792490] RSP: 002b:000000c0007b5be8 EFLAGS: 00000297 [21481121.798119] RAX: 000055baa24c3000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21481121.805681] RDX: 0000000000000001 RSI: 0000000000001000 RDI: 000055baa24c3000 [21481121.813230] RBP: 000000c0007b5c80 R08: 0000000000000009 R09: 00000000015ff000 [21481121.820813] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c0007b5c70 [21481121.828377] R13: 000000c0007c8000 R14: 000000c000600700 R15: 00000000000d33d0 [21481121.835944] FS: 0000000002207a30 GS: 0000000000000000 [21482335.349100] exe[1044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b47086ab9 cs:33 sp:7f914a9fe858 ax:0 si:564b470e0062 di:ffffffffff600000 [21482335.506353] exe[986244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b47086ab9 cs:33 sp:7f914a9fe858 ax:0 si:564b470e0062 di:ffffffffff600000 [21482335.513247] exe[992689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d2619fab9 cs:33 sp:7f237d033858 ax:0 si:560d261f9062 di:ffffffffff600000 [21482335.587041] exe[995596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d2619fab9 cs:33 sp:7f237d033858 ax:0 si:560d261f9062 di:ffffffffff600000 [21482335.603431] exe[985950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fab500ab9 cs:33 sp:7f4b0382d858 ax:0 si:562fab55a062 di:ffffffffff600000 [21482335.655893] exe[992148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b47086ab9 cs:33 sp:7f914a9fe858 ax:0 si:564b470e0062 di:ffffffffff600000 [21482335.717672] exe[985974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fab500ab9 cs:33 sp:7f4b0382d858 ax:0 si:562fab55a062 di:ffffffffff600000 [21482590.318033] exe[6187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55865ce80ab9 cs:33 sp:7fdd6a43a858 ax:0 si:55865ceda070 di:ffffffffff600000 [21482590.466654] exe[998500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fcb442ab9 cs:33 sp:7f7ab6486858 ax:0 si:555fcb49c070 di:ffffffffff600000 [21482590.589375] exe[989500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55865ce80ab9 cs:33 sp:7fdd6a43a858 ax:0 si:55865ceda070 di:ffffffffff600000 [21482590.600870] exe[16739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56205dd71ab9 cs:33 sp:7f242da50858 ax:0 si:56205ddcb070 di:ffffffffff600000 [21482590.727136] exe[998442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fcb442ab9 cs:33 sp:7f7ab6486858 ax:0 si:555fcb49c070 di:ffffffffff600000 [21482590.729617] exe[980723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56205dd71ab9 cs:33 sp:7f242da50858 ax:0 si:56205ddcb070 di:ffffffffff600000 [21482590.844729] exe[6187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56205dd71ab9 cs:33 sp:7f242da50858 ax:0 si:56205ddcb070 di:ffffffffff600000 [21482693.531235] exe[16690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5a95cddb1 cs:33 sp:ffffffffff600040 ax:0 si:ffffffffff600040 di:6104a600 [21482845.725119] exe[9897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae682ec237 cs:33 sp:7f3a88091ef8 ax:2f700000 si:55ae6835a2f7 di:ffffffffff600000 [21482851.027934] exe[984448] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555efcd3aab9 cs:33 sp:7eafe8581ef8 ax:0 si:200001c0 di:ffffffffff600000 [21483101.697538] exe[3885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5605293b0237 cs:33 sp:7f73e722aef8 ax:2f700000 si:56052941e2f7 di:ffffffffff600000 [21484774.127790] potentially unexpected fatal signal 5. [21484774.133075] CPU: 86 PID: 10961 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21484774.145027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21484774.154682] RIP: 0033:0x7fffffffe062 [21484774.158733] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21484774.179289] RSP: 002b:000000c000765be8 EFLAGS: 00000297 [21484774.186327] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21484774.195265] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21484774.204186] RBP: 000000c000765c80 R08: 0000000000000000 R09: 0000000000000000 [21484774.213108] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000765c70 [21484774.222155] R13: 000000c000772800 R14: 000000c0003f2fc0 R15: 00000000000ee3eb [21484774.231057] FS: 000000c000180098 GS: 0000000000000000 [21484775.493485] exe[987631] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561befba7ab9 cs:33 sp:7f6e4f687858 ax:0 si:561befc01062 di:ffffffffff600000 [21484775.641069] exe[40620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb42676ab9 cs:33 sp:7f6063ad5858 ax:0 si:55fb426d0062 di:ffffffffff600000 [21484775.773756] exe[988558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56492487cab9 cs:33 sp:7f85b465f858 ax:0 si:5649248d6062 di:ffffffffff600000 [21484775.899887] exe[988584] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb42676ab9 cs:33 sp:7f6063ad5858 ax:0 si:55fb426d0062 di:ffffffffff600000 [21485248.883548] exe[72235] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bee897eab9 cs:33 sp:7fd5b25db858 ax:0 si:55bee89d8062 di:ffffffffff600000 [21485597.395702] exe[76974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3a82a8ab9 cs:33 sp:7ff9f9428858 ax:0 si:55c3a8302097 di:ffffffffff600000 [21486064.276064] exe[69844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603d7b35237 cs:33 sp:7f6772a78ef8 ax:2f700000 si:5603d7ba32f7 di:ffffffffff600000 [21486082.220054] exe[66011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b47f646237 cs:33 sp:7eb15db77ef8 ax:2f700000 si:55b47f6b42f7 di:ffffffffff600000 [21486082.854751] exe[80182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f758499237 cs:33 sp:7f96898e4ef8 ax:2f700000 si:55f7585072f7 di:ffffffffff600000 [21486086.027070] exe[37063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55adeec17237 cs:33 sp:7f4916f9bef8 ax:2f700000 si:55adeec852f7 di:ffffffffff600000 [21486132.261857] exe[76851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56056e6b6ab9 cs:33 sp:7ee9d0e3a858 ax:0 si:56056e710062 di:ffffffffff600000 [21486140.595878] exe[76851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614d2fc9ab9 cs:33 sp:7eeb438bf858 ax:0 si:5614d3023062 di:ffffffffff600000 [21486148.783739] exe[63461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fcfd28ab9 cs:33 sp:7eef636b6858 ax:0 si:560fcfd82062 di:ffffffffff600000 [21486148.899957] exe[73499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56056e6b6ab9 cs:33 sp:7ee9d0e3a858 ax:0 si:56056e710062 di:ffffffffff600000 [21486378.537877] exe[993887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c75533237 cs:33 sp:7f67f3c8fef8 ax:2f700000 si:556c755a12f7 di:ffffffffff600000 [21486383.062786] exe[12601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564e0d65237 cs:33 sp:7fe4788ecef8 ax:2f700000 si:5564e0dd32f7 di:ffffffffff600000 [21486670.442980] exe[34914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eeffb3c237 cs:33 sp:7fc2fc50bef8 ax:2f700000 si:55eeffbaa2f7 di:ffffffffff600000 [21486831.201722] exe[71317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5573e3201ab9 cs:33 sp:7fed18084858 ax:0 si:5573e325b062 di:ffffffffff600000 [21486855.593161] exe[37602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c2868e237 cs:33 sp:7eb24b84eef8 ax:2f700000 si:558c286fc2f7 di:ffffffffff600000 [21487075.384724] exe[53227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565345b1fab9 cs:33 sp:7f9a71770858 ax:0 si:565345b79062 di:ffffffffff600000 [21487161.886037] exe[77175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9fea9d237 cs:33 sp:7ff3e4381ef8 ax:2f700000 si:55c9feb0b2f7 di:ffffffffff600000 [21487269.246050] exe[92835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621941d9db1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:204000 [21487388.893924] exe[53398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55611e3fe237 cs:33 sp:7feb32bd8ef8 ax:2f700000 si:55611e46c2f7 di:ffffffffff600000 [21487638.813995] exe[80263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487638.917690] exe[58331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487639.023233] exe[58331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487639.124740] exe[58123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557b98b51ab9 cs:33 sp:7f954492f858 ax:0 si:557b98bab062 di:ffffffffff600000 [21487950.793970] exe[54996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0f9a2eab9 cs:33 sp:7ee5e07fe858 ax:0 si:55d0f9a88062 di:ffffffffff600000 [21487950.984434] exe[60085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563189fccab9 cs:33 sp:7eb0db991858 ax:0 si:56318a026062 di:ffffffffff600000 [21487951.192313] exe[61555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0f9a2eab9 cs:33 sp:7ee5e07fe858 ax:0 si:55d0f9a88062 di:ffffffffff600000 [21487951.432673] exe[57336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557781fe3ab9 cs:33 sp:7eb77f99a858 ax:0 si:55778203d062 di:ffffffffff600000 [21488296.011217] exe[18729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf2009c237 cs:33 sp:7f793364cef8 ax:2f700000 si:55cf2010a2f7 di:ffffffffff600000 [21488377.315044] potentially unexpected fatal signal 5. [21488377.320267] CPU: 54 PID: 52185 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21488377.332195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21488377.341873] RIP: 0033:0x7fffffffe062 [21488377.345952] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21488377.366513] RSP: 002b:000000c0007cdbe8 EFLAGS: 00000297 [21488377.373527] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21488377.382455] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21488377.391400] RBP: 000000c0007cdc80 R08: 0000000000000000 R09: 0000000000000000 [21488377.400301] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007cdc70 [21488377.409225] R13: 000000c0006c8800 R14: 000000c00049ce00 R15: 000000000000b8c5 [21488377.418157] FS: 000000c000506898 GS: 0000000000000000 [21488398.951114] exe[29524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561aa88cd237 cs:33 sp:7f4469d25ef8 ax:2f700000 si:561aa893b2f7 di:ffffffffff600000 [21488471.536086] exe[100303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570afed9237 cs:33 sp:7f363c7feef8 ax:2f700000 si:5570aff472f7 di:ffffffffff600000 [21488537.040749] exe[32841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac3fe22237 cs:33 sp:7ec240b4cef8 ax:2f700000 si:55ac3fe902f7 di:ffffffffff600000 [21488578.931164] exe[110043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e86547237 cs:33 sp:7fa978300ef8 ax:2f700000 si:556e865b52f7 di:ffffffffff600000 [21488710.753761] exe[93342] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a86158ab9 cs:33 sp:7f7028ae7858 ax:0 si:558a861b2062 di:ffffffffff600000 [21488900.837349] exe[90269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ae20703237 cs:33 sp:7ea2749c1ef8 ax:2f700000 si:55ae207712f7 di:ffffffffff600000 [21488917.816802] exe[77022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560844fe5237 cs:33 sp:7f89ab9dbef8 ax:2f700000 si:5608450532f7 di:ffffffffff600000 [21489069.135922] exe[131570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5671baab9 cs:33 sp:7fc1ed2ac858 ax:0 si:55a567214097 di:ffffffffff600000 [21489069.319302] exe[129038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb052aab9 cs:33 sp:7f78b22ef858 ax:0 si:55cdb0584097 di:ffffffffff600000 [21489069.345964] exe[129466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14cb84ab9 cs:33 sp:7f343628a858 ax:0 si:55d14cbde097 di:ffffffffff600000 [21489069.347076] exe[128818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14cb84ab9 cs:33 sp:7f3436269858 ax:0 si:55d14cbde097 di:ffffffffff600000 [21489069.481343] exe[131568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5671baab9 cs:33 sp:7fc1ed2ac858 ax:0 si:55a567214097 di:ffffffffff600000 [21489069.641487] exe[128876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b84612ab9 cs:33 sp:7fa00a86d858 ax:0 si:559b8466c097 di:ffffffffff600000 [21489069.814621] exe[129565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5671baab9 cs:33 sp:7fc1ed2ac858 ax:0 si:55a567214097 di:ffffffffff600000 [21489069.995248] exe[131933] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559b84612ab9 cs:33 sp:7fa00a86d858 ax:0 si:559b8466c062 di:ffffffffff600000 [21489070.171070] exe[134667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d14cb84ab9 cs:33 sp:7f343628a858 ax:0 si:55d14cbde062 di:ffffffffff600000 [21489070.297033] exe[129593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb052aab9 cs:33 sp:7f78b22ef858 ax:0 si:55cdb0584062 di:ffffffffff600000 [21489171.087511] warn_bad_vsyscall: 10 callbacks suppressed [21489171.087515] exe[124751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56003e4baab9 cs:33 sp:7f7500446858 ax:0 si:56003e514070 di:ffffffffff600000 [21489337.557745] exe[128193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56455fb69ab9 cs:33 sp:7ff630647858 ax:0 si:56455fbc3097 di:ffffffffff600000 [21489337.726272] exe[139876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559efccf9ab9 cs:33 sp:7fcacb2cc858 ax:0 si:559efcd53097 di:ffffffffff600000 [21489423.022047] exe[130159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f21b271ab9 cs:33 sp:7f11c63a7858 ax:0 si:55f21b2cb062 di:ffffffffff600000 [21489423.123977] exe[128580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da9cca6ab9 cs:33 sp:7f840523e858 ax:0 si:55da9cd00062 di:ffffffffff600000 [21489423.199574] exe[112506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f21b271ab9 cs:33 sp:7f11c63a7858 ax:0 si:55f21b2cb062 di:ffffffffff600000 [21489423.514587] exe[137623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da9cca6ab9 cs:33 sp:7f840523e858 ax:0 si:55da9cd00062 di:ffffffffff600000 [21490182.691201] exe[140306] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56384ac0f237 cs:33 sp:7fb24afbcef8 ax:2f700000 si:56384ac7d2f7 di:ffffffffff600000 [21490325.802951] exe[145680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bed410ab9 cs:33 sp:7f70bb52e858 ax:0 si:562bed46a062 di:ffffffffff600000 [21490488.011838] exe[140658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56303e472ab9 cs:33 sp:7fb631ad8858 ax:0 si:56303e4cc062 di:ffffffffff600000 [21490488.170531] exe[143117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557d631e5ab9 cs:33 sp:7f14929cb858 ax:0 si:557d6323f062 di:ffffffffff600000 [21490548.100847] exe[145671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5593dc258ab9 cs:33 sp:7ee0e6831858 ax:0 si:5593dc2b2097 di:ffffffffff600000 [21490725.790655] potentially unexpected fatal signal 5. [21490725.795898] CPU: 1 PID: 154164 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490725.807785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490725.817440] RIP: 0033:0x7fffffffe062 [21490725.821498] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490725.842198] RSP: 002b:000000c00078fbe8 EFLAGS: 00000297 [21490725.849221] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490725.858134] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21490725.867124] RBP: 000000c00078fc80 R08: 0000000000000000 R09: 0000000000000000 [21490725.876065] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00078fc70 [21490725.884983] R13: 00000000162a7ede R14: 000000c000514700 R15: 000000000002581f [21490725.893896] FS: 000000c00013a898 GS: 0000000000000000 [21490738.728767] potentially unexpected fatal signal 5. [21490738.733992] CPU: 4 PID: 154069 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490738.745918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490738.755595] RIP: 0033:0x7fffffffe062 [21490738.759683] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490738.780289] RSP: 002b:000000c000777be8 EFLAGS: 00000297 [21490738.787286] RAX: 0000000000025be1 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490738.796231] RDX: 0000000000000000 RSI: 000000c000778000 RDI: 0000000000012f00 [21490738.805200] RBP: 000000c000777c80 R08: 000000c000a941f0 R09: 0000000000000000 [21490738.814136] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000777c70 [21490738.823087] R13: 000000c000567800 R14: 000000c000530e00 R15: 000000000002595e [21490738.831992] FS: 0000000002207a30 GS: 0000000000000000 [21490834.622698] potentially unexpected fatal signal 5. [21490834.622984] potentially unexpected fatal signal 5. [21490834.623241] potentially unexpected fatal signal 5. [21490834.623246] CPU: 46 PID: 154655 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.623247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.623252] RIP: 0033:0x7fffffffe062 [21490834.623254] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.623255] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490834.623257] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490834.623258] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21490834.623259] RBP: 000000c000767c80 R08: 0000000000000000 R09: 0000000000000000 [21490834.623260] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000767c70 [21490834.623261] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490834.623262] FS: 000000c000464098 GS: 0000000000000000 [21490834.627587] potentially unexpected fatal signal 5. [21490834.627593] CPU: 2 PID: 154656 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.627595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.627601] RIP: 0033:0x7fffffffe062 [21490834.627604] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.627605] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490834.627607] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490834.627608] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21490834.627609] RBP: 000000c000767c80 R08: 0000000000000000 R09: 0000000000000000 [21490834.627610] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000767c70 [21490834.627611] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490834.627611] FS: 000000c000464098 GS: 0000000000000000 [21490834.627942] CPU: 36 PID: 154347 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.627944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.627949] RIP: 0033:0x7fffffffe062 [21490834.627954] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.633202] CPU: 3 PID: 154316 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21490834.633203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21490834.633206] RIP: 0033:0x7fffffffe062 [21490834.633210] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21490834.633211] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490834.633213] RAX: 0000000000026844 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490834.633214] RDX: 0000000000000000 RSI: 000000c000768000 RDI: 0000000000012f00 [21490834.633215] RBP: 000000c000767c80 R08: 000000c0003a6a60 R09: 0000000000000000 [21490834.633215] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000767c70 [21490834.633217] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490834.633218] FS: 000000c000464098 GS: 0000000000000000 [21490834.999588] RSP: 002b:000000c000767be8 EFLAGS: 00000297 [21490835.006608] RAX: 0000000000026843 RBX: 0000000000000000 RCX: 00007fffffffe05a [21490835.015547] RDX: 0000000000000000 RSI: 000000c000768000 RDI: 0000000000012f00 [21490835.024448] RBP: 000000c000767c80 R08: 000000c0003a71e0 R09: 0000000000000000 [21490835.033396] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000767c70 [21490835.042322] R13: 000000c00066d000 R14: 000000c000245c00 R15: 0000000000025815 [21490835.051256] FS: 000000c000464098 GS: 0000000000000000 [21490865.452258] exe[121095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f985b77ab9 cs:33 sp:7ea2c65fd858 ax:0 si:55f985bd1062 di:ffffffffff600000 [21491105.882045] exe[136321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e89ccab9 cs:33 sp:7f6927170ef8 ax:0 si:20000080 di:ffffffffff600000 [21491106.049563] exe[150088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4b565ab9 cs:33 sp:7fb3f3886ef8 ax:0 si:20000080 di:ffffffffff600000 [21491106.081031] exe[158268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4b565ab9 cs:33 sp:7fb3f3865ef8 ax:0 si:20000080 di:ffffffffff600000 [21491245.032012] potentially unexpected fatal signal 5. [21491245.037263] CPU: 40 PID: 165169 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21491245.049284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21491245.058916] RIP: 0033:0x7fffffffe062 [21491245.062891] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21491245.082081] RSP: 002b:000000c00076bbe8 EFLAGS: 00000297 [21491245.087927] RAX: 000000000002877f RBX: 0000000000000000 RCX: 00007fffffffe05a [21491245.095557] RDX: 0000000000000000 RSI: 000000c00076c000 RDI: 0000000000012f00 [21491245.104486] RBP: 000000c00076bc80 R08: 000000c0003e82e0 R09: 0000000000000000 [21491245.113455] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00076bc70 [21491245.122411] R13: 000000c0005ff000 R14: 000000c0002afdc0 R15: 0000000000028510 [21491245.131372] FS: 0000000002207a30 GS: 0000000000000000 [21491989.343402] potentially unexpected fatal signal 5. [21491989.348631] CPU: 77 PID: 164449 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21491989.360657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21491989.370302] RIP: 0033:0x7fffffffe062 [21491989.374361] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21491989.394993] RSP: 002b:000000c000861be8 EFLAGS: 00000297 [21491989.401995] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21491989.410920] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21491989.419839] RBP: 000000c000861c80 R08: 0000000000000000 R09: 0000000000000000 [21491989.428811] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000861c70 [21491989.437750] R13: 000000c0005b3800 R14: 000000c000511c00 R15: 000000000001a0b1 [21491989.446677] FS: 000000c00013b098 GS: 0000000000000000 [21492010.033828] potentially unexpected fatal signal 5. [21492010.039043] CPU: 73 PID: 115671 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21492010.051022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21492010.060660] RIP: 0033:0x7fffffffe062 [21492010.064619] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21492010.083782] RSP: 002b:000000c00016db90 EFLAGS: 00000297 [21492010.089431] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21492010.096975] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21492010.105886] RBP: 000000c00016dc28 R08: 0000000000000000 R09: 0000000000000000 [21492010.114842] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00016dc18 [21492010.123774] R13: 000000c0001ca150 R14: 000000c00015e540 R15: 000000000001a4e0 [21492010.132747] FS: 000000c000514098 GS: 0000000000000000 [21492152.942086] exe[196851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f8787e3237 cs:33 sp:7f8e5b50cef8 ax:2f700000 si:55f8788512f7 di:ffffffffff600000 [21492809.260242] exe[206167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5599417c1ab9 cs:33 sp:7ea3893c7858 ax:0 si:55994181b062 di:ffffffffff600000 [21492914.481697] exe[221505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56070b8b0ab9 cs:33 sp:7f60fadfe858 ax:0 si:56070b90a062 di:ffffffffff600000 [21492914.598202] exe[223922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97827dab9 cs:33 sp:7f9cc1196858 ax:0 si:55f9782d7062 di:ffffffffff600000 [21492914.700778] exe[186763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56070b8b0ab9 cs:33 sp:7f60fadfe858 ax:0 si:56070b90a062 di:ffffffffff600000 [21492914.814989] exe[188027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f97827dab9 cs:33 sp:7f9cc1196858 ax:0 si:55f9782d7062 di:ffffffffff600000 [21493264.451346] exe[227341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623f7f09ab9 cs:33 sp:7fea169fe858 ax:0 si:5623f7f63097 di:ffffffffff600000 [21494007.945124] exe[174529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631e0fa0ab9 cs:33 sp:7f63cb883858 ax:0 si:5631e0ffa097 di:ffffffffff600000 [21494514.390535] exe[212079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56404ee78237 cs:33 sp:7f51d9dc9ef8 ax:2f700000 si:56404eee62f7 di:ffffffffff600000 [21494527.739704] exe[225308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d97b1fc237 cs:33 sp:7f0b1fdf3ef8 ax:2f700000 si:55d97b26a2f7 di:ffffffffff600000 [21494538.504725] exe[221884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f715148ab9 cs:33 sp:7ef8477d2ef8 ax:0 si:20004940 di:ffffffffff600000 [21494548.394718] exe[217787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56083fd0eab9 cs:33 sp:7f432a9f8858 ax:0 si:56083fd68062 di:ffffffffff600000 [21494577.077258] exe[169161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f37589237 cs:33 sp:7ee293e9def8 ax:2f700000 si:562f375f72f7 di:ffffffffff600000 [21494578.476567] exe[209634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617406de237 cs:33 sp:7fda97bfeef8 ax:2f700000 si:56174074c2f7 di:ffffffffff600000 [21494581.695838] exe[227772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e64e71a237 cs:33 sp:7f6be1b38ef8 ax:2f700000 si:55e64e7882f7 di:ffffffffff600000 [21494589.646121] exe[193077] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55931f2e0237 cs:33 sp:7f92962a3ef8 ax:2f700000 si:55931f34e2f7 di:ffffffffff600000 [21494621.488475] exe[235333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af4b041237 cs:33 sp:7fc0a97b3ef8 ax:2f700000 si:55af4b0af2f7 di:ffffffffff600000 [21494645.728105] exe[238972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568b0a7a237 cs:33 sp:7fd8123d3ef8 ax:2f700000 si:5568b0ae82f7 di:ffffffffff600000 [21494662.421329] potentially unexpected fatal signal 5. [21494662.426575] CPU: 86 PID: 189964 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21494662.438565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21494662.448186] RIP: 0033:0x7fffffffe062 [21494662.452182] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21494662.471368] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21494662.477036] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21494662.485976] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055b70fa00000 [21494662.494938] RBP: 000000c00004db30 R08: 0000000000000000 R09: 0000000000000000 [21494662.503887] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00004d9c8 [21494662.512802] R13: 000000c000181008 R14: 000000c0002656c0 R15: 000000000002d99e [21494662.521713] FS: 00007fc240e9a6c0 GS: 0000000000000000 [21494805.743597] exe[242795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564664bf4ab9 cs:33 sp:7ffa4f1dc858 ax:0 si:564664c4e062 di:ffffffffff600000 [21494840.320122] potentially unexpected fatal signal 5. [21494840.325367] CPU: 43 PID: 233570 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21494840.337361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21494840.347008] RIP: 0033:0x7fffffffe062 [21494840.351006] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21494840.370204] RSP: 002b:000000c0007a5be8 EFLAGS: 00000297 [21494840.377218] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21494840.386144] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21494840.393705] RBP: 000000c0007a5c80 R08: 0000000000000000 R09: 0000000000000000 [21494840.402603] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007a5c70 [21494840.411542] R13: 000000c000199800 R14: 000000c00047b6c0 R15: 0000000000028511 [21494840.420445] FS: 000000c000180898 GS: 0000000000000000 [21494856.283674] potentially unexpected fatal signal 5. [21494856.288985] CPU: 22 PID: 246161 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21494856.300995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21494856.310640] RIP: 0033:0x7fffffffe062 [21494856.314670] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21494856.333857] RSP: 002b:000000c000643be8 EFLAGS: 00000297 [21494856.339534] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21494856.347078] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21494856.356003] RBP: 000000c000643c80 R08: 0000000000000000 R09: 0000000000000000 [21494856.363551] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000643c70 [21494856.371113] R13: 000000c0006ae000 R14: 000000c000007a40 R15: 000000000002895d [21494856.378683] FS: 000000c00013a898 GS: 0000000000000000 [21494946.053043] exe[244762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbe90cf237 cs:33 sp:7ee0afcaaef8 ax:2f700000 si:55bbe913d2f7 di:ffffffffff600000 [21495001.080336] exe[250600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556948fab237 cs:33 sp:7faba0fe3ef8 ax:2f700000 si:5569490192f7 di:ffffffffff600000 [21495111.333881] exe[245803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb11ed9237 cs:33 sp:7f4201c56ef8 ax:2f700000 si:55eb11f472f7 di:ffffffffff600000 [21495135.038108] exe[245251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55991c19c237 cs:33 sp:7f7acbfd1ef8 ax:2f700000 si:55991c20a2f7 di:ffffffffff600000 [21495261.221502] potentially unexpected fatal signal 5. [21495261.226738] CPU: 92 PID: 187739 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21495261.238775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21495261.248447] RIP: 0033:0x7fffffffe062 [21495261.252452] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21495261.271712] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21495261.278749] RAX: 00007f3f106e6000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21495261.286350] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007f3f106e6000 [21495261.295273] RBP: 000000c00004db30 R08: 0000000000000009 R09: 000000000dd01000 [21495261.304224] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00004d9c8 [21495261.313181] R13: 000000c000143008 R14: 000000c0001c2540 R15: 000000000002c497 [21495261.322114] FS: 00007f4846f9e6c0 GS: 0000000000000000 [21495696.798639] exe[272470] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55602feceab9 cs:33 sp:7fa61259c858 ax:0 si:55602ff28070 di:ffffffffff600000 [21495807.793812] exe[277195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560dfea10ab9 cs:33 sp:7fb8e14a7858 ax:0 si:560dfea6a062 di:ffffffffff600000 [21495859.206017] exe[269242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2eb029ab9 cs:33 sp:7f9e0c737858 ax:0 si:55e2eb083062 di:ffffffffff600000 [21495900.306105] exe[282613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555856171ab9 cs:33 sp:7ef787595ef8 ax:0 si:20000180 di:ffffffffff600000 [21495948.628952] potentially unexpected fatal signal 5. [21495948.634187] CPU: 78 PID: 284340 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21495948.646165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21495948.655804] RIP: 0033:0x7fffffffe062 [21495948.659786] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21495948.678991] RSP: 002b:000000c0006b9b90 EFLAGS: 00000297 [21495948.684644] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21495948.692260] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [21495948.701207] RBP: 000000c0006b9c28 R08: 0000000000000000 R09: 0000000000000000 [21495948.710174] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006b9c18 [21495948.719136] R13: 000000c000712a20 R14: 000000c000580540 R15: 00000000000453f5 [21495948.728086] FS: 000000c000180098 GS: 0000000000000000 [21495951.634698] potentially unexpected fatal signal 5. [21495951.639938] CPU: 4 PID: 262481 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21495951.651855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21495951.661550] RIP: 0033:0x7fffffffe062 [21495951.665590] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21495951.686142] RSP: 002b:000000c00004daa8 EFLAGS: 00000297 [21495951.691806] RAX: 0000562b78311000 RBX: 0000000000000000 RCX: 00007fffffffe05a [21495951.699367] RDX: 0000000000000003 RSI: 00000000000b9000 RDI: 0000562b78311000 [21495951.708304] RBP: 000000c00004db30 R08: 0000000000000009 R09: 0000000016da9000 [21495951.717233] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00004d9c8 [21495951.726159] R13: 0000000002883b00 R14: 000000c000515880 R15: 000000000003fea9 [21495951.735029] FS: 00000000056753c0 GS: 0000000000000000 [21496357.635494] exe[291295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614fb40dab9 cs:33 sp:7f2c99f1bef8 ax:0 si:20000380 di:ffffffffff600000 [21496773.775432] exe[269093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567a654bab9 cs:33 sp:7efe12a53858 ax:0 si:5567a65a5062 di:ffffffffff600000 [21497711.615530] exe[325492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561c80668ab9 cs:33 sp:7fc5507feef8 ax:0 si:20007740 di:ffffffffff600000 [21498884.188513] exe[298244] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a1c57b4237 cs:33 sp:7ff1d68b2ef8 ax:2f700000 si:55a1c58222f7 di:ffffffffff600000 [21499159.034146] exe[336402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a021e79237 cs:33 sp:7f9e62821ef8 ax:2f700000 si:55a021ee72f7 di:ffffffffff600000 [21499362.721968] potentially unexpected fatal signal 5. [21499362.725788] potentially unexpected fatal signal 11. [21499362.727195] CPU: 40 PID: 352189 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21499362.732509] CPU: 59 PID: 352442 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21499362.732511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21499362.732517] RIP: 0033:0x556919d95851 [21499362.732519] Code: 24 10 00 00 00 44 8b 54 24 30 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 eb ae 66 0f 1f 44 00 00 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff eb ae e8 10 26 00 00 48 83 ec 58 48 89 4c [21499362.732520] RSP: 002b:00007f58fc16f4d0 EFLAGS: 00010213 [21499362.732522] RAX: 0000000000000002 RBX: 0000000000000005 RCX: 0000556919d95801 [21499362.732523] RDX: ffffffffffffffb0 RSI: 0000556919de145d RDI: 00000000ffffff9c [21499362.732523] RBP: 00007f58fc16f59c R08: 00000000001d859a R09: 0000000000000020 [21499362.732524] R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000000 [21499362.732525] R13: 0000000000003a74 R14: 00000000000033f6 R15: 0000000000000003 [21499362.732525] FS: 000055691a9f4480 GS: 0000000000000000 [21499362.844006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21499362.853681] RIP: 0033:0x7fffffffe062 [21499362.859060] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [21499362.880250] RSP: 002b:000000c00078db90 EFLAGS: 00000297 [21499362.887251] RAX: 00000000000561f1 RBX: 0000000000000000 RCX: 00007fffffffe05a [21499362.896190] RDX: 0000000000000000 RSI: 000000c00078e000 RDI: 0000000000012f00 [21499362.905140] RBP: 000000c00078dc28 R08: 000000c0005925b0 R09: 0000000000000000 [21499362.914057] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00078dc18 [21499362.922967] R13: 000000c000167d70 R14: 000000c000503340 R15: 0000000000055f3e [21499362.931910] FS: 000000c00050e098 GS: 0000000000000000 [21499478.998984] potentially unexpected fatal signal 11. [21499479.004337] CPU: 19 PID: 356472 Comm: exe Tainted: G L 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [21499479.016322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [21499479.025982] RIP: 0033:0x5581640c265e [21499479.030007] Code: ff 0f 1f 00 8d 47 01 eb 16 0f 1f 00 48 83 c0 01 8b b4 85 5c 08 00 00 85 f6 0f 85 fd 00 00 00 89 c7 83 f8 04 75 e6 48 8b 4d 60 <48> 8b 41 08 48 83 e0 f8 48 39 85 88 08 00 00 0f 82 4a 02 00 00 48 [21499479.050628] RSP: 002b:00007fb15f2642f0 EFLAGS: 00010246 [21499479.057660] RAX: 0000000000000004 RBX: 0000000000008040 RCX: 0000558164d467d0 [21499479.066573] RDX: 00005581641e8e20 RSI: 0000000000000000 RDI: 0000000000000004 [21499479.075511] RBP: 00005581641e8660 R08: 0000000027b61aef R09: 0000000000000106 [21499479.084431] R10: 0000000000001000 R11: 0000000000000802 R12: 0000000000008030 [21499479.093382] R13: 0000000000000076 R14: 00005581641e86c0 R15: 0000000000000000 [21499479.102287] FS: 0000558164d45480 GS: 0000000000000000