49] Allocate a new trap: 0xc001ed9d40 39 D0323 22:35:21.564015 921384 usertrap_amd64.go:225] [ 11149: 11149] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.565575 921384 usertrap_amd64.go:212] [ 11149: 11149] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.565637 921384 usertrap_amd64.go:122] [ 11149: 11149] Allocate a new trap: 0xc001ed9d40 40 D0323 22:35:21.565667 921384 usertrap_amd64.go:225] [ 11149: 11149] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.567823 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.568083 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.571210 921384 usertrap_amd64.go:212] [ 11149: 11149] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.571248 921384 usertrap_amd64.go:122] [ 11149: 11149] Allocate a new trap: 0xc001ed9d40 41 D0323 22:35:21.571271 921384 usertrap_amd64.go:225] [ 11149: 11149] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.578932 921384 usertrap_amd64.go:212] [ 11149: 11149] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.578966 921384 usertrap_amd64.go:122] [ 11149: 11149] Allocate a new trap: 0xc001ed9d40 42 D0323 22:35:21.578979 921384 usertrap_amd64.go:225] [ 11149: 11149] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.579633 921384 task_exit.go:204] [ 11149: 11149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.579669 921384 task_exit.go:204] [ 11149: 11149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.579749 921384 task_signals.go:204] [ 11149: 11150] Signal 11149, PID: 11150, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.579793 921384 task_exit.go:204] [ 11149: 11150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.581210 921384 task_exit.go:204] [ 11149: 11150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.581240 921384 task_exit.go:204] [ 11149: 11150] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.581257 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.582107 921384 task_exit.go:204] [ 11149: 11149] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.583535 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.583954 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.593370 921384 usertrap_amd64.go:212] [ 11151: 11151] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.593433 921384 usertrap_amd64.go:122] [ 11151: 11151] Allocate a new trap: 0xc008182ab0 39 D0323 22:35:21.593541 921384 usertrap_amd64.go:225] [ 11151: 11151] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.594296 921384 usertrap_amd64.go:212] [ 11151: 11151] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.594370 921384 usertrap_amd64.go:122] [ 11151: 11151] Allocate a new trap: 0xc008182ab0 40 D0323 22:35:21.594388 921384 usertrap_amd64.go:225] [ 11151: 11151] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.595301 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.595472 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.598850 921384 usertrap_amd64.go:212] [ 11151: 11151] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.598869 921384 usertrap_amd64.go:122] [ 11151: 11151] Allocate a new trap: 0xc008182ab0 41 D0323 22:35:21.598879 921384 usertrap_amd64.go:225] [ 11151: 11151] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.605541 921384 usertrap_amd64.go:212] [ 11151: 11151] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.605572 921384 usertrap_amd64.go:122] [ 11151: 11151] Allocate a new trap: 0xc008182ab0 42 D0323 22:35:21.605585 921384 usertrap_amd64.go:225] [ 11151: 11151] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.607021 921384 task_exit.go:204] [ 11151: 11151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.607054 921384 task_exit.go:204] [ 11151: 11151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.607111 921384 task_signals.go:204] [ 11151: 11152] Signal 11151, PID: 11152, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.607172 921384 task_exit.go:204] [ 11151: 11152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.608630 921384 task_exit.go:204] [ 11151: 11152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.608659 921384 task_exit.go:204] [ 11151: 11152] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.608671 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.611469 921384 task_exit.go:204] [ 11151: 11151] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@private, @broadcast}, 0xc) D0323 22:35:21.613687 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.613833 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.622820 921384 usertrap_amd64.go:212] [ 11153: 11153] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.622927 921384 usertrap_amd64.go:122] [ 11153: 11153] Allocate a new trap: 0xc008182d20 39 D0323 22:35:21.623023 921384 usertrap_amd64.go:225] [ 11153: 11153] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.623438 921384 usertrap_amd64.go:212] [ 11153: 11153] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.623466 921384 usertrap_amd64.go:122] [ 11153: 11153] Allocate a new trap: 0xc008182d20 40 D0323 22:35:21.623477 921384 usertrap_amd64.go:225] [ 11153: 11153] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.624362 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.624619 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.629852 921384 usertrap_amd64.go:212] [ 11153: 11153] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.629903 921384 usertrap_amd64.go:122] [ 11153: 11153] Allocate a new trap: 0xc008182d20 41 D0323 22:35:21.629921 921384 usertrap_amd64.go:225] [ 11153: 11153] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.639621 921384 usertrap_amd64.go:212] [ 11153: 11153] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.639651 921384 usertrap_amd64.go:122] [ 11153: 11153] Allocate a new trap: 0xc008182d20 42 D0323 22:35:21.639667 921384 usertrap_amd64.go:225] [ 11153: 11153] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.640124 921384 task_exit.go:204] [ 11153: 11153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.640164 921384 task_exit.go:204] [ 11153: 11153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.640259 921384 task_signals.go:204] [ 11153: 11154] Signal 11153, PID: 11154, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.640305 921384 task_exit.go:204] [ 11153: 11154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.641420 921384 task_exit.go:204] [ 11153: 11154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.641451 921384 task_exit.go:204] [ 11153: 11154] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.641467 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.641603 921384 task_exit.go:204] [ 11153: 11153] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.643636 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.643805 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.654933 921384 usertrap_amd64.go:212] [ 11155: 11155] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.654960 921384 usertrap_amd64.go:122] [ 11155: 11155] Allocate a new trap: 0xc001ed9f80 39 D0323 22:35:21.655041 921384 usertrap_amd64.go:225] [ 11155: 11155] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.655431 921384 usertrap_amd64.go:212] [ 11155: 11155] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.655441 921384 usertrap_amd64.go:122] [ 11155: 11155] Allocate a new trap: 0xc001ed9f80 40 D0323 22:35:21.655448 921384 usertrap_amd64.go:225] [ 11155: 11155] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.656307 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.656613 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.660079 921384 usertrap_amd64.go:212] [ 11155: 11155] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.660103 921384 usertrap_amd64.go:122] [ 11155: 11155] Allocate a new trap: 0xc001ed9f80 41 D0323 22:35:21.660121 921384 usertrap_amd64.go:225] [ 11155: 11155] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.667961 921384 usertrap_amd64.go:212] [ 11155: 11155] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.667991 921384 usertrap_amd64.go:122] [ 11155: 11155] Allocate a new trap: 0xc001ed9f80 42 D0323 22:35:21.668003 921384 usertrap_amd64.go:225] [ 11155: 11155] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.668501 921384 task_exit.go:204] [ 11155: 11155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.668546 921384 task_exit.go:204] [ 11155: 11155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.668583 921384 task_signals.go:204] [ 11155: 11156] Signal 11155, PID: 11156, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.668621 921384 task_exit.go:204] [ 11155: 11156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.670026 921384 task_exit.go:204] [ 11155: 11156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.670061 921384 task_exit.go:204] [ 11155: 11156] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.670086 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.670913 921384 task_exit.go:204] [ 11155: 11155] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.677656 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.677855 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.686618 921384 usertrap_amd64.go:212] [ 11157: 11157] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.686679 921384 usertrap_amd64.go:122] [ 11157: 11157] Allocate a new trap: 0xc0080430e0 39 D0323 22:35:21.688460 921384 usertrap_amd64.go:225] [ 11157: 11157] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.690738 921384 usertrap_amd64.go:212] [ 11157: 11157] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.690772 921384 usertrap_amd64.go:122] [ 11157: 11157] Allocate a new trap: 0xc0080430e0 40 D0323 22:35:21.690785 921384 usertrap_amd64.go:225] [ 11157: 11157] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.691555 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.691776 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.694297 921384 usertrap_amd64.go:212] [ 11157: 11157] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.694324 921384 usertrap_amd64.go:122] [ 11157: 11157] Allocate a new trap: 0xc0080430e0 41 D0323 22:35:21.694334 921384 usertrap_amd64.go:225] [ 11157: 11157] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.702575 921384 usertrap_amd64.go:212] [ 11157: 11157] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.702606 921384 usertrap_amd64.go:122] [ 11157: 11157] Allocate a new trap: 0xc0080430e0 42 D0323 22:35:21.702618 921384 usertrap_amd64.go:225] [ 11157: 11157] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.703214 921384 task_exit.go:204] [ 11157: 11157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.703258 921384 task_exit.go:204] [ 11157: 11157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.703287 921384 task_signals.go:204] [ 11157: 11158] Signal 11157, PID: 11158, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.703322 921384 task_exit.go:204] [ 11157: 11158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.705076 921384 task_exit.go:204] [ 11157: 11158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.705110 921384 task_exit.go:204] [ 11157: 11158] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.705129 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.705816 921384 task_exit.go:204] [ 11157: 11157] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.709770 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.709949 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.719037 921384 usertrap_amd64.go:212] [ 11159: 11159] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.719056 921384 usertrap_amd64.go:122] [ 11159: 11159] Allocate a new trap: 0xc0032ffa10 39 D0323 22:35:21.719185 921384 usertrap_amd64.go:225] [ 11159: 11159] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.720210 921384 usertrap_amd64.go:212] [ 11159: 11159] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.720234 921384 usertrap_amd64.go:122] [ 11159: 11159] Allocate a new trap: 0xc0032ffa10 40 D0323 22:35:21.720244 921384 usertrap_amd64.go:225] [ 11159: 11159] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.720924 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.721180 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.723905 921384 usertrap_amd64.go:212] [ 11159: 11159] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.723934 921384 usertrap_amd64.go:122] [ 11159: 11159] Allocate a new trap: 0xc0032ffa10 41 D0323 22:35:21.723948 921384 usertrap_amd64.go:225] [ 11159: 11159] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.731593 921384 usertrap_amd64.go:212] [ 11159: 11159] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.731628 921384 usertrap_amd64.go:122] [ 11159: 11159] Allocate a new trap: 0xc0032ffa10 42 D0323 22:35:21.731646 921384 usertrap_amd64.go:225] [ 11159: 11159] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.732158 921384 task_exit.go:204] [ 11159: 11159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.732194 921384 task_exit.go:204] [ 11159: 11159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.732276 921384 task_signals.go:204] [ 11159: 11160] Signal 11159, PID: 11160, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.732317 921384 task_exit.go:204] [ 11159: 11160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.733780 921384 task_exit.go:204] [ 11159: 11160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.733795 921384 task_exit.go:204] [ 11159: 11160] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.733807 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.734980 921384 task_exit.go:204] [ 11159: 11159] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.737752 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.737909 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.744145 921384 usertrap_amd64.go:212] [ 11161: 11161] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.744176 921384 usertrap_amd64.go:122] [ 11161: 11161] Allocate a new trap: 0xc00246bef0 39 D0323 22:35:21.744255 921384 usertrap_amd64.go:225] [ 11161: 11161] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.745003 921384 usertrap_amd64.go:212] [ 11161: 11161] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.745030 921384 usertrap_amd64.go:122] [ 11161: 11161] Allocate a new trap: 0xc00246bef0 40 D0323 22:35:21.745042 921384 usertrap_amd64.go:225] [ 11161: 11161] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.745746 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.745902 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.748368 921384 usertrap_amd64.go:212] [ 11161: 11161] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.748386 921384 usertrap_amd64.go:122] [ 11161: 11161] Allocate a new trap: 0xc00246bef0 41 D0323 22:35:21.748398 921384 usertrap_amd64.go:225] [ 11161: 11161] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.754271 921384 usertrap_amd64.go:212] [ 11161: 11161] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.754297 921384 usertrap_amd64.go:122] [ 11161: 11161] Allocate a new trap: 0xc00246bef0 42 D0323 22:35:21.754306 921384 usertrap_amd64.go:225] [ 11161: 11161] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.754639 921384 task_exit.go:204] [ 11161: 11161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.754744 921384 task_exit.go:204] [ 11161: 11161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.754812 921384 task_signals.go:204] [ 11161: 11162] Signal 11161, PID: 11162, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.756985 921384 task_exit.go:204] [ 11161: 11162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.759097 921384 task_exit.go:204] [ 11161: 11162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.759129 921384 task_exit.go:204] [ 11161: 11162] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.759146 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.759702 921384 task_exit.go:204] [ 11161: 11161] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.760361 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.760482 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:21 executing program 0: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.768171 921384 usertrap_amd64.go:212] [ 11163: 11163] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.768198 921384 usertrap_amd64.go:122] [ 11163: 11163] Allocate a new trap: 0xc008043380 39 D0323 22:35:21.768280 921384 usertrap_amd64.go:225] [ 11163: 11163] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.768771 921384 usertrap_amd64.go:212] [ 11163: 11163] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.768797 921384 usertrap_amd64.go:122] [ 11163: 11163] Allocate a new trap: 0xc008043380 40 D0323 22:35:21.768808 921384 usertrap_amd64.go:225] [ 11163: 11163] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.769290 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.769414 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.772117 921384 usertrap_amd64.go:212] [ 11163: 11163] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.772196 921384 usertrap_amd64.go:122] [ 11163: 11163] Allocate a new trap: 0xc008043380 41 D0323 22:35:21.772223 921384 usertrap_amd64.go:225] [ 11163: 11163] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.778618 921384 usertrap_amd64.go:212] [ 11163: 11163] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.778651 921384 usertrap_amd64.go:122] [ 11163: 11163] Allocate a new trap: 0xc008043380 42 D0323 22:35:21.778665 921384 usertrap_amd64.go:225] [ 11163: 11163] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.779656 921384 task_exit.go:204] [ 11163: 11163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.779689 921384 task_exit.go:204] [ 11163: 11163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.779811 921384 task_signals.go:204] [ 11163: 11164] Signal 11163, PID: 11164, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.779847 921384 task_exit.go:204] [ 11163: 11164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.781405 921384 task_exit.go:204] [ 11163: 11164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.781444 921384 task_exit.go:204] [ 11163: 11164] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.781457 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.782129 921384 task_exit.go:204] [ 11163: 11163] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.783546 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.783662 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:21 executing program 0: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.800535 921384 usertrap_amd64.go:212] [ 11165: 11165] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.800583 921384 usertrap_amd64.go:122] [ 11165: 11165] Allocate a new trap: 0xc00246bfb0 39 D0323 22:35:21.800711 921384 usertrap_amd64.go:225] [ 11165: 11165] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.801576 921384 usertrap_amd64.go:212] [ 11165: 11165] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.801600 921384 usertrap_amd64.go:122] [ 11165: 11165] Allocate a new trap: 0xc00246bfb0 40 D0323 22:35:21.801617 921384 usertrap_amd64.go:225] [ 11165: 11165] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.802506 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.802738 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.805737 921384 usertrap_amd64.go:212] [ 11165: 11165] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.805759 921384 usertrap_amd64.go:122] [ 11165: 11165] Allocate a new trap: 0xc00246bfb0 41 D0323 22:35:21.805772 921384 usertrap_amd64.go:225] [ 11165: 11165] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.813225 921384 usertrap_amd64.go:212] [ 11165: 11165] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.813256 921384 usertrap_amd64.go:122] [ 11165: 11165] Allocate a new trap: 0xc00246bfb0 42 D0323 22:35:21.813271 921384 usertrap_amd64.go:225] [ 11165: 11165] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.813642 921384 task_exit.go:204] [ 11165: 11165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.813672 921384 task_exit.go:204] [ 11165: 11165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.813732 921384 task_signals.go:204] [ 11165: 11166] Signal 11165, PID: 11166, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.813759 921384 task_exit.go:204] [ 11165: 11166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.815253 921384 task_exit.go:204] [ 11165: 11166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.815280 921384 task_exit.go:204] [ 11165: 11166] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.815292 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.816737 921384 task_exit.go:204] [ 11165: 11165] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.817721 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.817877 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.825988 921384 usertrap_amd64.go:212] [ 11167: 11167] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.826016 921384 usertrap_amd64.go:122] [ 11167: 11167] Allocate a new trap: 0xc000bca5a0 39 D0323 22:35:21.826110 921384 usertrap_amd64.go:225] [ 11167: 11167] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.826713 921384 usertrap_amd64.go:212] [ 11167: 11167] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.826732 921384 usertrap_amd64.go:122] [ 11167: 11167] Allocate a new trap: 0xc000bca5a0 40 D0323 22:35:21.826742 921384 usertrap_amd64.go:225] [ 11167: 11167] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.827083 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.827249 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.829095 921384 usertrap_amd64.go:212] [ 11167: 11167] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.829122 921384 usertrap_amd64.go:122] [ 11167: 11167] Allocate a new trap: 0xc000bca5a0 41 D0323 22:35:21.829133 921384 usertrap_amd64.go:225] [ 11167: 11167] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.835164 921384 usertrap_amd64.go:212] [ 11167: 11167] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.835184 921384 usertrap_amd64.go:122] [ 11167: 11167] Allocate a new trap: 0xc000bca5a0 42 D0323 22:35:21.835194 921384 usertrap_amd64.go:225] [ 11167: 11167] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.835470 921384 task_exit.go:204] [ 11167: 11167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.835500 921384 task_exit.go:204] [ 11167: 11167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.835540 921384 task_signals.go:204] [ 11167: 11168] Signal 11167, PID: 11168, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.835571 921384 task_exit.go:204] [ 11167: 11168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.838168 921384 task_exit.go:204] [ 11167: 11168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.838201 921384 task_exit.go:204] [ 11167: 11168] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.838216 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.839134 921384 task_exit.go:204] [ 11167: 11167] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.840369 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.840528 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.848670 921384 usertrap_amd64.go:212] [ 11169: 11169] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.848698 921384 usertrap_amd64.go:122] [ 11169: 11169] Allocate a new trap: 0xc000acf2f0 39 D0323 22:35:21.848794 921384 usertrap_amd64.go:225] [ 11169: 11169] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.849595 921384 usertrap_amd64.go:212] [ 11169: 11169] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.849618 921384 usertrap_amd64.go:122] [ 11169: 11169] Allocate a new trap: 0xc000acf2f0 40 D0323 22:35:21.849625 921384 usertrap_amd64.go:225] [ 11169: 11169] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.850125 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.850297 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.852456 921384 usertrap_amd64.go:212] [ 11169: 11169] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.852482 921384 usertrap_amd64.go:122] [ 11169: 11169] Allocate a new trap: 0xc000acf2f0 41 D0323 22:35:21.852496 921384 usertrap_amd64.go:225] [ 11169: 11169] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.858743 921384 usertrap_amd64.go:212] [ 11169: 11169] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.858769 921384 usertrap_amd64.go:122] [ 11169: 11169] Allocate a new trap: 0xc000acf2f0 42 D0323 22:35:21.858782 921384 usertrap_amd64.go:225] [ 11169: 11169] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.859885 921384 task_exit.go:204] [ 11169: 11169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.859919 921384 task_exit.go:204] [ 11169: 11169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.859977 921384 task_signals.go:204] [ 11169: 11170] Signal 11169, PID: 11170, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.860004 921384 task_exit.go:204] [ 11169: 11170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.861617 921384 task_exit.go:204] [ 11169: 11170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.861653 921384 task_exit.go:204] [ 11169: 11170] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.861672 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.862856 921384 task_exit.go:204] [ 11169: 11169] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.863790 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.863931 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:21 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) D0323 22:35:21.876188 921384 usertrap_amd64.go:212] [ 11171: 11171] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.876219 921384 usertrap_amd64.go:122] [ 11171: 11171] Allocate a new trap: 0xc000bca600 39 D0323 22:35:21.876273 921384 usertrap_amd64.go:225] [ 11171: 11171] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.877113 921384 usertrap_amd64.go:212] [ 11171: 11171] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.877132 921384 usertrap_amd64.go:122] [ 11171: 11171] Allocate a new trap: 0xc000bca600 40 D0323 22:35:21.877144 921384 usertrap_amd64.go:225] [ 11171: 11171] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.878395 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.878602 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.881398 921384 usertrap_amd64.go:212] [ 11171: 11171] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.881486 921384 usertrap_amd64.go:122] [ 11171: 11171] Allocate a new trap: 0xc000bca600 41 D0323 22:35:21.881549 921384 usertrap_amd64.go:225] [ 11171: 11171] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.889387 921384 usertrap_amd64.go:212] [ 11171: 11171] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.889415 921384 usertrap_amd64.go:122] [ 11171: 11171] Allocate a new trap: 0xc000bca600 42 D0323 22:35:21.889429 921384 usertrap_amd64.go:225] [ 11171: 11171] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.891724 921384 task_exit.go:204] [ 11171: 11171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.891877 921384 task_exit.go:204] [ 11171: 11171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.891938 921384 task_signals.go:204] [ 11171: 11172] Signal 11171, PID: 11172, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.891960 921384 task_exit.go:204] [ 11171: 11172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.894274 921384 task_exit.go:204] [ 11171: 11172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.894302 921384 task_exit.go:204] [ 11171: 11172] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.894323 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.895489 921384 task_exit.go:204] [ 11171: 11171] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) D0323 22:35:21.900346 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.900538 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.913061 921384 usertrap_amd64.go:212] [ 11173: 11173] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.913141 921384 usertrap_amd64.go:122] [ 11173: 11173] Allocate a new trap: 0xc008043530 39 D0323 22:35:21.913269 921384 usertrap_amd64.go:225] [ 11173: 11173] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.914108 921384 usertrap_amd64.go:212] [ 11173: 11173] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.914133 921384 usertrap_amd64.go:122] [ 11173: 11173] Allocate a new trap: 0xc008043530 40 D0323 22:35:21.914145 921384 usertrap_amd64.go:225] [ 11173: 11173] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.914680 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.914916 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.918662 921384 usertrap_amd64.go:212] [ 11173: 11173] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.918687 921384 usertrap_amd64.go:122] [ 11173: 11173] Allocate a new trap: 0xc008043530 41 D0323 22:35:21.918701 921384 usertrap_amd64.go:225] [ 11173: 11173] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.925745 921384 usertrap_amd64.go:212] [ 11173: 11173] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.925770 921384 usertrap_amd64.go:122] [ 11173: 11173] Allocate a new trap: 0xc008043530 42 D0323 22:35:21.925785 921384 usertrap_amd64.go:225] [ 11173: 11173] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.926197 921384 task_exit.go:204] [ 11173: 11173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.926223 921384 task_exit.go:204] [ 11173: 11173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.926238 921384 task_signals.go:204] [ 11173: 11174] Signal 11173, PID: 11174, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.926278 921384 task_exit.go:204] [ 11173: 11174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.927553 921384 task_exit.go:204] [ 11173: 11174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.927592 921384 task_exit.go:204] [ 11173: 11174] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.927607 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.927648 921384 task_exit.go:204] [ 11173: 11173] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) D0323 22:35:21.930032 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.930179 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.939781 921384 usertrap_amd64.go:212] [ 11175: 11175] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.939805 921384 usertrap_amd64.go:122] [ 11175: 11175] Allocate a new trap: 0xc0032ffef0 39 D0323 22:35:21.939881 921384 usertrap_amd64.go:225] [ 11175: 11175] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.940730 921384 usertrap_amd64.go:212] [ 11175: 11175] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.940759 921384 usertrap_amd64.go:122] [ 11175: 11175] Allocate a new trap: 0xc0032ffef0 40 D0323 22:35:21.940771 921384 usertrap_amd64.go:225] [ 11175: 11175] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.941347 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.941515 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.944210 921384 usertrap_amd64.go:212] [ 11175: 11175] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.944237 921384 usertrap_amd64.go:122] [ 11175: 11175] Allocate a new trap: 0xc0032ffef0 41 D0323 22:35:21.944249 921384 usertrap_amd64.go:225] [ 11175: 11175] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.954869 921384 usertrap_amd64.go:212] [ 11175: 11175] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.954901 921384 usertrap_amd64.go:122] [ 11175: 11175] Allocate a new trap: 0xc0032ffef0 42 D0323 22:35:21.954915 921384 usertrap_amd64.go:225] [ 11175: 11175] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.955734 921384 task_exit.go:204] [ 11175: 11175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.955814 921384 task_exit.go:204] [ 11175: 11175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.955884 921384 task_signals.go:204] [ 11175: 11176] Signal 11175, PID: 11176, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.955912 921384 task_exit.go:204] [ 11175: 11176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.957952 921384 task_exit.go:204] [ 11175: 11176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.957991 921384 task_exit.go:204] [ 11175: 11176] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.958011 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.959076 921384 task_exit.go:204] [ 11175: 11175] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) D0323 22:35:21.960288 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:21.960450 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.969988 921384 usertrap_amd64.go:212] [ 11177: 11177] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:21.970021 921384 usertrap_amd64.go:122] [ 11177: 11177] Allocate a new trap: 0xc0074f8420 39 D0323 22:35:21.970566 921384 usertrap_amd64.go:225] [ 11177: 11177] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:21.971049 921384 usertrap_amd64.go:212] [ 11177: 11177] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:21.971077 921384 usertrap_amd64.go:122] [ 11177: 11177] Allocate a new trap: 0xc0074f8420 40 D0323 22:35:21.971088 921384 usertrap_amd64.go:225] [ 11177: 11177] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:21.971470 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:21.971625 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:21.973669 921384 usertrap_amd64.go:212] [ 11177: 11177] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:21.973696 921384 usertrap_amd64.go:122] [ 11177: 11177] Allocate a new trap: 0xc0074f8420 41 D0323 22:35:21.973708 921384 usertrap_amd64.go:225] [ 11177: 11177] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:21.982566 921384 usertrap_amd64.go:212] [ 11177: 11177] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:21.982658 921384 usertrap_amd64.go:122] [ 11177: 11177] Allocate a new trap: 0xc0074f8420 42 D0323 22:35:21.982684 921384 usertrap_amd64.go:225] [ 11177: 11177] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:21.989573 921384 task_exit.go:204] [ 11177: 11177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.989617 921384 task_exit.go:204] [ 11177: 11177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.989621 921384 task_signals.go:204] [ 11177: 11178] Signal 11177, PID: 11178, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:21.989663 921384 task_exit.go:204] [ 11177: 11178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:21.991182 921384 task_exit.go:204] [ 11177: 11178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:21.991210 921384 task_exit.go:204] [ 11177: 11178] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:21.991236 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:21.991961 921384 task_exit.go:204] [ 11177: 11177] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000000)={@private=0xa010101, @broadcast}, 0xc) D0323 22:35:22.000105 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.000277 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.007826 921384 usertrap_amd64.go:212] [ 11179: 11179] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.007918 921384 usertrap_amd64.go:122] [ 11179: 11179] Allocate a new trap: 0xc002736030 39 D0323 22:35:22.007994 921384 usertrap_amd64.go:225] [ 11179: 11179] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.008420 921384 usertrap_amd64.go:212] [ 11179: 11179] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.008471 921384 usertrap_amd64.go:122] [ 11179: 11179] Allocate a new trap: 0xc002736030 40 D0323 22:35:22.008496 921384 usertrap_amd64.go:225] [ 11179: 11179] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.009794 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.010019 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.012176 921384 usertrap_amd64.go:212] [ 11179: 11179] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.012242 921384 usertrap_amd64.go:122] [ 11179: 11179] Allocate a new trap: 0xc002736030 41 D0323 22:35:22.012274 921384 usertrap_amd64.go:225] [ 11179: 11179] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.019749 921384 usertrap_amd64.go:212] [ 11179: 11179] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.019795 921384 usertrap_amd64.go:122] [ 11179: 11179] Allocate a new trap: 0xc002736030 42 D0323 22:35:22.019810 921384 usertrap_amd64.go:225] [ 11179: 11179] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.020177 921384 task_exit.go:204] [ 11179: 11179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.020214 921384 task_exit.go:204] [ 11179: 11179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.020297 921384 task_signals.go:204] [ 11179: 11180] Signal 11179, PID: 11180, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.020328 921384 task_exit.go:204] [ 11179: 11180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.022440 921384 task_exit.go:204] [ 11179: 11180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.022469 921384 task_exit.go:204] [ 11179: 11180] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.022491 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.023352 921384 task_exit.go:204] [ 11179: 11179] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000000)={@private=0xa010101, @broadcast}, 0xc) D0323 22:35:22.024310 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.024446 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.034104 921384 usertrap_amd64.go:212] [ 11181: 11181] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.034126 921384 usertrap_amd64.go:122] [ 11181: 11181] Allocate a new trap: 0xc0074f8690 39 D0323 22:35:22.034188 921384 usertrap_amd64.go:225] [ 11181: 11181] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.034492 921384 usertrap_amd64.go:212] [ 11181: 11181] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.034507 921384 usertrap_amd64.go:122] [ 11181: 11181] Allocate a new trap: 0xc0074f8690 40 D0323 22:35:22.034513 921384 usertrap_amd64.go:225] [ 11181: 11181] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.034951 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.035134 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.037207 921384 usertrap_amd64.go:212] [ 11181: 11181] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.037231 921384 usertrap_amd64.go:122] [ 11181: 11181] Allocate a new trap: 0xc0074f8690 41 D0323 22:35:22.037244 921384 usertrap_amd64.go:225] [ 11181: 11181] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.043788 921384 usertrap_amd64.go:212] [ 11181: 11181] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.043810 921384 usertrap_amd64.go:122] [ 11181: 11181] Allocate a new trap: 0xc0074f8690 42 D0323 22:35:22.043821 921384 usertrap_amd64.go:225] [ 11181: 11181] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.044188 921384 task_exit.go:204] [ 11181: 11181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.044221 921384 task_exit.go:204] [ 11181: 11181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.044280 921384 task_signals.go:204] [ 11181: 11182] Signal 11181, PID: 11182, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.044318 921384 task_exit.go:204] [ 11181: 11182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.045632 921384 task_exit.go:204] [ 11181: 11182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.045705 921384 task_exit.go:204] [ 11181: 11182] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.045731 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.046827 921384 task_exit.go:204] [ 11181: 11181] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000000)={@private=0xa010101, @broadcast}, 0xc) D0323 22:35:22.049627 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.049771 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.056091 921384 usertrap_amd64.go:212] [ 11183: 11183] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.056117 921384 usertrap_amd64.go:122] [ 11183: 11183] Allocate a new trap: 0xc0080437a0 39 D0323 22:35:22.056224 921384 usertrap_amd64.go:225] [ 11183: 11183] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.057004 921384 usertrap_amd64.go:212] [ 11183: 11183] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.057025 921384 usertrap_amd64.go:122] [ 11183: 11183] Allocate a new trap: 0xc0080437a0 40 D0323 22:35:22.057033 921384 usertrap_amd64.go:225] [ 11183: 11183] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.058206 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.058405 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.060545 921384 usertrap_amd64.go:212] [ 11183: 11183] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.060569 921384 usertrap_amd64.go:122] [ 11183: 11183] Allocate a new trap: 0xc0080437a0 41 D0323 22:35:22.060578 921384 usertrap_amd64.go:225] [ 11183: 11183] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.069517 921384 usertrap_amd64.go:212] [ 11183: 11183] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.069548 921384 usertrap_amd64.go:122] [ 11183: 11183] Allocate a new trap: 0xc0080437a0 42 D0323 22:35:22.069564 921384 usertrap_amd64.go:225] [ 11183: 11183] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.069951 921384 task_exit.go:204] [ 11183: 11183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.069981 921384 task_exit.go:204] [ 11183: 11183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.070070 921384 task_signals.go:204] [ 11183: 11184] Signal 11183, PID: 11184, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.070104 921384 task_exit.go:204] [ 11183: 11184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.071322 921384 task_exit.go:204] [ 11183: 11184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.071353 921384 task_exit.go:204] [ 11183: 11184] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.071373 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.072586 921384 task_exit.go:204] [ 11183: 11183] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@private=0xa010101, @broadcast}, 0xc) D0323 22:35:22.077408 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.077913 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.085846 921384 usertrap_amd64.go:212] [ 11185: 11185] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.085874 921384 usertrap_amd64.go:122] [ 11185: 11185] Allocate a new trap: 0xc008043a10 39 D0323 22:35:22.086668 921384 usertrap_amd64.go:225] [ 11185: 11185] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.087312 921384 usertrap_amd64.go:212] [ 11185: 11185] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.087328 921384 usertrap_amd64.go:122] [ 11185: 11185] Allocate a new trap: 0xc008043a10 40 D0323 22:35:22.087338 921384 usertrap_amd64.go:225] [ 11185: 11185] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.087774 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.087908 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.089862 921384 usertrap_amd64.go:212] [ 11185: 11185] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.089886 921384 usertrap_amd64.go:122] [ 11185: 11185] Allocate a new trap: 0xc008043a10 41 D0323 22:35:22.089898 921384 usertrap_amd64.go:225] [ 11185: 11185] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.099560 921384 usertrap_amd64.go:212] [ 11185: 11185] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.099589 921384 usertrap_amd64.go:122] [ 11185: 11185] Allocate a new trap: 0xc008043a10 42 D0323 22:35:22.099600 921384 usertrap_amd64.go:225] [ 11185: 11185] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.100114 921384 task_exit.go:204] [ 11185: 11185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.100141 921384 task_exit.go:204] [ 11185: 11185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.100184 921384 task_signals.go:204] [ 11185: 11186] Signal 11185, PID: 11186, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.100220 921384 task_exit.go:204] [ 11185: 11186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.103948 921384 task_exit.go:204] [ 11185: 11186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.103975 921384 task_exit.go:204] [ 11185: 11186] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.103998 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.105086 921384 task_exit.go:204] [ 11185: 11185] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@private=0xa010101, @broadcast}, 0xc) D0323 22:35:22.117593 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.118184 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.132626 921384 usertrap_amd64.go:212] [ 11187: 11187] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.132768 921384 usertrap_amd64.go:122] [ 11187: 11187] Allocate a new trap: 0xc000acf860 39 D0323 22:35:22.132886 921384 usertrap_amd64.go:225] [ 11187: 11187] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.133735 921384 usertrap_amd64.go:212] [ 11187: 11187] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.133771 921384 usertrap_amd64.go:122] [ 11187: 11187] Allocate a new trap: 0xc000acf860 40 D0323 22:35:22.133786 921384 usertrap_amd64.go:225] [ 11187: 11187] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.134456 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.134664 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.138499 921384 usertrap_amd64.go:212] [ 11187: 11187] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.138645 921384 usertrap_amd64.go:122] [ 11187: 11187] Allocate a new trap: 0xc000acf860 41 D0323 22:35:22.138709 921384 usertrap_amd64.go:225] [ 11187: 11187] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.145966 921384 usertrap_amd64.go:212] [ 11187: 11187] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.145999 921384 usertrap_amd64.go:122] [ 11187: 11187] Allocate a new trap: 0xc000acf860 42 D0323 22:35:22.146013 921384 usertrap_amd64.go:225] [ 11187: 11187] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.146529 921384 task_exit.go:204] [ 11187: 11187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.146576 921384 task_exit.go:204] [ 11187: 11187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.146668 921384 task_signals.go:204] [ 11187: 11188] Signal 11187, PID: 11188, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.146702 921384 task_exit.go:204] [ 11187: 11188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.148311 921384 task_exit.go:204] [ 11187: 11188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.148342 921384 task_exit.go:204] [ 11187: 11188] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.148359 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.149423 921384 task_exit.go:204] [ 11187: 11187] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.150405 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.150568 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:22 executing program 0: setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@private=0xa010101, @broadcast}, 0xc) D0323 22:35:22.167501 921384 usertrap_amd64.go:212] [ 11189: 11189] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.167532 921384 usertrap_amd64.go:122] [ 11189: 11189] Allocate a new trap: 0xc008043dd0 39 D0323 22:35:22.167642 921384 usertrap_amd64.go:225] [ 11189: 11189] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.168196 921384 usertrap_amd64.go:212] [ 11189: 11189] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.168217 921384 usertrap_amd64.go:122] [ 11189: 11189] Allocate a new trap: 0xc008043dd0 40 D0323 22:35:22.168227 921384 usertrap_amd64.go:225] [ 11189: 11189] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.169179 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.169396 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.172976 921384 usertrap_amd64.go:212] [ 11189: 11189] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.173008 921384 usertrap_amd64.go:122] [ 11189: 11189] Allocate a new trap: 0xc008043dd0 41 D0323 22:35:22.173021 921384 usertrap_amd64.go:225] [ 11189: 11189] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.181683 921384 usertrap_amd64.go:212] [ 11189: 11189] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.181733 921384 usertrap_amd64.go:122] [ 11189: 11189] Allocate a new trap: 0xc008043dd0 42 D0323 22:35:22.181752 921384 usertrap_amd64.go:225] [ 11189: 11189] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.182213 921384 task_exit.go:204] [ 11189: 11189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.182328 921384 task_exit.go:204] [ 11189: 11189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.182630 921384 task_signals.go:204] [ 11189: 11190] Signal 11189, PID: 11190, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.182660 921384 task_exit.go:204] [ 11189: 11190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.184075 921384 task_exit.go:204] [ 11189: 11190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.184116 921384 task_exit.go:204] [ 11189: 11190] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.184139 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.185937 921384 task_exit.go:204] [ 11189: 11189] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@private=0xa010101, @broadcast}, 0xc) D0323 22:35:22.197436 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.197597 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.207897 921384 usertrap_amd64.go:212] [ 11191: 11191] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.207964 921384 usertrap_amd64.go:122] [ 11191: 11191] Allocate a new trap: 0xc000acfb00 39 D0323 22:35:22.208038 921384 usertrap_amd64.go:225] [ 11191: 11191] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.209022 921384 usertrap_amd64.go:212] [ 11191: 11191] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.209051 921384 usertrap_amd64.go:122] [ 11191: 11191] Allocate a new trap: 0xc000acfb00 40 D0323 22:35:22.209067 921384 usertrap_amd64.go:225] [ 11191: 11191] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.209468 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.209693 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.213552 921384 usertrap_amd64.go:212] [ 11191: 11191] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.213577 921384 usertrap_amd64.go:122] [ 11191: 11191] Allocate a new trap: 0xc000acfb00 41 D0323 22:35:22.213591 921384 usertrap_amd64.go:225] [ 11191: 11191] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.221415 921384 usertrap_amd64.go:212] [ 11191: 11191] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.221450 921384 usertrap_amd64.go:122] [ 11191: 11191] Allocate a new trap: 0xc000acfb00 42 D0323 22:35:22.221484 921384 usertrap_amd64.go:225] [ 11191: 11191] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.222061 921384 task_exit.go:204] [ 11191: 11191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.222114 921384 task_exit.go:204] [ 11191: 11191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.222117 921384 task_signals.go:204] [ 11191: 11192] Signal 11191, PID: 11192, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.222144 921384 task_exit.go:204] [ 11191: 11192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.223677 921384 task_exit.go:204] [ 11191: 11192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.223713 921384 task_exit.go:204] [ 11191: 11192] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.223736 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.225331 921384 task_exit.go:204] [ 11191: 11191] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@private=0xa010101, @broadcast}, 0xc) D0323 22:35:22.226582 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.227049 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.235839 921384 usertrap_amd64.go:212] [ 11193: 11193] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.235956 921384 usertrap_amd64.go:122] [ 11193: 11193] Allocate a new trap: 0xc008182d50 39 D0323 22:35:22.236053 921384 usertrap_amd64.go:225] [ 11193: 11193] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.236580 921384 usertrap_amd64.go:212] [ 11193: 11193] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.236929 921384 usertrap_amd64.go:122] [ 11193: 11193] Allocate a new trap: 0xc008182d50 40 D0323 22:35:22.236999 921384 usertrap_amd64.go:225] [ 11193: 11193] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.237454 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.237639 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.240333 921384 usertrap_amd64.go:212] [ 11193: 11193] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.240360 921384 usertrap_amd64.go:122] [ 11193: 11193] Allocate a new trap: 0xc008182d50 41 D0323 22:35:22.240372 921384 usertrap_amd64.go:225] [ 11193: 11193] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.246707 921384 usertrap_amd64.go:212] [ 11193: 11193] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.246778 921384 usertrap_amd64.go:122] [ 11193: 11193] Allocate a new trap: 0xc008182d50 42 D0323 22:35:22.246803 921384 usertrap_amd64.go:225] [ 11193: 11193] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.247128 921384 task_exit.go:204] [ 11193: 11193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.247152 921384 task_exit.go:204] [ 11193: 11193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.247220 921384 task_signals.go:204] [ 11193: 11194] Signal 11193, PID: 11194, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.247294 921384 task_exit.go:204] [ 11193: 11194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.249264 921384 task_exit.go:204] [ 11193: 11194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.249293 921384 task_exit.go:204] [ 11193: 11194] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.249305 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.249758 921384 task_exit.go:204] [ 11193: 11193] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@private=0xa010101, @broadcast}, 0xc) D0323 22:35:22.253619 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.254106 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.264537 921384 usertrap_amd64.go:212] [ 11195: 11195] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.264580 921384 usertrap_amd64.go:122] [ 11195: 11195] Allocate a new trap: 0xc008182e10 39 D0323 22:35:22.264632 921384 usertrap_amd64.go:225] [ 11195: 11195] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.265281 921384 usertrap_amd64.go:212] [ 11195: 11195] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.265305 921384 usertrap_amd64.go:122] [ 11195: 11195] Allocate a new trap: 0xc008182e10 40 D0323 22:35:22.265314 921384 usertrap_amd64.go:225] [ 11195: 11195] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.265592 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.265795 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.272993 921384 usertrap_amd64.go:212] [ 11195: 11195] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.273013 921384 usertrap_amd64.go:122] [ 11195: 11195] Allocate a new trap: 0xc008182e10 41 D0323 22:35:22.273037 921384 usertrap_amd64.go:225] [ 11195: 11195] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.285209 921384 usertrap_amd64.go:212] [ 11195: 11195] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.285242 921384 usertrap_amd64.go:122] [ 11195: 11195] Allocate a new trap: 0xc008182e10 42 D0323 22:35:22.285256 921384 usertrap_amd64.go:225] [ 11195: 11195] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.285624 921384 task_exit.go:204] [ 11195: 11195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.285669 921384 task_exit.go:204] [ 11195: 11195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.285664 921384 task_signals.go:204] [ 11195: 11196] Signal 11195, PID: 11196, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.285692 921384 task_exit.go:204] [ 11195: 11196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.287379 921384 task_exit.go:204] [ 11195: 11196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.287398 921384 task_exit.go:204] [ 11195: 11196] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.287417 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.288633 921384 task_exit.go:204] [ 11195: 11195] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) D0323 22:35:22.290038 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.290191 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.301036 921384 usertrap_amd64.go:212] [ 11197: 11197] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.301066 921384 usertrap_amd64.go:122] [ 11197: 11197] Allocate a new trap: 0xc0074f8c60 39 D0323 22:35:22.301155 921384 usertrap_amd64.go:225] [ 11197: 11197] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.302060 921384 usertrap_amd64.go:212] [ 11197: 11197] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.302089 921384 usertrap_amd64.go:122] [ 11197: 11197] Allocate a new trap: 0xc0074f8c60 40 D0323 22:35:22.302107 921384 usertrap_amd64.go:225] [ 11197: 11197] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.303574 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.303892 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.306463 921384 usertrap_amd64.go:212] [ 11197: 11197] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.306559 921384 usertrap_amd64.go:122] [ 11197: 11197] Allocate a new trap: 0xc0074f8c60 41 D0323 22:35:22.306588 921384 usertrap_amd64.go:225] [ 11197: 11197] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.317994 921384 usertrap_amd64.go:212] [ 11197: 11197] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.318027 921384 usertrap_amd64.go:122] [ 11197: 11197] Allocate a new trap: 0xc0074f8c60 42 D0323 22:35:22.318041 921384 usertrap_amd64.go:225] [ 11197: 11197] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.318504 921384 task_exit.go:204] [ 11197: 11197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.318557 921384 task_exit.go:204] [ 11197: 11197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.318649 921384 task_signals.go:204] [ 11197: 11198] Signal 11197, PID: 11198, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.318717 921384 task_exit.go:204] [ 11197: 11198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.322926 921384 task_exit.go:204] [ 11197: 11198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.322957 921384 task_exit.go:204] [ 11197: 11198] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.322972 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.323950 921384 task_exit.go:204] [ 11197: 11197] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.326457 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.326593 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r2, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r1}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r4, 0x400454cc, 0xffffffffffffffff) r5 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "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", "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"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x210100, 0x0) write$nbd(r6, &(0x7f0000002a00)={0x67446698, 0x0, 0x3, 0x2, 0x4, "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"}, 0x1010) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000400)={'tunl0\x00', r1, 0x8, 0x80, 0x9, 0x8001, {{0xd, 0x4, 0x1, 0x28, 0x34, 0x65, 0x0, 0x40, 0x29, 0x0, @multicast1, @local, {[@timestamp={0x44, 0x1c, 0x4f, 0x0, 0x9, [0x8, 0x2, 0x10000, 0x400, 0xddc, 0x800]}, @end]}}}}}) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000500), 0x4442, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000009c0)={'erspan0\x00', r1, 0xc4961ed9b08f0e7f, 0x20, 0x9, 0x8, {{0x3c, 0x4, 0x1, 0xc, 0xf0, 0x67, 0x0, 0x7, 0x2, 0x0, @broadcast, @multicast2, {[@lsrr={0x83, 0x2b, 0xe5, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @loopback, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast]}, @cipso={0x86, 0x58, 0x3, [{0x0, 0xa, "3c060000009f3d9e"}, {0x0, 0xc, "1112a16bd1ed13a17f6c"}, {0x1, 0x6, "51b8a8e7"}, {0x1, 0x10, "c9cbe4c96926842605a248132269"}, {0x2, 0xb, "8ab49f17444e7384d2"}, {0x1, 0xe, "3129c2308e64fed7bf503c1b"}, {0x6, 0xd, "09bdc0f704e6494209f1e9"}]}, @rr={0x7, 0xb, 0x7c, [@private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xb, 0x1c, [@remote, @rand_addr=0x64010100]}, @timestamp={0x44, 0x10, 0xb6, 0x0, 0xb, [0xfffffffc, 0x800, 0x3]}, @end, @end, @lsrr={0x83, 0x7, 0xcc, [@private=0xa010101]}, @rr={0x7, 0xf, 0x95, [@multicast2, @empty, @remote]}, @lsrr={0x83, 0x1b, 0x75, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x33}, @rand_addr=0x64010102, @remote]}]}}}}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000001b80)=ANY=[@ANYRES32=r7, @ANYBLOB="0700000000000000080000000000000004000000000000005b0b000000000000feffffffffffffff4800000000000000030000003200000000000000d60000000600000000000000ffffffffffffffff01000000000000001fd62f82c255c09f2cf3e57be8b94228000000000000000800"/127]) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000600)="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", 0x149}, {&(0x7f0000000100)="e9439af0", 0x4}, {&(0x7f0000000140)='.', 0x1}, {&(0x7f0000000180)="c15aa8266f372ac6890a7801fe5e7dba654e6c95783283eb4703ffc8dcb50d9f1267ccbf639a5e9654bd0c793421fd5709e48f37b72cde519445733e06268ada5f811cc70df06c5e8a347678b9f65054b2c7bf147925e29662dc7de2d2f6f103770a2669477f6c26eb1915bcc0e032ce777cc750fbd897060826da8f2e7cf8dd5bae4f0808b38f3c91ab89c6ad3cf1e093c610cd4a1947d72ac16e16d1302f538c15b13308e582a9d0bbbe7eba17edae11ac75bb614749fc49c9af58ffeea44bf7548984f5cfe3b531b39e918fe4ac6b9a3b8d6ae1", 0xd5}, {&(0x7f0000000800)="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", 0xd5}], 0x5, &(0x7f0000000780)=[@ip_pktinfo={{0xef, 0x0, 0x8, {r1, @multicast1, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xca}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x0, 0x0, 0x8, {r3, @broadcast, @local}}}], 0x68}, 0x24064001) D0323 22:35:22.340570 921384 usertrap_amd64.go:212] [ 11199: 11199] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.340609 921384 usertrap_amd64.go:122] [ 11199: 11199] Allocate a new trap: 0xc008182ea0 39 D0323 22:35:22.340718 921384 usertrap_amd64.go:225] [ 11199: 11199] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.348993 921384 usertrap_amd64.go:212] [ 11199: 11199] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.349020 921384 usertrap_amd64.go:122] [ 11199: 11199] Allocate a new trap: 0xc008182ea0 40 D0323 22:35:22.349034 921384 usertrap_amd64.go:225] [ 11199: 11199] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.350145 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.350419 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.353304 921384 usertrap_amd64.go:212] [ 11199: 11199] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.353334 921384 usertrap_amd64.go:122] [ 11199: 11199] Allocate a new trap: 0xc008182ea0 41 D0323 22:35:22.353349 921384 usertrap_amd64.go:225] [ 11199: 11199] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.369023 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.369245 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.370686 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.370793 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.374626 921384 usertrap_amd64.go:212] [ 11199: 11199] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.374656 921384 usertrap_amd64.go:122] [ 11199: 11199] Allocate a new trap: 0xc008182ea0 42 D0323 22:35:22.374670 921384 usertrap_amd64.go:225] [ 11199: 11199] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.375226 921384 task_exit.go:204] [ 11199: 11199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.375271 921384 task_exit.go:204] [ 11199: 11199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.375273 921384 task_signals.go:204] [ 11199: 11200] Signal 11199, PID: 11200, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.375298 921384 task_exit.go:204] [ 11199: 11200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.377413 921384 task_exit.go:204] [ 11199: 11200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.377447 921384 task_exit.go:204] [ 11199: 11200] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.377468 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.378225 921384 task_exit.go:204] [ 11199: 11199] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r2, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r1}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r4, 0x400454cc, 0xffffffffffffffff) r5 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "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", "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"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x210100, 0x0) write$nbd(r6, &(0x7f0000002a00)={0x67446698, 0x0, 0x3, 0x2, 0x4, "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"}, 0x1010) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000400)={'tunl0\x00', r1, 0x8, 0x80, 0x9, 0x8001, {{0xd, 0x4, 0x1, 0x28, 0x34, 0x65, 0x0, 0x40, 0x29, 0x0, @multicast1, @local, {[@timestamp={0x44, 0x1c, 0x4f, 0x0, 0x9, [0x8, 0x2, 0x10000, 0x400, 0xddc, 0x800]}, @end]}}}}}) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000500), 0x4442, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000009c0)={'erspan0\x00', r1, 0xc4961ed9b08f0e7f, 0x20, 0x9, 0x8, {{0x3c, 0x4, 0x1, 0xc, 0xf0, 0x67, 0x0, 0x7, 0x2, 0x0, @broadcast, @multicast2, {[@lsrr={0x83, 0x2b, 0xe5, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @loopback, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast]}, @cipso={0x86, 0x58, 0x3, [{0x0, 0xa, "3c060000009f3d9e"}, {0x0, 0xc, "1112a16bd1ed13a17f6c"}, {0x1, 0x6, "51b8a8e7"}, {0x1, 0x10, "c9cbe4c96926842605a248132269"}, {0x2, 0xb, "8ab49f17444e7384d2"}, {0x1, 0xe, "3129c2308e64fed7bf503c1b"}, {0x6, 0xd, "09bdc0f704e6494209f1e9"}]}, @rr={0x7, 0xb, 0x7c, [@private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xb, 0x1c, [@remote, @rand_addr=0x64010100]}, @timestamp={0x44, 0x10, 0xb6, 0x0, 0xb, [0xfffffffc, 0x800, 0x3]}, @end, @end, @lsrr={0x83, 0x7, 0xcc, [@private=0xa010101]}, @rr={0x7, 0xf, 0x95, [@multicast2, @empty, @remote]}, @lsrr={0x83, 0x1b, 0x75, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x33}, @rand_addr=0x64010102, @remote]}]}}}}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000001b80)=ANY=[@ANYRES32=r7, @ANYBLOB="0700000000000000080000000000000004000000000000005b0b000000000000feffffffffffffff4800000000000000030000003200000000000000d60000000600000000000000ffffffffffffffff01000000000000001fd62f82c255c09f2cf3e57be8b94228000000000000000800"/127]) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000600)="3a2a8451dac2b7fea727ea413fac018d7e606c77e6bbda33b4abbc36be60b1a09d5e3888385c22935f1f06b65e74fff977868484a33c81f53a237edf0b0481f322a22662a29b21305834343d7fd09038a83d41c8bdd0022967d005f35e1d027a10ca28c1f3435870f5c2735c67232fce9a4ee8cb93b127c5ba57e71cfb703465858e643afa2feb869eaafe9bf0abb38e954aa179fadbf89b924826250cb9ed756206decff034b0496b930fd2bab09e05d86998c76a6f2d5d9c1db922a887f6f41d5a616961bfb2bae676b1942e631327d0bfc061ce736f2c5fe11f4176b1a3beb598996e5aacfaf715df162ef4de4d8121280248410f25702506669fa7e37bfda8cd2d595a01f62fe0c4e68f7c2ad75023f42c0a1366f26e53b01674d71eaec8e92459e8ac3c2a02f72173af2cc89dd2ff3e7d54509e74028b125d993cd811152fba3107cd566e7fc5", 0x149}, {&(0x7f0000000100)="e9439af0", 0x4}, {&(0x7f0000000140)='.', 0x1}, {&(0x7f0000000180)="c15aa8266f372ac6890a7801fe5e7dba654e6c95783283eb4703ffc8dcb50d9f1267ccbf639a5e9654bd0c793421fd5709e48f37b72cde519445733e06268ada5f811cc70df06c5e8a347678b9f65054b2c7bf147925e29662dc7de2d2f6f103770a2669477f6c26eb1915bcc0e032ce777cc750fbd897060826da8f2e7cf8dd5bae4f0808b38f3c91ab89c6ad3cf1e093c610cd4a1947d72ac16e16d1302f538c15b13308e582a9d0bbbe7eba17edae11ac75bb614749fc49c9af58ffeea44bf7548984f5cfe3b531b39e918fe4ac6b9a3b8d6ae1", 0xd5}, {&(0x7f0000000800)="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", 0xd5}], 0x5, &(0x7f0000000780)=[@ip_pktinfo={{0xef, 0x0, 0x8, {r1, @multicast1, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xca}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x0, 0x0, 0x8, {r3, @broadcast, @local}}}], 0x68}, 0x24064001) D0323 22:35:22.385231 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.385415 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.393533 921384 usertrap_amd64.go:212] [ 11201: 11201] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.393560 921384 usertrap_amd64.go:122] [ 11201: 11201] Allocate a new trap: 0xc000acfce0 39 D0323 22:35:22.393674 921384 usertrap_amd64.go:225] [ 11201: 11201] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.394190 921384 usertrap_amd64.go:212] [ 11201: 11201] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.394212 921384 usertrap_amd64.go:122] [ 11201: 11201] Allocate a new trap: 0xc000acfce0 40 D0323 22:35:22.394230 921384 usertrap_amd64.go:225] [ 11201: 11201] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.394820 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.395058 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.396748 921384 usertrap_amd64.go:212] [ 11201: 11201] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.396769 921384 usertrap_amd64.go:122] [ 11201: 11201] Allocate a new trap: 0xc000acfce0 41 D0323 22:35:22.396778 921384 usertrap_amd64.go:225] [ 11201: 11201] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.413402 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.413602 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.415263 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.415426 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.418168 921384 usertrap_amd64.go:212] [ 11201: 11201] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.418195 921384 usertrap_amd64.go:122] [ 11201: 11201] Allocate a new trap: 0xc000acfce0 42 D0323 22:35:22.418209 921384 usertrap_amd64.go:225] [ 11201: 11201] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.418691 921384 task_exit.go:204] [ 11201: 11201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.418722 921384 task_exit.go:204] [ 11201: 11201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.418723 921384 task_signals.go:204] [ 11201: 11202] Signal 11201, PID: 11202, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.418744 921384 task_exit.go:204] [ 11201: 11202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.422634 921384 task_exit.go:204] [ 11201: 11202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.422704 921384 task_exit.go:204] [ 11201: 11202] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.422730 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.423732 921384 task_exit.go:204] [ 11201: 11201] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r2, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r1}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r4, 0x400454cc, 0xffffffffffffffff) r5 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) D0323 22:35:22.424651 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "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", "b4458acdecf20fb05e2d13627bcf1a2ccc958d7b6d152ca5d839a7b9fae8edce6156c6020ae2d35a9faec2be5be3f69bedbed7960925ffae224083955fce4ade4d0c716f906c45bf86db4a032920568de213df41271189caee44eceec880e716a600bab6f24f53d9cf3b64f97cff5d1c27b875816c5283dfe5c890704e4aa9453c2f67e90e24be00e40b29d63698763ad5bf035a8558a1ef930c1b084e4a2ee489699ea5b663e10ea15560563dd6867660faafd73d0ecbdbd377d272a150c79aefd06636c99125d918b96f3cd14bb4a10566a86bab0a667e6ea661fc1964e7a371939c307ee06183890c7c2d6bc5b2e1d9abaf2bcf8520e4f4002871cdbdf5d0b9a0f1c055276a15603a3fa315cad4a4ceb574bee6388820001e4ab1ed271609287a28c2dc1f18fc47329675a908dc86784e6aaed6217797961c5055b8e4e719e2bc2f6051cba84edf6d59726315096c7afeb3ac5f4f4685f57b505fc1fb70c0575c726abd714de5087afc32de336a41c969f59d100f12490571d6785d37d126115d2348449064e671e809c2f97f690b3fb87acf02774b78af9aca147b47b0beb571425c0556dee00f4d9ca473d35f587e87b678109fe091193e4f4a1f414b13fe949458895c31d2a7f8b7a5cba2e04bd7cc3d97cf0817ef815cf192d7627204ec358744425ff6f3b905c04fa94c253982c48ba7ac4bafa1c2806c624d61955afa2033d4caeeb726cb5d2b9c554114a779dafef8ec995be7790b8d4801e2f7f9903bf257925b38d6c5dd68ec1f7295efb53a292507f8a3769c1269838458e5431af7e7368f4c46ef243385ab4d87a94d5368db6394aa0e65519f5355d6f6ccbeb204cb9f9e6fffa4b309ddcb2edc283c55e5d8e080e917251faf33f61acc02cb97906bff80e36ab2f7c82f315c54d2bfe5e9f42d6e443e8626f57d6991435db618b1270a3b4836d254fa9df435d2d592d194b3696e8f21cc24fb3b64255bea0659383ea9c86479afcc7e38cb4a7d5d72cb731500ab0c3c169b386905ef75e81d7b3fb64bbc8e08fcfbab33272b4e9d47c4f0900d9de34e8900d50e0e9ad831afa32069420b8d5950f723d6aa38d3d7f554a9f770e395ca8b9e9ecfcdec1cdb0477e010c789117373a1e9475f93b683fd6039a69e62f9d9a67c27da815107160683516ba706697c2c83183fd5483739bfefca22b6bbaf313aef4ca55269425863ee4429308afebf6e9f90436920aa9a9b7426c3b2d8278fffc3fdbbcbf344e550b77ea7b4ff98e65f58b625ddfff6527b1a013f4121f77a01ce481de816436db47b144945f917921ef48067e17e9ab0d8b4cb5d875981ce2c4da4595fefa5922def44ff71dbbc742946212e1a988f9cb36f4ed54eb8daad7f20a2f695021ca46ed0efbb5a910ff3adffa5fb6285588028d5f50eb8c20706b896c6c0ae6fdb0c52b9064d95647bc45dd69c7a82e2f931af3659997ae2eb1f728f466ef6eb83e6d68ae90281cd1468728355439a6fcd68b3d1b477e0d0a100f5d0927b1fc105ba7032e87de8fe58ed93ac3d7784cd774198ca0ff918f2b50a3fadf07a8c36dd9133e0229feda573d6fc981be9fa947ee9d23eec3d15cae5e639792dd8444b18a42ad6677e550d10fd54dd2beada3d88349a8ae0a3afada20f8272c239aa35e43a6d720138ce8e67e69e3454f46a6fc091c01d5677deef077ce3bd47d63ed84b5963dc806bfbf6582681352b70873b17e2e812c8247f5bf3e294d87a1849e69a5a3443db4e5631238ca5474fd452e9d5db8957c51d2a9ed0961aa27d0f8ca6e30e99d9fdff4a00f9da5bb234baf680456edee76c6fbc248548e85912009fddcc008ae8740261de5c9bebf0c712b97349f6b1499feaad8e092b04abed5a321058ebe3f28700336ed99dfca103baa76d5e4d7e61c2f51bcb4ce2ed68ba4c115cfe26e4b9345204a64b050162839ab3600ed3e6dcd793828270fe749b67e8d517708260b24fb4c7263e598822c18c6cfacf1504637c05e14fe6b6797cb8ad3be2548eb7ecf688aa1829cf929ab29782e16ea3293795b8f47dc0a2d6ebd9a75dadc7237f05478702dcaf751c7400b1f7e973e6cd8aa03243238558ea7ef0f663cc21679a67b97d241741533a4afe57173f39157536821d704dac245bed6537ea96578a569ea10b164131ee8b9b0a5f8e2757bbc365368458ccce2527ff0c93aa9c13725e23e6dd4b7899af8e0a882c982e798070d9bec2bb3c8cdbbb8de75d15d518b7c6a105f97bbd81b72ba9a650df8b9080c0d8013fc33b759234c262b22a827ab10685af575a968faab989e23c2e0b8eae5c3e52af34efc5be9448d079863646e45dcfdf596096ebe282c9de0258a37f245415292f85682734291b9ee04e72b54047ece164043a3c7962b6f33c7bb223ec59c7e50e7a5f23687c82153fce6073a2834cd6825d6753bd3af1d4d43cdb9699626c425c52e8c3e9ee494d45fc0f8d9dbc3409f6405421da361569cb34eb01bcf27b0b692ac626c3c5fc84a88dfc7aa688766e51acd7334a58b0e2d0a7aa2718a7ad167ffa1dbe14acd3714838d980bb9844d1327ab1f34f5b537094cfc27efc84264865383e5a2e870922d1133389adc34b2814f4dec931220b613947eab1a10f8cbe2f984b539c5aa9b933f6c29a2a59bdd84b40bc15d145687c58336ff1599972f46b7ce0df7804cb8a811afa0b1896d140b48e918ab0af5c5a89edd02df82efdba8ce76ac2ef8d70241112b08e6317db165d9e5f0624d62dd5454eacbf34a20ae2fd30501c29e21d0305997ad807a58e19e9b4c66525cb001dc89fdd34597f5bdf5805ce66c858a2daaaebac5ef74cb121098391414b0cafd6b93fcc249201383aea45260b9a57eec3a4ad887ab9a8e803b5815396b95e77940789fca0a3de1e2e62ce6c790a3632583f7d6fcea71dee35185caa92db89ac846832abbf4e4538771455000addce4c49d361f02919633ea36c7d7991957985613a114c49fee446699861a003251f87434cd09e740840b097d471c93adf376408475b4e7d5e8f904231170fe23dd152fc27f446e14f7d805040e4168f6e838df723b0947a7bf15494fcf01a6d463e97ba6f5f0687f39934f636496922ed9934c0039ca3304f3c181bd99914f13ae638dfffc8c95ec6b951613c93c0fbd5b2c45a311027283545f83d4ed97985fa6d9c79a4ffe6c292295eb540eff1b0e99136a5324e6bd0b20d76e1a672abc56b66aa90242bf40c6c7fe39d3e2481a06d514a2a3e57d074d3808df67d14a5bc123b73b66367fc9e24efb4a08cca2229b4fc0b06941a130930145f4b88001f938125d6f18078bf497b834e2eb76976da40f237177dbe62ac1c946ea7cd33a33d5791fd2eee368bf3d1755298156f95eb5cd50157eaf7f8b61cb6563092f230dee6b2a8ad4020dc0915a260c2bce30a5f3d9041e6cbe973436575c5e6887f3e441677a55e0b5639423ec71a6988dbb94c8f519fd0015a11a8978058648f819d057c965268b7c636ce8a0c14635c96aee537a36390126eba22f839aebdde1c733900a03d46742b1c40bf0686acccdf64293457c82667742cdff08fe4ea9cabb1e03e59b547b7e2dccee88d23d37f0578cf9b983cf0ded1eb29af7661e0cd8f40aa828b5450c4b92fd81a629977aa447aca8712583b56409b561d7fcf0da65a30ea8156d6b5f141790b55e23569cf19426b9f31fb8f314d9d524ab4bd3974de7411312fb6dcc506381b550597232921c95c9bcf2605b7ead72fd1efa3b46682e99f218e2d41d55ac5a0d40beb6f8c3c840c67933611dfece02a4e4e1a7518bcede72d8ada1447bc138ca6a41831630211d4bd9cd8e06f57a038268531b2ca28dede6c1795eca19fcf19e847172cd558bc7c3ce19f9ac30544945d1a4e467b6b78ecb689a08a855850099f7889eea1f4ace1bc8d9860f608a69731149a839de74caa67cb1138856efc207924861a3405cd9f7a731ab9e45b132b0b00a9fc6c94f7b3b6d4773cb9a72fb1e200d89e748e8b165d47e68660ebe1651e12a0e85123c97438238cfc3a3d022d807b340ffd970b1a7bb8fb08045c122b18cbc3dcdb7bdfaed24ac11fbb265a09d12e51fc5df57ee2637c5af533957a0c9ce3fb1538cedddc980e86896cb488fb1f8690307f89ab9e9c2d95c25ce863f6b433577470abd006313d84b78a9f355cad9d7dd1de8e972eda65a158d2aa682f21154be665073f6866bbcac717fb4a72ad781d47225f143ab46e6f80e39956ecd03f77a91e0636a22ee58ee0ba9f0e5a37bedd0b2985cab67df86f6c74f89cb67f655e126de038c25862eca4b7304ae55f4c7d235e5633dcfc079c1293971693a0d188159cd10b4936ccdcd17f1b299e38206405921b7a2f561a658aab73ca27eb90beb6bbe7c78cb79a8d5ab27c2ba16ca5bf6cc7b54dfecb014af471661cf3bd6465d1bbae784a743100b3ebe02bfab93b9f43e2544b7b470f3ba0f1a74f0980330f1f8c9ea0016db8cc1eae636e956e365aa659b39965eef14adcca080aa67bee93378bb0732cf472e28703d5f3b8d8ea9d278db21770372dcdb60427f180106bd6f1af53a0c95e9142665e0bc5be34b83975072e64db378cc082b1ee2a1c61512d84c90cff35c9e2b044daa93a2af8bcae03e6a3129e3565f66ecc9bca5da85134f5c8176df840580cb7288785425a9897c1147fb4f65f31425bfc5768706a90fe484b3c35a0f492f33db262b1ffdab7fe5e6d584e472ad566a0d6c4b087b88766df700b0731b8f7a5eae3fb7d69a0747f5fab67c9831950fb836358145db506285c531460b4c9dc39cf626d879518437e9ad7884ef2be8eeae40fff0c37fa62380bd7da07014fbe4bf5472059320a59d283ad18b5fe48533e2d098fc88ca80e1eabca2328d2897bee851acd368b21b0fe90cf97caefe5ef7be7e415000b849cc779a26d61e9baf94d88dd5f31c3ae616834e72e350446b88675fcd91762a130ce7244e50afceabe162d363ae94aa2f281ac0d74aa9c625ea40c2d3d9fef5e4f301eafb6aa44dbba1d810e01f778fb262313835f45485de2b0df6191b7a658a67efcc953e71ab12af8595747c915e988d721a86077e90f6412d7d7084f813e52601d65a4fa7d2db9b6213fe51ee746959390653bc18529286319e37fb2fccffe86ed40e42a21e506f4b2b3ae3e73a9322a86b387f05dbc66efcd6779002767a1581a6ce2d284bf9a606aff389e45575e68ca2751095e1bb448f768124844c2c8108e6b74a46c99d5aef1aa35303431677ae5611821f4d3d3705fec36c1f3ef8781b93f47e23f20e5a367c80f0fba4723dfa9cdede8a8f8f6993e302c68b1f7bd80f4d2872fa3bc12d634d96b6f8598fbd72825dd4bf9ee349be03641e0653935"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x210100, 0x0) write$nbd(r6, &(0x7f0000002a00)={0x67446698, 0x0, 0x3, 0x2, 0x4, "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"}, 0x1010) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r6, 0x89f8, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000400)={'tunl0\x00', r1, 0x8, 0x80, 0x9, 0x8001, {{0xd, 0x4, 0x1, 0x28, 0x34, 0x65, 0x0, 0x40, 0x29, 0x0, @multicast1, @local, {[@timestamp={0x44, 0x1c, 0x4f, 0x0, 0x9, [0x8, 0x2, 0x10000, 0x400, 0xddc, 0x800]}, @end]}}}}}) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000500), 0x4442, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000009c0)={'erspan0\x00', r1, 0xc4961ed9b08f0e7f, 0x20, 0x9, 0x8, {{0x3c, 0x4, 0x1, 0xc, 0xf0, 0x67, 0x0, 0x7, 0x2, 0x0, @broadcast, @multicast2, {[@lsrr={0x83, 0x2b, 0xe5, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @loopback, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast]}, @cipso={0x86, 0x58, 0x3, [{0x0, 0xa, "3c060000009f3d9e"}, {0x0, 0xc, "1112a16bd1ed13a17f6c"}, {0x1, 0x6, "51b8a8e7"}, {0x1, 0x10, "c9cbe4c96926842605a248132269"}, {0x2, 0xb, "8ab49f17444e7384d2"}, {0x1, 0xe, "3129c2308e64fed7bf503c1b"}, {0x6, 0xd, "09bdc0f704e6494209f1e9"}]}, @rr={0x7, 0xb, 0x7c, [@private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xb, 0x1c, [@remote, @rand_addr=0x64010100]}, @timestamp={0x44, 0x10, 0xb6, 0x0, 0xb, [0xfffffffc, 0x800, 0x3]}, @end, @end, @lsrr={0x83, 0x7, 0xcc, [@private=0xa010101]}, @rr={0x7, 0xf, 0x95, [@multicast2, @empty, @remote]}, @lsrr={0x83, 0x1b, 0x75, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x33}, @rand_addr=0x64010102, @remote]}]}}}}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000001b80)=ANY=[@ANYRES32=r7, @ANYBLOB="0700000000000000080000000000000004000000000000005b0b000000000000feffffffffffffff4800000000000000030000003200000000000000d60000000600000000000000ffffffffffffffff01000000000000001fd62f82c255c09f2cf3e57be8b94228000000000000000800"/127]) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000600)="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", 0x149}, {&(0x7f0000000100)="e9439af0", 0x4}, {&(0x7f0000000140)='.', 0x1}, {&(0x7f0000000180)="c15aa8266f372ac6890a7801fe5e7dba654e6c95783283eb4703ffc8dcb50d9f1267ccbf639a5e9654bd0c793421fd5709e48f37b72cde519445733e06268ada5f811cc70df06c5e8a347678b9f65054b2c7bf147925e29662dc7de2d2f6f103770a2669477f6c26eb1915bcc0e032ce777cc750fbd897060826da8f2e7cf8dd5bae4f0808b38f3c91ab89c6ad3cf1e093c610cd4a1947d72ac16e16d1302f538c15b13308e582a9d0bbbe7eba17edae11ac75bb614749fc49c9af58ffeea44bf7548984f5cfe3b531b39e918fe4ac6b9a3b8d6ae1", 0xd5}, {&(0x7f0000000800)="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", 0xd5}], 0x5, &(0x7f0000000780)=[@ip_pktinfo={{0xef, 0x0, 0x8, {r1, @multicast1, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xca}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x0, 0x0, 0x8, {r3, @broadcast, @local}}}], 0x68}, 0x24064001) D0323 22:35:22.424796 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.436166 921384 usertrap_amd64.go:212] [ 11203: 11203] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.436191 921384 usertrap_amd64.go:122] [ 11203: 11203] Allocate a new trap: 0xc008182f60 39 D0323 22:35:22.436291 921384 usertrap_amd64.go:225] [ 11203: 11203] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.436885 921384 usertrap_amd64.go:212] [ 11203: 11203] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.436903 921384 usertrap_amd64.go:122] [ 11203: 11203] Allocate a new trap: 0xc008182f60 40 D0323 22:35:22.436911 921384 usertrap_amd64.go:225] [ 11203: 11203] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.437466 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.437689 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.442307 921384 usertrap_amd64.go:212] [ 11203: 11203] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.442401 921384 usertrap_amd64.go:122] [ 11203: 11203] Allocate a new trap: 0xc008182f60 41 D0323 22:35:22.442428 921384 usertrap_amd64.go:225] [ 11203: 11203] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.456256 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.456576 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.459393 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.460184 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.462996 921384 usertrap_amd64.go:212] [ 11203: 11203] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.463023 921384 usertrap_amd64.go:122] [ 11203: 11203] Allocate a new trap: 0xc008182f60 42 D0323 22:35:22.463037 921384 usertrap_amd64.go:225] [ 11203: 11203] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.463479 921384 task_exit.go:204] [ 11203: 11203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.463521 921384 task_exit.go:204] [ 11203: 11203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.463551 921384 task_signals.go:204] [ 11203: 11204] Signal 11203, PID: 11204, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.463596 921384 task_exit.go:204] [ 11203: 11204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.465308 921384 task_exit.go:204] [ 11203: 11204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.465328 921384 task_exit.go:204] [ 11203: 11204] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.465342 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.465514 921384 task_exit.go:204] [ 11203: 11203] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r2, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r1}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r3, 0x400454cc, 0xffffffffffffffff) r4 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "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", "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"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x210100, 0x0) write$nbd(r5, &(0x7f0000002a00)={0x67446698, 0x0, 0x3, 0x2, 0x4, "ef386744ebe15f895e720bc9412e0c878678f7fb40e0c4a1f71793b6a7a14b4db0d574dcbab5ad6ccd021537c6f9a42770868e8a2cc9bde22d7a14a175192b32b0e1dbbe324d80d9c330694c06fe029b286f5c5f1546e90189f01c2e035f6c352a19debd9fe4e431cc051ee8c31a15d843f89f70cbd62a200092976d0b06fd6bbb1eeaffa53685b4823fed5d8d0ebbed1b90e48e15411c570f1ab212628aef540f8bb54b81b937d3310831dcc923d63ad2374902877baa7f99b62d3f83656b6d3757b610477a1c4d9706ed604ea31497b4acebb8da82aba5e14be7402f689f2056dec4b1460cc088323c1965e07755eb1e8951c0da0a4ccd9a347b90898d3b1411f93b2d75c9eb051a9e69854a56088d330bedb03b54f3a7cd213b1b57ada2b1f41f4da5edea16f5d6297f0e9c08b96c4184a9e43ca6eb6f60bc8997f106418666906b32f1f5d9cd9d749df44b430714dba8d875fd627ae98bbaeeea41d886323fe5823394eeb1588721ecf356293db82e184d799ed526c496053b48f61f9bb677523e8517adf72199da8e0e2bdccd244d2cc75b214d3607bc66110531f333e491f4302d9dff686c436fabce998db71e74b7fd62f4c93b9bfe981e3e7df7ca6b7b9ef6f2ef088dddc7d6a3848644dcad9d1a7bdf9305856015d18178bcf577479991e1ca447aea6db276b1a8db9c5d79aba90626a25028df3137e494dba4607dd00e39f5610b23c4a8799a7b56fc4866116b1f7664a479ab5ce75ca75e20858b5088cc8cdc2e396f90866463d64de29b6fb1b3a6b736a9a9db118343db96c9865712924cb7081ab848972babf034937b27349c35e459ca20d7b9f4ccabcf18f64c42ecc3565cebd95b968430184e600daa36e1c2135890a8701ad89395a176ed8da2f4082e4c42f3c6ac3d02429a470b3d05dd6b4fd590259bae7b0328560f7d0628ebf9a9a227fa3726b31704338f5b54ed5446738701f25d609daf2d05c2e13752749c47d9fb07a01c81e15892cf0e641b0ec2c919298e6f5f44ae8a84af98cc871a201518b9079f032f0e8678e292d87e1ff60c60d2fa8765891332caf06d0560f488dfda235ae76213aeb7b1df32b41a10c1710b8abc7bd6b91de1c1697fbdc87b67f181f211b24948aa4b72b839373b40a60e87d41bba77c693cb766d39793463f9b378bfdbe5f47764ba3182e810a8d26d5703d6b5ecc427b4382c48a575636211ffcf5ee4bf413f3e23b45d4b0239f228174903b8fb97b1dbddbbff552cf7dcceac2a4e66d2ef28749c4f0eb872368730ae19bba2b050432f088321ad9ca938cf6029a22d9938a2c646306aeb25de9de85c238bb2b42610f4f08b65ce41d621e83424df88144954f4d86bbdf0f985cb13726d9e920cdc657701f3494661a3a12570c13ac368fe6d6f8b57a9fcc593e23b6e4c1f766eb0086001ba5c748608abbdf675cd166a333322a0eae8642402c3e9511a7522f306a090a5821d5bd0aa0dffcafee951931e5a4061be6f069a39a70e6c76e108e333c1059fc2ba52cb19068420f9f486926b20a12f29f019e3805a054adb57f012ca8952081aae52f6499d34787ac87e2e86407eb081925a1094d9c6b6797bbacc1be99d5fa83fadd3cec5cf5651b9933f5ffa8828c0566f07df9e940555d32a775532040b65d665ca04833f39c8d1043adbfb34639bff49e238df1c282a4a7ae78d054d955f27b72d12a1f44447fde7493856284251980f0522983541c4cd50a3ecdcea964f584b93ee8df95fb460653e4adea71249ff874c3e0ff0fb00e6d671e40296c69bd4af25b08d8bde9546579c21c70d949116b162da4e1f44f7672a7608e2612862cb1fb6989f0ac34d22163e74e8f92374918276de6dd619f48c59b0d7cde4c510563b8db459bd27267e810b1342487d825592d0ea1012e5f3f37ceb1b7f526c2096f579d7083ae06d363e5226794004e74d636d060b0f3f02374355e8a32140190050228cfccb48a88b2e0315c5341018e277e91474d3562b6d730b06f3c6ff96f9d0a36ad9510cc431b81feebaed368d4ee60d9d71db43107dbec8628f3460ab4174ac444adeec860f09bb26cc2801f3aa29f0203ab93e4800f87efb1434e442a6c407e2f1455f8f2a9f3fcc617839a407ca821b1f3b121a5710b58179e72b34f79b30840d6f199d2e7f0f13aa49c63186fa8dc299eaaf6a48fb7dad15b798f960578783c2834424807b73cbfcbbcce653c5a481ac117761df2ff2a4ece9ed6dbbf2251704dd9754b7f5571e47583b6e0d1bcf70f0c709469dec3114734402d9f6db9b7ca80688b2095eaf1f3d203c5484baf73cc15a55558f2944f3b71ec221421e0d7a06d60d2954cb62af2804dfaf209b89ca9a684129b16e61c51a65f7cb6aad90ef9895cc4bb1ffdf2ca722efefafdc50fd70232d64b44483a841c208e4e04530abd1e9550b8fac4408e040b5f2055109860a00586741db24a4c42bd141a07df7b6f0910bf7dc3f5879843cf43ab1ada4a576f69a32b9a2f571d16dde100ad2ce055a5904e41f92ebb1b6dc832b7dd9d40fa1359a6317160d146140a8ede9b40d2fb7de31ad519134d3d658093009667a1fb804471174236850b5930a2431e6b3317a0bc6d7c61d79d14cff33ecf407313408ffde7d2a29d959b50ef4101d32cc5dfcce5d509e390df92107d5188b58b6ea9cecfeefdd80669180658308733b53964785a7776cce9e2cedda9353a3b9fc7b501fca9a8205a22f94ee1536ebae50e287c28fc0abbd82a30d97e74c5e3b98a0027e88c0c79d1a5e7f134286e428b45938509163a2076afce845aa55474e4b3cba11ec8d4ee495e729205ab64228dd055153a9e39645f1ead9d544b3b889916b8946bd796be8454b3f83d3ee0b55177df783bbccebd891af5f07fb2df6177040e09d6982a2e7f47be61688c4a0291d1eee8dbca96cd23dd93d62335217d9d548e9f52732a6d08c4807ba9aaff510486b64179372b0b4efcac9ef3712efb301d36d8d261ee87b9ff2b878332a87258b3ea4219d0cfd3a3c84a27c407a0aaaf56647ab38a54b1be722b1ba01357012db796de0117f6b514b634c4c4bd6ce18bcffa8bee687a65f738b16da484e46c9d10158e874828fda24ea88cf5c2252bb1e40aa90092cacdcd1f5e70f71de28f9b841a78a31911f76bc587ebc68c741dc6576b48da6218de7fa211bab66ed7455c85212c83a4158b193bdec09d07a52ccf2786e937d5a52f70a0b4fd1a0ae6148792a0056926e794a14ed6e2f7282ca5c5388a124e76f106e81d37167ebdb7226c3422936a8f82fe7efd4bc9c098e15a9b0281e47f5fd85917701050fa3d4cf0e8fc5daf4ed0371fe491085fcf54c5d99b6bf62ff4a4d15a625c037a8ff41e5beb95c2c727245b0d42d55ce3ba3b0035c342c743e85b4230b4f9dc44a6a292f17daac4579598a367fefbd7bbaea0a9cea32947db5f186a2d4a101f657717dbd824a370b6f96aca42030bf8a49c63c5677fdd90136669eab6934daf97ce079551f181a0f08e0a766b9d6f3fdbd28fc36dfe4542ea6790e1285083cbd01c4dc029573adfb5c0412f02b14e7fcafff0aa670d01972dc63bd46fbe027ab023fbc29a2af793bfd532817d49b17a2371efeeafae97ba88817590c94a99301b1b657ab7fb68bd833888a767a6b6a181cbd3329be637e5316c3f7dcc4cf19f516524cb6f3af027bc82a8b42777b50d749c25b5e617a190c976e58ebb749899458ea00a17517ad431dcb3526a65585c832d5f55955fe99f995f4142ca450136c570044da217a23ba31e8f28760e48c00f89d8103045fc3a26cabff5bc3c8f7771569df1be45596ab1028a23a929e6bf12d696130be55b7c5318d7f284412e938bd744e61e2b6a1fa9e4364d8e7edd6563af7ea244a8660c648ad2cc24ddc87adfef3980e125852343f25e55f5ee8558909d892f4bf951b6be1e3ab7163b72bc245fe46d377722902e65ef3986be668f70825927847e2590a442a0005e9ca8327141546f8a23b9105d91a36d0c8ec274f6a78f73311f56a187f541571719c87157f093189f21075478e571ca87082bb23c691a518a86c1d95f8227d834c82cb2178f824a4d78b7a6f9e05e7a300a5b8b907dab55cf4fdb9d12a8cdba4a779c7edb30e471c1d9728d0a28d23fc1c780caf75e516ed8a49996aaf2e6e83ff62ea9ba4cc6c9092ca3ab88f701dfda4d44df36c62c779d1a3b896f65e3e486053d513f06f4f20ea1a812937773d53559ae125db6e77aa960e2be08053666f2785b121c1632602fef7cbd91fd2e3acb10a574298098f8240a6d50726c6c8b90160deacfb8795143ef7a08a028d88cba2224174888254bed150745f68850a5ccc45dfe5d7817ab19062f262ebeb90b9dbdcc7404f104c25dcf769387fe82dbbd805aa2914467b8da6bef0c61c91444186599936158ab0a25a0b8251ab4c9e1789982ebe6382ba47c722a71be9203a521f6425023f76e31f8e53340387f8117b4c94a7696f5e8634127fd6ec5ab40356101192e3aae738057f9ceb3e93996ae8cb366e2202c19b099d8cc461953b71e5ff4f39345e002ace0aacd6d126e75cd4472e68a5de6d043c907fe6d5622b84e59ee51b07e9e6c8a41e8314171e4ca4e1a36806382520499824bac95cc972dbc654b486aabe42662b62c19938841f2ea774a9826dab782473d8d752e630c8005b576c510c165cb8546af6bdd21781b5cdde8b5bffe8d6e33674734b12a2cd5df249a39c19ddc2a6c537f1293a0f17adde96638ac633e71f5e7e2e2ba95d65488ba42e8eb401a73b3a22c229d2aac803a8f8b11bdf345b5d2715830d68b09ee409fdf28f36e3f5fb022a212ceb45ea25231ca28b3918866f855a1f580e1ebdc8da6874e411e1679297297d9855416f2675f3972712eddc712a16f5e37995b042da6a865a34b4a7d94376ba22bd8413bebe68ca71b12d83a4025a851c75d70e8a5c7affe7708093caf9394a5111613ed02b5e66d2cf163103e63c4753b6a54248c05ab0177b1d3b0ed4e2be25798b37f5da283f502b762bd2f9f59c7929a8a11dd27bc19cefcf73f1f617906e48456e1160af2c80417b657ca26feb1ff54955d50b67c0b1376e60817a45a053cc66093c8578fbc45d7d03c4a4bd02ca490df3c35fe8eda522cfc36a60055336516f261e49eb82db893b97bc7932c34d2c603293a5cb3926a461891a2e7889e276edbafbb04fddd767b75ea68b641c8318d6d6a30100e4e3da4a64ac4c7cc457d8f64c79a1df129ef8575cf439551a44b4e786b0accf8dce3d9c9d7fcb3698478fc533c7cb729845bdb76eeea1661dd60cdebf65dd228dcdb12810a233558e88a36de98ad7f1226957cf06c7dd790f37abc66595e03df1497db74e3683822785e7500f2a13f7c9d2193db945ab60a720bbb4fc1df52a6173ae2ba1fadda6cc6da01004766501e4667a5cd4af8276fe65d074c953b046cb346a28440a9b2683033d41ed3678736ef8d657b7f9a6340efc1c3e41cf913afea583a0e42f2766563a4e683b9a37086b5a519af3374238583a671a6f8275b63d8ef2e6f3eb266fef9565ad16ff723126390f7b44c08fa2c49c85434bac4553ebf7b4295e24de7d8e57923084b43a648aaa17c269c32a7ba86db53d3ed71dcf6ec79f9f929717fb7fedee7dea2ea95deb6c0398f9c5944e4401f82daa3dc5bd02ce29b3b27019c292091bf604e38280adc7e5379796fd53ad9ca76136c3f24bd5334abe619df15a1164781aeddb88786403375928794d78"}, 0x1010) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000400)={'tunl0\x00', r1, 0x8, 0x80, 0x9, 0x8001, {{0xd, 0x4, 0x1, 0x28, 0x34, 0x65, 0x0, 0x40, 0x29, 0x0, @multicast1, @local, {[@timestamp={0x44, 0x1c, 0x4f, 0x0, 0x9, [0x8, 0x2, 0x10000, 0x400, 0xddc, 0x800]}, @end]}}}}}) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000500), 0x4442, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000009c0)={'erspan0\x00', r1, 0xc4961ed9b08f0e7f, 0x20, 0x9, 0x8, {{0x3c, 0x4, 0x1, 0xc, 0xf0, 0x67, 0x0, 0x7, 0x2, 0x0, @broadcast, @multicast2, {[@lsrr={0x83, 0x2b, 0xe5, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @loopback, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast]}, @cipso={0x86, 0x58, 0x3, [{0x0, 0xa, "3c060000009f3d9e"}, {0x0, 0xc, "1112a16bd1ed13a17f6c"}, {0x1, 0x6, "51b8a8e7"}, {0x1, 0x10, "c9cbe4c96926842605a248132269"}, {0x2, 0xb, "8ab49f17444e7384d2"}, {0x1, 0xe, "3129c2308e64fed7bf503c1b"}, {0x6, 0xd, "09bdc0f704e6494209f1e9"}]}, @rr={0x7, 0xb, 0x7c, [@private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xb, 0x1c, [@remote, @rand_addr=0x64010100]}, @timestamp={0x44, 0x10, 0xb6, 0x0, 0xb, [0xfffffffc, 0x800, 0x3]}, @end, @end, @lsrr={0x83, 0x7, 0xcc, [@private=0xa010101]}, @rr={0x7, 0xf, 0x95, [@multicast2, @empty, @remote]}, @lsrr={0x83, 0x1b, 0x75, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x33}, @rand_addr=0x64010102, @remote]}]}}}}}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000001b80)=ANY=[@ANYRES32=r6, @ANYBLOB="0700000000000000080000000000000004000000000000005b0b000000000000feffffffffffffff4800000000000000030000003200000000000000d60000000600000000000000ffffffffffffffff01000000000000001fd62f82c255c09f2cf3e57be8b94228000000000000000800"/127]) D0323 22:35:22.468671 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.468986 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.477507 921384 usertrap_amd64.go:212] [ 11205: 11205] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.477546 921384 usertrap_amd64.go:122] [ 11205: 11205] Allocate a new trap: 0xc003300510 39 D0323 22:35:22.477649 921384 usertrap_amd64.go:225] [ 11205: 11205] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.478197 921384 usertrap_amd64.go:212] [ 11205: 11205] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.478223 921384 usertrap_amd64.go:122] [ 11205: 11205] Allocate a new trap: 0xc003300510 40 D0323 22:35:22.478232 921384 usertrap_amd64.go:225] [ 11205: 11205] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.478767 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.479020 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.481755 921384 usertrap_amd64.go:212] [ 11205: 11205] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.481784 921384 usertrap_amd64.go:122] [ 11205: 11205] Allocate a new trap: 0xc003300510 41 D0323 22:35:22.481796 921384 usertrap_amd64.go:225] [ 11205: 11205] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.496853 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.497165 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.502510 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.502725 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.504825 921384 usertrap_amd64.go:212] [ 11205: 11205] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.504854 921384 usertrap_amd64.go:122] [ 11205: 11205] Allocate a new trap: 0xc003300510 42 D0323 22:35:22.504872 921384 usertrap_amd64.go:225] [ 11205: 11205] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.505489 921384 task_exit.go:204] [ 11205: 11205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.505532 921384 task_exit.go:204] [ 11205: 11205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.505539 921384 task_signals.go:204] [ 11205: 11206] Signal 11205, PID: 11206, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.505585 921384 task_exit.go:204] [ 11205: 11206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.506979 921384 task_exit.go:204] [ 11205: 11206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.506995 921384 task_exit.go:204] [ 11205: 11206] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.507014 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.508276 921384 task_exit.go:204] [ 11205: 11205] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.509885 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.510077 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xffffffffffffffff) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "bed14f6ac97a5f8b7c4a3b5b3d8cb845ef6be959b2c2f5e3591cc2f52ba19b1363bbd2c9f5366bd3c32411639103403288301e61f97b4a67196827b9afb5bfeba41117477b9c8259aad0863f1fb990896a85152a99fe4cd96be97daf0b9dfaeac903748c87339aa9b21f2207cc253fd2580090843ddd6c30993f86caa74337229a9026504b2f219cd7b3eb8d3b971aedad33c151de53f70b7bccce403ff660e620f5d0a8194687249e1f3206e6682b73e37457b1a8205d072b44337d64aa53095dcc2c25ec6c3ce3d374004da5dd4aa16d856dd8ab12aefd451c845e9fca37ec0eaedc67947e99cce07624788c9c695bf7cec56539861f33335943bc03bfe5fc", "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"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x210100, 0x0) write$nbd(r4, &(0x7f0000002a00)={0x67446698, 0x0, 0x3, 0x2, 0x4, "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"}, 0x1010) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000400)={'tunl0\x00', r0, 0x8, 0x80, 0x9, 0x8001, {{0xd, 0x4, 0x1, 0x28, 0x34, 0x65, 0x0, 0x40, 0x29, 0x0, @multicast1, @local, {[@timestamp={0x44, 0x1c, 0x4f, 0x0, 0x9, [0x8, 0x2, 0x10000, 0x400, 0xddc, 0x800]}, @end]}}}}}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000500), 0x4442, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000009c0)={'erspan0\x00', r0, 0xc4961ed9b08f0e7f, 0x20, 0x9, 0x8, {{0x3c, 0x4, 0x1, 0xc, 0xf0, 0x67, 0x0, 0x7, 0x2, 0x0, @broadcast, @multicast2, {[@lsrr={0x83, 0x2b, 0xe5, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @loopback, @private=0xa010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @broadcast]}, @cipso={0x86, 0x58, 0x3, [{0x0, 0xa, "3c060000009f3d9e"}, {0x0, 0xc, "1112a16bd1ed13a17f6c"}, {0x1, 0x6, "51b8a8e7"}, {0x1, 0x10, "c9cbe4c96926842605a248132269"}, {0x2, 0xb, "8ab49f17444e7384d2"}, {0x1, 0xe, "3129c2308e64fed7bf503c1b"}, {0x6, 0xd, "09bdc0f704e6494209f1e9"}]}, @rr={0x7, 0xb, 0x7c, [@private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xb, 0x1c, [@remote, @rand_addr=0x64010100]}, @timestamp={0x44, 0x10, 0xb6, 0x0, 0xb, [0xfffffffc, 0x800, 0x3]}, @end, @end, @lsrr={0x83, 0x7, 0xcc, [@private=0xa010101]}, @rr={0x7, 0xf, 0x95, [@multicast2, @empty, @remote]}, @lsrr={0x83, 0x1b, 0x75, [@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @dev={0xac, 0x14, 0x14, 0x33}, @rand_addr=0x64010102, @remote]}]}}}}}) D0323 22:35:22.525662 921384 usertrap_amd64.go:212] [ 11207: 11207] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.525769 921384 usertrap_amd64.go:122] [ 11207: 11207] Allocate a new trap: 0xc008043e90 39 D0323 22:35:22.525908 921384 usertrap_amd64.go:225] [ 11207: 11207] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.527957 921384 usertrap_amd64.go:212] [ 11207: 11207] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.527993 921384 usertrap_amd64.go:122] [ 11207: 11207] Allocate a new trap: 0xc008043e90 40 D0323 22:35:22.528013 921384 usertrap_amd64.go:225] [ 11207: 11207] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.528635 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.529256 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.535236 921384 usertrap_amd64.go:212] [ 11207: 11207] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.535258 921384 usertrap_amd64.go:122] [ 11207: 11207] Allocate a new trap: 0xc008043e90 41 D0323 22:35:22.535273 921384 usertrap_amd64.go:225] [ 11207: 11207] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.549224 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.549469 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.551110 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.551335 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.553102 921384 usertrap_amd64.go:212] [ 11207: 11207] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.553130 921384 usertrap_amd64.go:122] [ 11207: 11207] Allocate a new trap: 0xc008043e90 42 D0323 22:35:22.553145 921384 usertrap_amd64.go:225] [ 11207: 11207] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.553778 921384 task_exit.go:204] [ 11207: 11207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.553853 921384 task_exit.go:204] [ 11207: 11207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.553935 921384 task_signals.go:204] [ 11207: 11208] Signal 11207, PID: 11208, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.553965 921384 task_exit.go:204] [ 11207: 11208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.555651 921384 task_exit.go:204] [ 11207: 11208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.555697 921384 task_exit.go:204] [ 11207: 11208] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.555718 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.556167 921384 task_exit.go:204] [ 11207: 11207] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xffffffffffffffff) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "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", "b4458acdecf20fb05e2d13627bcf1a2ccc958d7b6d152ca5d839a7b9fae8edce6156c6020ae2d35a9faec2be5be3f69bedbed7960925ffae224083955fce4ade4d0c716f906c45bf86db4a032920568de213df41271189caee44eceec880e716a600bab6f24f53d9cf3b64f97cff5d1c27b875816c5283dfe5c890704e4aa9453c2f67e90e24be00e40b29d63698763ad5bf035a8558a1ef930c1b084e4a2ee489699ea5b663e10ea15560563dd6867660faafd73d0ecbdbd377d272a150c79aefd06636c99125d918b96f3cd14bb4a10566a86bab0a667e6ea661fc1964e7a371939c307ee06183890c7c2d6bc5b2e1d9abaf2bcf8520e4f4002871cdbdf5d0b9a0f1c055276a15603a3fa315cad4a4ceb574bee6388820001e4ab1ed271609287a28c2dc1f18fc47329675a908dc86784e6aaed6217797961c5055b8e4e719e2bc2f6051cba84edf6d59726315096c7afeb3ac5f4f4685f57b505fc1fb70c0575c726abd714de5087afc32de336a41c969f59d100f12490571d6785d37d126115d2348449064e671e809c2f97f690b3fb87acf02774b78af9aca147b47b0beb571425c0556dee00f4d9ca473d35f587e87b678109fe091193e4f4a1f414b13fe949458895c31d2a7f8b7a5cba2e04bd7cc3d97cf0817ef815cf192d7627204ec358744425ff6f3b905c04fa94c253982c48ba7ac4bafa1c2806c624d61955afa2033d4caeeb726cb5d2b9c554114a779dafef8ec995be7790b8d4801e2f7f9903bf257925b38d6c5dd68ec1f7295efb53a292507f8a3769c1269838458e5431af7e7368f4c46ef243385ab4d87a94d5368db6394aa0e65519f5355d6f6ccbeb204cb9f9e6fffa4b309ddcb2edc283c55e5d8e080e917251faf33f61acc02cb97906bff80e36ab2f7c82f315c54d2bfe5e9f42d6e443e8626f57d6991435db618b1270a3b4836d254fa9df435d2d592d194b3696e8f21cc24fb3b64255bea0659383ea9c86479afcc7e38cb4a7d5d72cb731500ab0c3c169b386905ef75e81d7b3fb64bbc8e08fcfbab33272b4e9d47c4f0900d9de34e8900d50e0e9ad831afa32069420b8d5950f723d6aa38d3d7f554a9f770e395ca8b9e9ecfcdec1cdb0477e010c789117373a1e9475f93b683fd6039a69e62f9d9a67c27da815107160683516ba706697c2c83183fd5483739bfefca22b6bbaf313aef4ca55269425863ee4429308afebf6e9f90436920aa9a9b7426c3b2d8278fffc3fdbbcbf344e550b77ea7b4ff98e65f58b625ddfff6527b1a013f4121f77a01ce481de816436db47b144945f917921ef48067e17e9ab0d8b4cb5d875981ce2c4da4595fefa5922def44ff71dbbc742946212e1a988f9cb36f4ed54eb8daad7f20a2f695021ca46ed0efbb5a910ff3adffa5fb6285588028d5f50eb8c20706b896c6c0ae6fdb0c52b9064d95647bc45dd69c7a82e2f931af3659997ae2eb1f728f466ef6eb83e6d68ae90281cd1468728355439a6fcd68b3d1b477e0d0a100f5d0927b1fc105ba7032e87de8fe58ed93ac3d7784cd774198ca0ff918f2b50a3fadf07a8c36dd9133e0229feda573d6fc981be9fa947ee9d23eec3d15cae5e639792dd8444b18a42ad6677e550d10fd54dd2beada3d88349a8ae0a3afada20f8272c239aa35e43a6d720138ce8e67e69e3454f46a6fc091c01d5677deef077ce3bd47d63ed84b5963dc806bfbf6582681352b70873b17e2e812c8247f5bf3e294d87a1849e69a5a3443db4e5631238ca5474fd452e9d5db8957c51d2a9ed0961aa27d0f8ca6e30e99d9fdff4a00f9da5bb234baf680456edee76c6fbc248548e85912009fddcc008ae8740261de5c9bebf0c712b97349f6b1499feaad8e092b04abed5a321058ebe3f28700336ed99dfca103baa76d5e4d7e61c2f51bcb4ce2ed68ba4c115cfe26e4b9345204a64b050162839ab3600ed3e6dcd793828270fe749b67e8d517708260b24fb4c7263e598822c18c6cfacf1504637c05e14fe6b6797cb8ad3be2548eb7ecf688aa1829cf929ab29782e16ea3293795b8f47dc0a2d6ebd9a75dadc7237f05478702dcaf751c7400b1f7e973e6cd8aa03243238558ea7ef0f663cc21679a67b97d241741533a4afe57173f39157536821d704dac245bed6537ea96578a569ea10b164131ee8b9b0a5f8e2757bbc365368458ccce2527ff0c93aa9c13725e23e6dd4b7899af8e0a882c982e798070d9bec2bb3c8cdbbb8de75d15d518b7c6a105f97bbd81b72ba9a650df8b9080c0d8013fc33b759234c262b22a827ab10685af575a968faab989e23c2e0b8eae5c3e52af34efc5be9448d079863646e45dcfdf596096ebe282c9de0258a37f245415292f85682734291b9ee04e72b54047ece164043a3c7962b6f33c7bb223ec59c7e50e7a5f23687c82153fce6073a2834cd6825d6753bd3af1d4d43cdb9699626c425c52e8c3e9ee494d45fc0f8d9dbc3409f6405421da361569cb34eb01bcf27b0b692ac626c3c5fc84a88dfc7aa688766e51acd7334a58b0e2d0a7aa2718a7ad167ffa1dbe14acd3714838d980bb9844d1327ab1f34f5b537094cfc27efc84264865383e5a2e870922d1133389adc34b2814f4dec931220b613947eab1a10f8cbe2f984b539c5aa9b933f6c29a2a59bdd84b40bc15d145687c58336ff1599972f46b7ce0df7804cb8a811afa0b1896d140b48e918ab0af5c5a89edd02df82efdba8ce76ac2ef8d70241112b08e6317db165d9e5f0624d62dd5454eacbf34a20ae2fd30501c29e21d0305997ad807a58e19e9b4c66525cb001dc89fdd34597f5bdf5805ce66c858a2daaaebac5ef74cb121098391414b0cafd6b93fcc249201383aea45260b9a57eec3a4ad887ab9a8e803b5815396b95e77940789fca0a3de1e2e62ce6c790a3632583f7d6fcea71dee35185caa92db89ac846832abbf4e4538771455000addce4c49d361f02919633ea36c7d7991957985613a114c49fee446699861a003251f87434cd09e740840b097d471c93adf376408475b4e7d5e8f904231170fe23dd152fc27f446e14f7d805040e4168f6e838df723b0947a7bf15494fcf01a6d463e97ba6f5f0687f39934f636496922ed9934c0039ca3304f3c181bd99914f13ae638dfffc8c95ec6b951613c93c0fbd5b2c45a311027283545f83d4ed97985fa6d9c79a4ffe6c292295eb540eff1b0e99136a5324e6bd0b20d76e1a672abc56b66aa90242bf40c6c7fe39d3e2481a06d514a2a3e57d074d3808df67d14a5bc123b73b66367fc9e24efb4a08cca2229b4fc0b06941a130930145f4b88001f938125d6f18078bf497b834e2eb76976da40f237177dbe62ac1c946ea7cd33a33d5791fd2eee368bf3d1755298156f95eb5cd50157eaf7f8b61cb6563092f230dee6b2a8ad4020dc0915a260c2bce30a5f3d9041e6cbe973436575c5e6887f3e441677a55e0b5639423ec71a6988dbb94c8f519fd0015a11a8978058648f819d057c965268b7c636ce8a0c14635c96aee537a36390126eba22f839aebdde1c733900a03d46742b1c40bf0686acccdf64293457c82667742cdff08fe4ea9cabb1e03e59b547b7e2dccee88d23d37f0578cf9b983cf0ded1eb29af7661e0cd8f40aa828b5450c4b92fd81a629977aa447aca8712583b56409b561d7fcf0da65a30ea8156d6b5f141790b55e23569cf19426b9f31fb8f314d9d524ab4bd3974de7411312fb6dcc506381b550597232921c95c9bcf2605b7ead72fd1efa3b46682e99f218e2d41d55ac5a0d40beb6f8c3c840c67933611dfece02a4e4e1a7518bcede72d8ada1447bc138ca6a41831630211d4bd9cd8e06f57a038268531b2ca28dede6c1795eca19fcf19e847172cd558bc7c3ce19f9ac30544945d1a4e467b6b78ecb689a08a855850099f7889eea1f4ace1bc8d9860f608a69731149a839de74caa67cb1138856efc207924861a3405cd9f7a731ab9e45b132b0b00a9fc6c94f7b3b6d4773cb9a72fb1e200d89e748e8b165d47e68660ebe1651e12a0e85123c97438238cfc3a3d022d807b340ffd970b1a7bb8fb08045c122b18cbc3dcdb7bdfaed24ac11fbb265a09d12e51fc5df57ee2637c5af533957a0c9ce3fb1538cedddc980e86896cb488fb1f8690307f89ab9e9c2d95c25ce863f6b433577470abd006313d84b78a9f355cad9d7dd1de8e972eda65a158d2aa682f21154be665073f6866bbcac717fb4a72ad781d47225f143ab46e6f80e39956ecd03f77a91e0636a22ee58ee0ba9f0e5a37bedd0b2985cab67df86f6c74f89cb67f655e126de038c25862eca4b7304ae55f4c7d235e5633dcfc079c1293971693a0d188159cd10b4936ccdcd17f1b299e38206405921b7a2f561a658aab73ca27eb90beb6bbe7c78cb79a8d5ab27c2ba16ca5bf6cc7b54dfecb014af471661cf3bd6465d1bbae784a743100b3ebe02bfab93b9f43e2544b7b470f3ba0f1a74f0980330f1f8c9ea0016db8cc1eae636e956e365aa659b39965eef14adcca080aa67bee93378bb0732cf472e28703d5f3b8d8ea9d278db21770372dcdb60427f180106bd6f1af53a0c95e9142665e0bc5be34b83975072e64db378cc082b1ee2a1c61512d84c90cff35c9e2b044daa93a2af8bcae03e6a3129e3565f66ecc9bca5da85134f5c8176df840580cb7288785425a9897c1147fb4f65f31425bfc5768706a90fe484b3c35a0f492f33db262b1ffdab7fe5e6d584e472ad566a0d6c4b087b88766df700b0731b8f7a5eae3fb7d69a0747f5fab67c9831950fb836358145db506285c531460b4c9dc39cf626d879518437e9ad7884ef2be8eeae40fff0c37fa62380bd7da07014fbe4bf5472059320a59d283ad18b5fe48533e2d098fc88ca80e1eabca2328d2897bee851acd368b21b0fe90cf97caefe5ef7be7e415000b849cc779a26d61e9baf94d88dd5f31c3ae616834e72e350446b88675fcd91762a130ce7244e50afceabe162d363ae94aa2f281ac0d74aa9c625ea40c2d3d9fef5e4f301eafb6aa44dbba1d810e01f778fb262313835f45485de2b0df6191b7a658a67efcc953e71ab12af8595747c915e988d721a86077e90f6412d7d7084f813e52601d65a4fa7d2db9b6213fe51ee746959390653bc18529286319e37fb2fccffe86ed40e42a21e506f4b2b3ae3e73a9322a86b387f05dbc66efcd6779002767a1581a6ce2d284bf9a606aff389e45575e68ca2751095e1bb448f768124844c2c8108e6b74a46c99d5aef1aa35303431677ae5611821f4d3d3705fec36c1f3ef8781b93f47e23f20e5a367c80f0fba4723dfa9cdede8a8f8f6993e302c68b1f7bd80f4d2872fa3bc12d634d96b6f8598fbd72825dd4bf9ee349be03641e0653935"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x210100, 0x0) write$nbd(r4, &(0x7f0000002a00)={0x67446698, 0x0, 0x3, 0x2, 0x4, "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"}, 0x1010) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000400)={'tunl0\x00', r0, 0x8, 0x80, 0x9, 0x8001, {{0xd, 0x4, 0x1, 0x28, 0x34, 0x65, 0x0, 0x40, 0x29, 0x0, @multicast1, @local, {[@timestamp={0x44, 0x1c, 0x4f, 0x0, 0x9, [0x8, 0x2, 0x10000, 0x400, 0xddc, 0x800]}, @end]}}}}}) openat$null(0xffffffffffffff9c, &(0x7f0000000500), 0x4442, 0x0) D0323 22:35:22.557538 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.557679 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.570939 921384 usertrap_amd64.go:212] [ 11209: 11209] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.570970 921384 usertrap_amd64.go:122] [ 11209: 11209] Allocate a new trap: 0xc000bcad80 39 D0323 22:35:22.571096 921384 usertrap_amd64.go:225] [ 11209: 11209] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.572181 921384 usertrap_amd64.go:212] [ 11209: 11209] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.572211 921384 usertrap_amd64.go:122] [ 11209: 11209] Allocate a new trap: 0xc000bcad80 40 D0323 22:35:22.572222 921384 usertrap_amd64.go:225] [ 11209: 11209] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.572805 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.573046 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.575771 921384 usertrap_amd64.go:212] [ 11209: 11209] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.575799 921384 usertrap_amd64.go:122] [ 11209: 11209] Allocate a new trap: 0xc000bcad80 41 D0323 22:35:22.575811 921384 usertrap_amd64.go:225] [ 11209: 11209] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.594177 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.594397 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.596309 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.596435 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.597031 921384 usertrap_amd64.go:212] [ 11209: 11209] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.597064 921384 usertrap_amd64.go:122] [ 11209: 11209] Allocate a new trap: 0xc000bcad80 42 D0323 22:35:22.597079 921384 usertrap_amd64.go:225] [ 11209: 11209] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.597582 921384 task_exit.go:204] [ 11209: 11209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.597620 921384 task_exit.go:204] [ 11209: 11209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.597680 921384 task_signals.go:204] [ 11209: 11210] Signal 11209, PID: 11210, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.597705 921384 task_exit.go:204] [ 11209: 11210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.599383 921384 task_exit.go:204] [ 11209: 11210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.599477 921384 task_exit.go:204] [ 11209: 11210] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.599519 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.601858 921384 task_exit.go:204] [ 11209: 11209] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.603059 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xffffffffffffffff) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "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", "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"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x210100, 0x0) write$nbd(r4, &(0x7f0000002a00)={0x67446698, 0x0, 0x3, 0x2, 0x4, "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"}, 0x1010) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r4, 0x89f8, &(0x7f00000004c0)={'syztnl1\x00', &(0x7f0000000400)={'tunl0\x00', r0, 0x8, 0x80, 0x9, 0x8001, {{0xd, 0x4, 0x1, 0x28, 0x34, 0x65, 0x0, 0x40, 0x29, 0x0, @multicast1, @local, {[@timestamp={0x44, 0x1c, 0x4f, 0x0, 0x9, [0x8, 0x2, 0x10000, 0x400, 0xddc, 0x800]}, @end]}}}}}) D0323 22:35:22.603178 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.616072 921384 usertrap_amd64.go:212] [ 11211: 11211] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.616105 921384 usertrap_amd64.go:122] [ 11211: 11211] Allocate a new trap: 0xc000bcaff0 39 D0323 22:35:22.616214 921384 usertrap_amd64.go:225] [ 11211: 11211] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.616992 921384 usertrap_amd64.go:212] [ 11211: 11211] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.617025 921384 usertrap_amd64.go:122] [ 11211: 11211] Allocate a new trap: 0xc000bcaff0 40 D0323 22:35:22.617038 921384 usertrap_amd64.go:225] [ 11211: 11211] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.617666 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.617843 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.620802 921384 usertrap_amd64.go:212] [ 11211: 11211] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.620861 921384 usertrap_amd64.go:122] [ 11211: 11211] Allocate a new trap: 0xc000bcaff0 41 D0323 22:35:22.620922 921384 usertrap_amd64.go:225] [ 11211: 11211] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.633459 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.633673 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.635534 921384 usertrap_amd64.go:212] [ 11211: 11211] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.635556 921384 usertrap_amd64.go:122] [ 11211: 11211] Allocate a new trap: 0xc000bcaff0 42 D0323 22:35:22.635566 921384 usertrap_amd64.go:225] [ 11211: 11211] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.636092 921384 task_exit.go:204] [ 11211: 11211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.636136 921384 task_exit.go:204] [ 11211: 11211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.636208 921384 task_signals.go:204] [ 11211: 11212] Signal 11211, PID: 11212, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.636242 921384 task_exit.go:204] [ 11211: 11212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.638260 921384 task_exit.go:204] [ 11211: 11212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.638295 921384 task_exit.go:204] [ 11211: 11212] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.638315 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.639356 921384 task_exit.go:204] [ 11211: 11211] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xffffffffffffffff) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) D0323 22:35:22.640367 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "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", "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"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x210100, 0x0) write$nbd(r4, &(0x7f0000002a00)={0x67446698, 0x0, 0x3, 0x2, 0x4, "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"}, 0x1010) D0323 22:35:22.640567 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.649335 921384 usertrap_amd64.go:212] [ 11213: 11213] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.649398 921384 usertrap_amd64.go:122] [ 11213: 11213] Allocate a new trap: 0xc00049a870 39 D0323 22:35:22.649468 921384 usertrap_amd64.go:225] [ 11213: 11213] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.649699 921384 usertrap_amd64.go:212] [ 11213: 11213] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.649743 921384 usertrap_amd64.go:122] [ 11213: 11213] Allocate a new trap: 0xc00049a870 40 D0323 22:35:22.649779 921384 usertrap_amd64.go:225] [ 11213: 11213] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.650220 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.651140 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.654180 921384 usertrap_amd64.go:212] [ 11213: 11213] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.654214 921384 usertrap_amd64.go:122] [ 11213: 11213] Allocate a new trap: 0xc00049a870 41 D0323 22:35:22.654235 921384 usertrap_amd64.go:225] [ 11213: 11213] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.675882 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.676101 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.678438 921384 usertrap_amd64.go:212] [ 11213: 11213] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.678483 921384 usertrap_amd64.go:122] [ 11213: 11213] Allocate a new trap: 0xc00049a870 42 D0323 22:35:22.678501 921384 usertrap_amd64.go:225] [ 11213: 11213] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.679228 921384 task_exit.go:204] [ 11213: 11213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.679276 921384 task_exit.go:204] [ 11213: 11213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.679589 921384 task_signals.go:204] [ 11213: 11214] Signal 11213, PID: 11214, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.679617 921384 task_exit.go:204] [ 11213: 11214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.681337 921384 task_exit.go:204] [ 11213: 11214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.681392 921384 task_exit.go:204] [ 11213: 11214] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.681410 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.682436 921384 task_exit.go:204] [ 11213: 11213] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xffffffffffffffff) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "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", "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"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x210100, 0x0) D0323 22:35:22.701533 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.701790 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.721081 921384 usertrap_amd64.go:212] [ 11215: 11215] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.721125 921384 usertrap_amd64.go:122] [ 11215: 11215] Allocate a new trap: 0xc0074f91d0 39 D0323 22:35:22.721242 921384 usertrap_amd64.go:225] [ 11215: 11215] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.722167 921384 usertrap_amd64.go:212] [ 11215: 11215] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.722212 921384 usertrap_amd64.go:122] [ 11215: 11215] Allocate a new trap: 0xc0074f91d0 40 D0323 22:35:22.722232 921384 usertrap_amd64.go:225] [ 11215: 11215] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.723360 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.723973 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.727905 921384 usertrap_amd64.go:212] [ 11215: 11215] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.727927 921384 usertrap_amd64.go:122] [ 11215: 11215] Allocate a new trap: 0xc0074f91d0 41 D0323 22:35:22.727943 921384 usertrap_amd64.go:225] [ 11215: 11215] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.746407 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.747074 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.748207 921384 usertrap_amd64.go:212] [ 11215: 11215] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.748322 921384 usertrap_amd64.go:122] [ 11215: 11215] Allocate a new trap: 0xc0074f91d0 42 D0323 22:35:22.748356 921384 usertrap_amd64.go:225] [ 11215: 11215] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.749209 921384 task_exit.go:204] [ 11215: 11215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.749252 921384 task_exit.go:204] [ 11215: 11215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.749330 921384 task_signals.go:204] [ 11215: 11216] Signal 11215, PID: 11216, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.749359 921384 task_exit.go:204] [ 11215: 11216] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.750514 921384 task_exit.go:204] [ 11215: 11216] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.750538 921384 task_exit.go:204] [ 11215: 11216] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.750558 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.750744 921384 task_exit.go:204] [ 11215: 11215] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xffffffffffffffff) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "bed14f6ac97a5f8b7c4a3b5b3d8cb845ef6be959b2c2f5e3591cc2f52ba19b1363bbd2c9f5366bd3c32411639103403288301e61f97b4a67196827b9afb5bfeba41117477b9c8259aad0863f1fb990896a85152a99fe4cd96be97daf0b9dfaeac903748c87339aa9b21f2207cc253fd2580090843ddd6c30993f86caa74337229a9026504b2f219cd7b3eb8d3b971aedad33c151de53f70b7bccce403ff660e620f5d0a8194687249e1f3206e6682b73e37457b1a8205d072b44337d64aa53095dcc2c25ec6c3ce3d374004da5dd4aa16d856dd8ab12aefd451c845e9fca37ec0eaedc67947e99cce07624788c9c695bf7cec56539861f33335943bc03bfe5fc", "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"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) D0323 22:35:22.754542 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.754806 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.769847 921384 usertrap_amd64.go:212] [ 11217: 11217] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.769887 921384 usertrap_amd64.go:122] [ 11217: 11217] Allocate a new trap: 0xc007d64990 39 D0323 22:35:22.770026 921384 usertrap_amd64.go:225] [ 11217: 11217] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.771089 921384 usertrap_amd64.go:212] [ 11217: 11217] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.771164 921384 usertrap_amd64.go:122] [ 11217: 11217] Allocate a new trap: 0xc007d64990 40 D0323 22:35:22.771195 921384 usertrap_amd64.go:225] [ 11217: 11217] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.772155 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.772396 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.775992 921384 usertrap_amd64.go:212] [ 11217: 11217] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.776024 921384 usertrap_amd64.go:122] [ 11217: 11217] Allocate a new trap: 0xc007d64990 41 D0323 22:35:22.776038 921384 usertrap_amd64.go:225] [ 11217: 11217] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.797522 921384 usertrap_amd64.go:212] [ 11217: 11217] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.797567 921384 usertrap_amd64.go:122] [ 11217: 11217] Allocate a new trap: 0xc007d64990 42 D0323 22:35:22.797588 921384 usertrap_amd64.go:225] [ 11217: 11217] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.798827 921384 task_exit.go:204] [ 11217: 11217] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.798979 921384 task_exit.go:204] [ 11217: 11217] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.801049 921384 task_signals.go:204] [ 11217: 11218] Signal 11217, PID: 11218, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.801101 921384 task_exit.go:204] [ 11217: 11218] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.801481 921384 task_exit.go:204] [ 11217: 11218] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.801512 921384 task_exit.go:204] [ 11217: 11218] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.801530 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.803432 921384 task_exit.go:204] [ 11217: 11217] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xffffffffffffffff) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000000b00)={0x0, 0x0, "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", "b4458acdecf20fb05e2d13627bcf1a2ccc958d7b6d152ca5d839a7b9fae8edce6156c6020ae2d35a9faec2be5be3f69bedbed7960925ffae224083955fce4ade4d0c716f906c45bf86db4a032920568de213df41271189caee44eceec880e716a600bab6f24f53d9cf3b64f97cff5d1c27b875816c5283dfe5c890704e4aa9453c2f67e90e24be00e40b29d63698763ad5bf035a8558a1ef930c1b084e4a2ee489699ea5b663e10ea15560563dd6867660faafd73d0ecbdbd377d272a150c79aefd06636c99125d918b96f3cd14bb4a10566a86bab0a667e6ea661fc1964e7a371939c307ee06183890c7c2d6bc5b2e1d9abaf2bcf8520e4f4002871cdbdf5d0b9a0f1c055276a15603a3fa315cad4a4ceb574bee6388820001e4ab1ed271609287a28c2dc1f18fc47329675a908dc86784e6aaed6217797961c5055b8e4e719e2bc2f6051cba84edf6d59726315096c7afeb3ac5f4f4685f57b505fc1fb70c0575c726abd714de5087afc32de336a41c969f59d100f12490571d6785d37d126115d2348449064e671e809c2f97f690b3fb87acf02774b78af9aca147b47b0beb571425c0556dee00f4d9ca473d35f587e87b678109fe091193e4f4a1f414b13fe949458895c31d2a7f8b7a5cba2e04bd7cc3d97cf0817ef815cf192d7627204ec358744425ff6f3b905c04fa94c253982c48ba7ac4bafa1c2806c624d61955afa2033d4caeeb726cb5d2b9c554114a779dafef8ec995be7790b8d4801e2f7f9903bf257925b38d6c5dd68ec1f7295efb53a292507f8a3769c1269838458e5431af7e7368f4c46ef243385ab4d87a94d5368db6394aa0e65519f5355d6f6ccbeb204cb9f9e6fffa4b309ddcb2edc283c55e5d8e080e917251faf33f61acc02cb97906bff80e36ab2f7c82f315c54d2bfe5e9f42d6e443e8626f57d6991435db618b1270a3b4836d254fa9df435d2d592d194b3696e8f21cc24fb3b64255bea0659383ea9c86479afcc7e38cb4a7d5d72cb731500ab0c3c169b386905ef75e81d7b3fb64bbc8e08fcfbab33272b4e9d47c4f0900d9de34e8900d50e0e9ad831afa32069420b8d5950f723d6aa38d3d7f554a9f770e395ca8b9e9ecfcdec1cdb0477e010c789117373a1e9475f93b683fd6039a69e62f9d9a67c27da815107160683516ba706697c2c83183fd5483739bfefca22b6bbaf313aef4ca55269425863ee4429308afebf6e9f90436920aa9a9b7426c3b2d8278fffc3fdbbcbf344e550b77ea7b4ff98e65f58b625ddfff6527b1a013f4121f77a01ce481de816436db47b144945f917921ef48067e17e9ab0d8b4cb5d875981ce2c4da4595fefa5922def44ff71dbbc742946212e1a988f9cb36f4ed54eb8daad7f20a2f695021ca46ed0efbb5a910ff3adffa5fb6285588028d5f50eb8c20706b896c6c0ae6fdb0c52b9064d95647bc45dd69c7a82e2f931af3659997ae2eb1f728f466ef6eb83e6d68ae90281cd1468728355439a6fcd68b3d1b477e0d0a100f5d0927b1fc105ba7032e87de8fe58ed93ac3d7784cd774198ca0ff918f2b50a3fadf07a8c36dd9133e0229feda573d6fc981be9fa947ee9d23eec3d15cae5e639792dd8444b18a42ad6677e550d10fd54dd2beada3d88349a8ae0a3afada20f8272c239aa35e43a6d720138ce8e67e69e3454f46a6fc091c01d5677deef077ce3bd47d63ed84b5963dc806bfbf6582681352b70873b17e2e812c8247f5bf3e294d87a1849e69a5a3443db4e5631238ca5474fd452e9d5db8957c51d2a9ed0961aa27d0f8ca6e30e99d9fdff4a00f9da5bb234baf680456edee76c6fbc248548e85912009fddcc008ae8740261de5c9bebf0c712b97349f6b1499feaad8e092b04abed5a321058ebe3f28700336ed99dfca103baa76d5e4d7e61c2f51bcb4ce2ed68ba4c115cfe26e4b9345204a64b050162839ab3600ed3e6dcd793828270fe749b67e8d517708260b24fb4c7263e598822c18c6cfacf1504637c05e14fe6b6797cb8ad3be2548eb7ecf688aa1829cf929ab29782e16ea3293795b8f47dc0a2d6ebd9a75dadc7237f05478702dcaf751c7400b1f7e973e6cd8aa03243238558ea7ef0f663cc21679a67b97d241741533a4afe57173f39157536821d704dac245bed6537ea96578a569ea10b164131ee8b9b0a5f8e2757bbc365368458ccce2527ff0c93aa9c13725e23e6dd4b7899af8e0a882c982e798070d9bec2bb3c8cdbbb8de75d15d518b7c6a105f97bbd81b72ba9a650df8b9080c0d8013fc33b759234c262b22a827ab10685af575a968faab989e23c2e0b8eae5c3e52af34efc5be9448d079863646e45dcfdf596096ebe282c9de0258a37f245415292f85682734291b9ee04e72b54047ece164043a3c7962b6f33c7bb223ec59c7e50e7a5f23687c82153fce6073a2834cd6825d6753bd3af1d4d43cdb9699626c425c52e8c3e9ee494d45fc0f8d9dbc3409f6405421da361569cb34eb01bcf27b0b692ac626c3c5fc84a88dfc7aa688766e51acd7334a58b0e2d0a7aa2718a7ad167ffa1dbe14acd3714838d980bb9844d1327ab1f34f5b537094cfc27efc84264865383e5a2e870922d1133389adc34b2814f4dec931220b613947eab1a10f8cbe2f984b539c5aa9b933f6c29a2a59bdd84b40bc15d145687c58336ff1599972f46b7ce0df7804cb8a811afa0b1896d140b48e918ab0af5c5a89edd02df82efdba8ce76ac2ef8d70241112b08e6317db165d9e5f0624d62dd5454eacbf34a20ae2fd30501c29e21d0305997ad807a58e19e9b4c66525cb001dc89fdd34597f5bdf5805ce66c858a2daaaebac5ef74cb121098391414b0cafd6b93fcc249201383aea45260b9a57eec3a4ad887ab9a8e803b5815396b95e77940789fca0a3de1e2e62ce6c790a3632583f7d6fcea71dee35185caa92db89ac846832abbf4e4538771455000addce4c49d361f02919633ea36c7d7991957985613a114c49fee446699861a003251f87434cd09e740840b097d471c93adf376408475b4e7d5e8f904231170fe23dd152fc27f446e14f7d805040e4168f6e838df723b0947a7bf15494fcf01a6d463e97ba6f5f0687f39934f636496922ed9934c0039ca3304f3c181bd99914f13ae638dfffc8c95ec6b951613c93c0fbd5b2c45a311027283545f83d4ed97985fa6d9c79a4ffe6c292295eb540eff1b0e99136a5324e6bd0b20d76e1a672abc56b66aa90242bf40c6c7fe39d3e2481a06d514a2a3e57d074d3808df67d14a5bc123b73b66367fc9e24efb4a08cca2229b4fc0b06941a130930145f4b88001f938125d6f18078bf497b834e2eb76976da40f237177dbe62ac1c946ea7cd33a33d5791fd2eee368bf3d1755298156f95eb5cd50157eaf7f8b61cb6563092f230dee6b2a8ad4020dc0915a260c2bce30a5f3d9041e6cbe973436575c5e6887f3e441677a55e0b5639423ec71a6988dbb94c8f519fd0015a11a8978058648f819d057c965268b7c636ce8a0c14635c96aee537a36390126eba22f839aebdde1c733900a03d46742b1c40bf0686acccdf64293457c82667742cdff08fe4ea9cabb1e03e59b547b7e2dccee88d23d37f0578cf9b983cf0ded1eb29af7661e0cd8f40aa828b5450c4b92fd81a629977aa447aca8712583b56409b561d7fcf0da65a30ea8156d6b5f141790b55e23569cf19426b9f31fb8f314d9d524ab4bd3974de7411312fb6dcc506381b550597232921c95c9bcf2605b7ead72fd1efa3b46682e99f218e2d41d55ac5a0d40beb6f8c3c840c67933611dfece02a4e4e1a7518bcede72d8ada1447bc138ca6a41831630211d4bd9cd8e06f57a038268531b2ca28dede6c1795eca19fcf19e847172cd558bc7c3ce19f9ac30544945d1a4e467b6b78ecb689a08a855850099f7889eea1f4ace1bc8d9860f608a69731149a839de74caa67cb1138856efc207924861a3405cd9f7a731ab9e45b132b0b00a9fc6c94f7b3b6d4773cb9a72fb1e200d89e748e8b165d47e68660ebe1651e12a0e85123c97438238cfc3a3d022d807b340ffd970b1a7bb8fb08045c122b18cbc3dcdb7bdfaed24ac11fbb265a09d12e51fc5df57ee2637c5af533957a0c9ce3fb1538cedddc980e86896cb488fb1f8690307f89ab9e9c2d95c25ce863f6b433577470abd006313d84b78a9f355cad9d7dd1de8e972eda65a158d2aa682f21154be665073f6866bbcac717fb4a72ad781d47225f143ab46e6f80e39956ecd03f77a91e0636a22ee58ee0ba9f0e5a37bedd0b2985cab67df86f6c74f89cb67f655e126de038c25862eca4b7304ae55f4c7d235e5633dcfc079c1293971693a0d188159cd10b4936ccdcd17f1b299e38206405921b7a2f561a658aab73ca27eb90beb6bbe7c78cb79a8d5ab27c2ba16ca5bf6cc7b54dfecb014af471661cf3bd6465d1bbae784a743100b3ebe02bfab93b9f43e2544b7b470f3ba0f1a74f0980330f1f8c9ea0016db8cc1eae636e956e365aa659b39965eef14adcca080aa67bee93378bb0732cf472e28703d5f3b8d8ea9d278db21770372dcdb60427f180106bd6f1af53a0c95e9142665e0bc5be34b83975072e64db378cc082b1ee2a1c61512d84c90cff35c9e2b044daa93a2af8bcae03e6a3129e3565f66ecc9bca5da85134f5c8176df840580cb7288785425a9897c1147fb4f65f31425bfc5768706a90fe484b3c35a0f492f33db262b1ffdab7fe5e6d584e472ad566a0d6c4b087b88766df700b0731b8f7a5eae3fb7d69a0747f5fab67c9831950fb836358145db506285c531460b4c9dc39cf626d879518437e9ad7884ef2be8eeae40fff0c37fa62380bd7da07014fbe4bf5472059320a59d283ad18b5fe48533e2d098fc88ca80e1eabca2328d2897bee851acd368b21b0fe90cf97caefe5ef7be7e415000b849cc779a26d61e9baf94d88dd5f31c3ae616834e72e350446b88675fcd91762a130ce7244e50afceabe162d363ae94aa2f281ac0d74aa9c625ea40c2d3d9fef5e4f301eafb6aa44dbba1d810e01f778fb262313835f45485de2b0df6191b7a658a67efcc953e71ab12af8595747c915e988d721a86077e90f6412d7d7084f813e52601d65a4fa7d2db9b6213fe51ee746959390653bc18529286319e37fb2fccffe86ed40e42a21e506f4b2b3ae3e73a9322a86b387f05dbc66efcd6779002767a1581a6ce2d284bf9a606aff389e45575e68ca2751095e1bb448f768124844c2c8108e6b74a46c99d5aef1aa35303431677ae5611821f4d3d3705fec36c1f3ef8781b93f47e23f20e5a367c80f0fba4723dfa9cdede8a8f8f6993e302c68b1f7bd80f4d2872fa3bc12d634d96b6f8598fbd72825dd4bf9ee349be03641e0653935"}) D0323 22:35:22.818524 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.818724 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.827896 921384 usertrap_amd64.go:212] [ 11219: 11219] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.827948 921384 usertrap_amd64.go:122] [ 11219: 11219] Allocate a new trap: 0xc003300720 39 D0323 22:35:22.828056 921384 usertrap_amd64.go:225] [ 11219: 11219] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.828873 921384 usertrap_amd64.go:212] [ 11219: 11219] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.828990 921384 usertrap_amd64.go:122] [ 11219: 11219] Allocate a new trap: 0xc003300720 40 D0323 22:35:22.829062 921384 usertrap_amd64.go:225] [ 11219: 11219] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.830108 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.830315 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.836988 921384 usertrap_amd64.go:212] [ 11219: 11219] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.837192 921384 usertrap_amd64.go:122] [ 11219: 11219] Allocate a new trap: 0xc003300720 41 D0323 22:35:22.837277 921384 usertrap_amd64.go:225] [ 11219: 11219] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.865256 921384 usertrap_amd64.go:212] [ 11219: 11219] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.865326 921384 usertrap_amd64.go:122] [ 11219: 11219] Allocate a new trap: 0xc003300720 42 D0323 22:35:22.865349 921384 usertrap_amd64.go:225] [ 11219: 11219] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.865996 921384 task_exit.go:204] [ 11219: 11219] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.866114 921384 task_signals.go:204] [ 11219: 11220] Signal 11219, PID: 11220, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.866144 921384 task_exit.go:204] [ 11219: 11219] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.866732 921384 task_exit.go:204] [ 11219: 11220] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.868078 921384 task_exit.go:204] [ 11219: 11220] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.868114 921384 task_exit.go:204] [ 11219: 11220] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.868141 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.869066 921384 task_exit.go:204] [ 11219: 11219] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xffffffffffffffff) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000005c0), 0x2, 0x0) D0323 22:35:22.874400 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.874564 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.884087 921384 usertrap_amd64.go:212] [ 11221: 11221] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.884124 921384 usertrap_amd64.go:122] [ 11221: 11221] Allocate a new trap: 0xc003300870 39 D0323 22:35:22.884211 921384 usertrap_amd64.go:225] [ 11221: 11221] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.884921 921384 usertrap_amd64.go:212] [ 11221: 11221] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.884977 921384 usertrap_amd64.go:122] [ 11221: 11221] Allocate a new trap: 0xc003300870 40 D0323 22:35:22.884991 921384 usertrap_amd64.go:225] [ 11221: 11221] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.885485 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.885718 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.887399 921384 usertrap_amd64.go:212] [ 11221: 11221] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.887475 921384 usertrap_amd64.go:122] [ 11221: 11221] Allocate a new trap: 0xc003300870 41 D0323 22:35:22.887504 921384 usertrap_amd64.go:225] [ 11221: 11221] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.907564 921384 usertrap_amd64.go:212] [ 11221: 11221] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.907607 921384 usertrap_amd64.go:122] [ 11221: 11221] Allocate a new trap: 0xc003300870 42 D0323 22:35:22.907622 921384 usertrap_amd64.go:225] [ 11221: 11221] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.908199 921384 task_exit.go:204] [ 11221: 11221] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.908245 921384 task_exit.go:204] [ 11221: 11221] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.908296 921384 task_signals.go:204] [ 11221: 11222] Signal 11221, PID: 11222, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.908325 921384 task_exit.go:204] [ 11221: 11222] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.909961 921384 task_exit.go:204] [ 11221: 11222] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.910001 921384 task_exit.go:204] [ 11221: 11222] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.910027 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.910463 921384 task_exit.go:204] [ 11221: 11221] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) ioctl$TUNSETOWNER(r2, 0x400454cc, 0xffffffffffffffff) D0323 22:35:22.918082 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.918375 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.929255 921384 usertrap_amd64.go:212] [ 11223: 11223] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.929283 921384 usertrap_amd64.go:122] [ 11223: 11223] Allocate a new trap: 0xc003300a50 39 D0323 22:35:22.929363 921384 usertrap_amd64.go:225] [ 11223: 11223] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.929778 921384 usertrap_amd64.go:212] [ 11223: 11223] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.929794 921384 usertrap_amd64.go:122] [ 11223: 11223] Allocate a new trap: 0xc003300a50 40 D0323 22:35:22.929805 921384 usertrap_amd64.go:225] [ 11223: 11223] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.930378 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.930806 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.935785 921384 usertrap_amd64.go:212] [ 11223: 11223] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.935813 921384 usertrap_amd64.go:122] [ 11223: 11223] Allocate a new trap: 0xc003300a50 41 D0323 22:35:22.935838 921384 usertrap_amd64.go:225] [ 11223: 11223] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.950742 921384 usertrap_amd64.go:212] [ 11223: 11223] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.950771 921384 usertrap_amd64.go:122] [ 11223: 11223] Allocate a new trap: 0xc003300a50 42 D0323 22:35:22.950784 921384 usertrap_amd64.go:225] [ 11223: 11223] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.951328 921384 task_exit.go:204] [ 11223: 11223] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.951366 921384 task_exit.go:204] [ 11223: 11223] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.951440 921384 task_signals.go:204] [ 11223: 11224] Signal 11223, PID: 11224, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.951475 921384 task_exit.go:204] [ 11223: 11224] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.954648 921384 task_exit.go:204] [ 11223: 11224] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.954675 921384 task_exit.go:204] [ 11223: 11224] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.954691 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.955683 921384 task_exit.go:204] [ 11223: 11223] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000001c40)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="0010000000050401ffffffff4773005c0068bca381049078fffffffeac1414bb940400008909c5c34c6e93f23301072392ac1414bb64010101060000000a01010164010101ac1414aaac1414aaac143bfdcacad4e47ab699b9740604457300"/104]}) openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) D0323 22:35:22.958704 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.958907 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.972256 921384 usertrap_amd64.go:212] [ 11225: 11225] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:22.972334 921384 usertrap_amd64.go:122] [ 11225: 11225] Allocate a new trap: 0xc0087862a0 39 D0323 22:35:22.972434 921384 usertrap_amd64.go:225] [ 11225: 11225] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:22.973317 921384 usertrap_amd64.go:212] [ 11225: 11225] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:22.973336 921384 usertrap_amd64.go:122] [ 11225: 11225] Allocate a new trap: 0xc0087862a0 40 D0323 22:35:22.973347 921384 usertrap_amd64.go:225] [ 11225: 11225] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:22.973851 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:22.974120 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:22.976477 921384 usertrap_amd64.go:212] [ 11225: 11225] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:22.976500 921384 usertrap_amd64.go:122] [ 11225: 11225] Allocate a new trap: 0xc0087862a0 41 D0323 22:35:22.976509 921384 usertrap_amd64.go:225] [ 11225: 11225] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:22.990209 921384 usertrap_amd64.go:212] [ 11225: 11225] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:22.990240 921384 usertrap_amd64.go:122] [ 11225: 11225] Allocate a new trap: 0xc0087862a0 42 D0323 22:35:22.990255 921384 usertrap_amd64.go:225] [ 11225: 11225] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:22.990628 921384 task_exit.go:204] [ 11225: 11225] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.990664 921384 task_exit.go:204] [ 11225: 11225] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.990732 921384 task_signals.go:204] [ 11225: 11226] Signal 11225, PID: 11226, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:22.990769 921384 task_exit.go:204] [ 11225: 11226] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:22.992308 921384 task_exit.go:204] [ 11225: 11226] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:22.992339 921384 task_exit.go:204] [ 11225: 11226] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:22.992352 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:22.993491 921384 task_exit.go:204] [ 11225: 11225] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:22 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r1, &(0x7f0000002980)) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000580)={@mcast1, r0}, 0x14) openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) D0323 22:35:22.995491 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:22.995772 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.007750 921384 usertrap_amd64.go:212] [ 11227: 11227] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.007781 921384 usertrap_amd64.go:122] [ 11227: 11227] Allocate a new trap: 0xc008786540 39 D0323 22:35:23.007881 921384 usertrap_amd64.go:225] [ 11227: 11227] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.008813 921384 usertrap_amd64.go:212] [ 11227: 11227] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.008832 921384 usertrap_amd64.go:122] [ 11227: 11227] Allocate a new trap: 0xc008786540 40 D0323 22:35:23.008843 921384 usertrap_amd64.go:225] [ 11227: 11227] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.009579 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.009870 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.013260 921384 usertrap_amd64.go:212] [ 11227: 11227] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.013303 921384 usertrap_amd64.go:122] [ 11227: 11227] Allocate a new trap: 0xc008786540 41 D0323 22:35:23.013334 921384 usertrap_amd64.go:225] [ 11227: 11227] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.035214 921384 usertrap_amd64.go:212] [ 11227: 11227] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.035273 921384 usertrap_amd64.go:122] [ 11227: 11227] Allocate a new trap: 0xc008786540 42 D0323 22:35:23.035292 921384 usertrap_amd64.go:225] [ 11227: 11227] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.036228 921384 task_exit.go:204] [ 11227: 11227] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.036280 921384 task_exit.go:204] [ 11227: 11227] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.036367 921384 task_signals.go:204] [ 11227: 11228] Signal 11227, PID: 11228, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.036404 921384 task_exit.go:204] [ 11227: 11228] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.038031 921384 task_exit.go:204] [ 11227: 11228] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.038069 921384 task_exit.go:204] [ 11227: 11228] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.038089 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.038616 921384 task_exit.go:204] [ 11227: 11227] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000002980)) openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) D0323 22:35:23.041933 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.042205 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.063106 921384 usertrap_amd64.go:212] [ 11229: 11229] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.063156 921384 usertrap_amd64.go:122] [ 11229: 11229] Allocate a new trap: 0xc008183680 39 D0323 22:35:23.063845 921384 usertrap_amd64.go:225] [ 11229: 11229] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.064964 921384 usertrap_amd64.go:212] [ 11229: 11229] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.065032 921384 usertrap_amd64.go:122] [ 11229: 11229] Allocate a new trap: 0xc008183680 40 D0323 22:35:23.065049 921384 usertrap_amd64.go:225] [ 11229: 11229] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.066326 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.066546 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.068645 921384 usertrap_amd64.go:212] [ 11229: 11229] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.068680 921384 usertrap_amd64.go:122] [ 11229: 11229] Allocate a new trap: 0xc008183680 41 D0323 22:35:23.068698 921384 usertrap_amd64.go:225] [ 11229: 11229] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.083077 921384 usertrap_amd64.go:212] [ 11229: 11229] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.083110 921384 usertrap_amd64.go:122] [ 11229: 11229] Allocate a new trap: 0xc008183680 42 D0323 22:35:23.083123 921384 usertrap_amd64.go:225] [ 11229: 11229] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.083776 921384 task_exit.go:204] [ 11229: 11229] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.083935 921384 task_exit.go:204] [ 11229: 11229] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.084291 921384 task_signals.go:204] [ 11229: 11230] Signal 11229, PID: 11230, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.084369 921384 task_exit.go:204] [ 11229: 11230] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.086167 921384 task_exit.go:204] [ 11229: 11230] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.086232 921384 task_exit.go:204] [ 11229: 11230] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.086283 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.088370 921384 task_exit.go:204] [ 11229: 11229] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) socket$inet6_tcp(0xa, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) D0323 22:35:23.092205 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.092438 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.107046 921384 usertrap_amd64.go:212] [ 11231: 11231] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.107090 921384 usertrap_amd64.go:122] [ 11231: 11231] Allocate a new trap: 0xc007d64c60 39 D0323 22:35:23.107177 921384 usertrap_amd64.go:225] [ 11231: 11231] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.107560 921384 usertrap_amd64.go:212] [ 11231: 11231] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.107567 921384 usertrap_amd64.go:122] [ 11231: 11231] Allocate a new trap: 0xc007d64c60 40 D0323 22:35:23.107575 921384 usertrap_amd64.go:225] [ 11231: 11231] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.107947 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.108181 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.111051 921384 usertrap_amd64.go:212] [ 11231: 11231] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.111083 921384 usertrap_amd64.go:122] [ 11231: 11231] Allocate a new trap: 0xc007d64c60 41 D0323 22:35:23.111097 921384 usertrap_amd64.go:225] [ 11231: 11231] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.123920 921384 usertrap_amd64.go:212] [ 11231: 11231] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.124010 921384 usertrap_amd64.go:122] [ 11231: 11231] Allocate a new trap: 0xc007d64c60 42 D0323 22:35:23.124086 921384 usertrap_amd64.go:225] [ 11231: 11231] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.124616 921384 task_exit.go:204] [ 11231: 11231] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.124676 921384 task_exit.go:204] [ 11231: 11231] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.124723 921384 task_signals.go:204] [ 11231: 11232] Signal 11231, PID: 11232, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.124754 921384 task_exit.go:204] [ 11231: 11232] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.126683 921384 task_exit.go:204] [ 11231: 11232] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.126709 921384 task_exit.go:204] [ 11231: 11232] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.126723 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.127882 921384 task_exit.go:204] [ 11231: 11231] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0x1, 0x2, 0x3a, @ipv4={'\x00', '\xff\xff', @multicast2}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x37, 0xc85f1ba90de2de4e, 0x8, 0x40}}) openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) D0323 22:35:23.130210 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.130458 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.139717 921384 usertrap_amd64.go:212] [ 11233: 11233] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.139749 921384 usertrap_amd64.go:122] [ 11233: 11233] Allocate a new trap: 0xc008786750 39 D0323 22:35:23.139832 921384 usertrap_amd64.go:225] [ 11233: 11233] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.140662 921384 usertrap_amd64.go:212] [ 11233: 11233] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.140731 921384 usertrap_amd64.go:122] [ 11233: 11233] Allocate a new trap: 0xc008786750 40 D0323 22:35:23.140747 921384 usertrap_amd64.go:225] [ 11233: 11233] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.141413 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.141656 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.144801 921384 usertrap_amd64.go:212] [ 11233: 11233] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.144829 921384 usertrap_amd64.go:122] [ 11233: 11233] Allocate a new trap: 0xc008786750 41 D0323 22:35:23.144845 921384 usertrap_amd64.go:225] [ 11233: 11233] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.157581 921384 usertrap_amd64.go:212] [ 11233: 11233] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.157613 921384 usertrap_amd64.go:122] [ 11233: 11233] Allocate a new trap: 0xc008786750 42 D0323 22:35:23.157638 921384 usertrap_amd64.go:225] [ 11233: 11233] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.157955 921384 task_exit.go:204] [ 11233: 11233] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.158072 921384 task_exit.go:204] [ 11233: 11233] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.158442 921384 task_signals.go:204] [ 11233: 11234] Signal 11233, PID: 11234, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.158476 921384 task_exit.go:204] [ 11233: 11234] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.159732 921384 task_exit.go:204] [ 11233: 11234] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.159841 921384 task_exit.go:204] [ 11233: 11234] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.159865 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.160098 921384 task_exit.go:204] [ 11233: 11233] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x6, 0x6) openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) D0323 22:35:23.162843 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.163053 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.175981 921384 usertrap_amd64.go:212] [ 11235: 11235] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.176009 921384 usertrap_amd64.go:122] [ 11235: 11235] Allocate a new trap: 0xc000bcb680 39 D0323 22:35:23.176109 921384 usertrap_amd64.go:225] [ 11235: 11235] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.176607 921384 usertrap_amd64.go:212] [ 11235: 11235] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.176631 921384 usertrap_amd64.go:122] [ 11235: 11235] Allocate a new trap: 0xc000bcb680 40 D0323 22:35:23.176641 921384 usertrap_amd64.go:225] [ 11235: 11235] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.177227 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.177489 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.179278 921384 usertrap_amd64.go:212] [ 11235: 11235] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.179296 921384 usertrap_amd64.go:122] [ 11235: 11235] Allocate a new trap: 0xc000bcb680 41 D0323 22:35:23.179309 921384 usertrap_amd64.go:225] [ 11235: 11235] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.193774 921384 usertrap_amd64.go:212] [ 11235: 11235] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.193823 921384 usertrap_amd64.go:122] [ 11235: 11235] Allocate a new trap: 0xc000bcb680 42 D0323 22:35:23.193844 921384 usertrap_amd64.go:225] [ 11235: 11235] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.194476 921384 task_exit.go:204] [ 11235: 11235] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.194531 921384 task_signals.go:204] [ 11235: 11236] Signal 11235, PID: 11236, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.194551 921384 task_exit.go:204] [ 11235: 11235] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.195782 921384 task_exit.go:204] [ 11235: 11236] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.196985 921384 task_exit.go:204] [ 11235: 11236] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.197063 921384 task_exit.go:204] [ 11235: 11236] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.197094 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.198807 921384 task_exit.go:204] [ 11235: 11235] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: socketpair(0x1, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) D0323 22:35:23.205572 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.205825 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.217272 921384 usertrap_amd64.go:212] [ 11237: 11237] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.217325 921384 usertrap_amd64.go:122] [ 11237: 11237] Allocate a new trap: 0xc003301050 39 D0323 22:35:23.217399 921384 usertrap_amd64.go:225] [ 11237: 11237] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.218433 921384 usertrap_amd64.go:212] [ 11237: 11237] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.218479 921384 usertrap_amd64.go:122] [ 11237: 11237] Allocate a new trap: 0xc003301050 40 D0323 22:35:23.218497 921384 usertrap_amd64.go:225] [ 11237: 11237] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.220117 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.221147 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.226323 921384 usertrap_amd64.go:212] [ 11237: 11237] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.226357 921384 usertrap_amd64.go:122] [ 11237: 11237] Allocate a new trap: 0xc003301050 41 D0323 22:35:23.226372 921384 usertrap_amd64.go:225] [ 11237: 11237] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.238302 921384 usertrap_amd64.go:212] [ 11237: 11237] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.238403 921384 usertrap_amd64.go:122] [ 11237: 11237] Allocate a new trap: 0xc003301050 42 D0323 22:35:23.238432 921384 usertrap_amd64.go:225] [ 11237: 11237] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.238853 921384 task_exit.go:204] [ 11237: 11237] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.238968 921384 task_exit.go:204] [ 11237: 11237] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.239062 921384 task_signals.go:204] [ 11237: 11238] Signal 11237, PID: 11238, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.239128 921384 task_exit.go:204] [ 11237: 11238] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.241144 921384 task_exit.go:204] [ 11237: 11238] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.241197 921384 task_exit.go:204] [ 11237: 11238] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.241214 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.242289 921384 task_exit.go:204] [ 11237: 11237] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x41a500, 0x0) D0323 22:35:23.249345 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.249563 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.259973 921384 usertrap_amd64.go:212] [ 11239: 11239] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.260008 921384 usertrap_amd64.go:122] [ 11239: 11239] Allocate a new trap: 0xc007d64f00 39 D0323 22:35:23.260082 921384 usertrap_amd64.go:225] [ 11239: 11239] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.260479 921384 usertrap_amd64.go:212] [ 11239: 11239] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.260500 921384 usertrap_amd64.go:122] [ 11239: 11239] Allocate a new trap: 0xc007d64f00 40 D0323 22:35:23.260511 921384 usertrap_amd64.go:225] [ 11239: 11239] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.261626 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.261851 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.264476 921384 usertrap_amd64.go:212] [ 11239: 11239] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.264514 921384 usertrap_amd64.go:122] [ 11239: 11239] Allocate a new trap: 0xc007d64f00 41 D0323 22:35:23.264529 921384 usertrap_amd64.go:225] [ 11239: 11239] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.271585 921384 usertrap_amd64.go:212] [ 11239: 11239] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.271615 921384 usertrap_amd64.go:122] [ 11239: 11239] Allocate a new trap: 0xc007d64f00 42 D0323 22:35:23.271625 921384 usertrap_amd64.go:225] [ 11239: 11239] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.272006 921384 task_exit.go:204] [ 11239: 11239] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.272044 921384 task_exit.go:204] [ 11239: 11239] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.272090 921384 task_signals.go:204] [ 11239: 11240] Signal 11239, PID: 11240, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.272125 921384 task_exit.go:204] [ 11239: 11240] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.273956 921384 task_exit.go:204] [ 11239: 11240] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.273992 921384 task_exit.go:204] [ 11239: 11240] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.274008 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.274638 921384 task_exit.go:204] [ 11239: 11239] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x41a500, 0x0) D0323 22:35:23.278932 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.279193 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.290092 921384 usertrap_amd64.go:212] [ 11241: 11241] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.290118 921384 usertrap_amd64.go:122] [ 11241: 11241] Allocate a new trap: 0xc008786a80 39 D0323 22:35:23.290202 921384 usertrap_amd64.go:225] [ 11241: 11241] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.290539 921384 usertrap_amd64.go:212] [ 11241: 11241] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.290553 921384 usertrap_amd64.go:122] [ 11241: 11241] Allocate a new trap: 0xc008786a80 40 D0323 22:35:23.290559 921384 usertrap_amd64.go:225] [ 11241: 11241] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.290988 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.291179 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.294002 921384 usertrap_amd64.go:212] [ 11241: 11241] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.294035 921384 usertrap_amd64.go:122] [ 11241: 11241] Allocate a new trap: 0xc008786a80 41 D0323 22:35:23.294050 921384 usertrap_amd64.go:225] [ 11241: 11241] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.302297 921384 usertrap_amd64.go:212] [ 11241: 11241] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.302323 921384 usertrap_amd64.go:122] [ 11241: 11241] Allocate a new trap: 0xc008786a80 42 D0323 22:35:23.302335 921384 usertrap_amd64.go:225] [ 11241: 11241] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.302772 921384 task_exit.go:204] [ 11241: 11241] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.302798 921384 task_exit.go:204] [ 11241: 11241] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.303997 921384 task_signals.go:204] [ 11241: 11242] Signal 11241, PID: 11242, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.304026 921384 task_exit.go:204] [ 11241: 11242] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.304249 921384 task_exit.go:204] [ 11241: 11242] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.304267 921384 task_exit.go:204] [ 11241: 11242] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.304277 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.305494 921384 task_exit.go:204] [ 11241: 11241] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x41a500, 0x0) D0323 22:35:23.306377 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.306535 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.314688 921384 usertrap_amd64.go:212] [ 11243: 11243] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.314718 921384 usertrap_amd64.go:122] [ 11243: 11243] Allocate a new trap: 0xc008786ba0 39 D0323 22:35:23.314788 921384 usertrap_amd64.go:225] [ 11243: 11243] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.315390 921384 usertrap_amd64.go:212] [ 11243: 11243] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.315411 921384 usertrap_amd64.go:122] [ 11243: 11243] Allocate a new trap: 0xc008786ba0 40 D0323 22:35:23.315419 921384 usertrap_amd64.go:225] [ 11243: 11243] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.315754 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.315997 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.317383 921384 usertrap_amd64.go:212] [ 11243: 11243] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.317404 921384 usertrap_amd64.go:122] [ 11243: 11243] Allocate a new trap: 0xc008786ba0 41 D0323 22:35:23.317411 921384 usertrap_amd64.go:225] [ 11243: 11243] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.323497 921384 usertrap_amd64.go:212] [ 11243: 11243] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.323524 921384 usertrap_amd64.go:122] [ 11243: 11243] Allocate a new trap: 0xc008786ba0 42 D0323 22:35:23.323535 921384 usertrap_amd64.go:225] [ 11243: 11243] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.324384 921384 task_exit.go:204] [ 11243: 11243] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.324421 921384 task_exit.go:204] [ 11243: 11243] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.324482 921384 task_signals.go:204] [ 11243: 11244] Signal 11243, PID: 11244, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.324510 921384 task_exit.go:204] [ 11243: 11244] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.326496 921384 task_exit.go:204] [ 11243: 11244] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.326514 921384 task_exit.go:204] [ 11243: 11244] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.326531 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.327738 921384 task_exit.go:204] [ 11243: 11243] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.328461 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.328639 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:23 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x41a500, 0x0) D0323 22:35:23.337253 921384 usertrap_amd64.go:212] [ 11245: 11245] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.337276 921384 usertrap_amd64.go:122] [ 11245: 11245] Allocate a new trap: 0xc0074f97d0 39 D0323 22:35:23.337340 921384 usertrap_amd64.go:225] [ 11245: 11245] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.337887 921384 usertrap_amd64.go:212] [ 11245: 11245] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.337912 921384 usertrap_amd64.go:122] [ 11245: 11245] Allocate a new trap: 0xc0074f97d0 40 D0323 22:35:23.337922 921384 usertrap_amd64.go:225] [ 11245: 11245] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.338327 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.339171 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.340649 921384 usertrap_amd64.go:212] [ 11245: 11245] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.340669 921384 usertrap_amd64.go:122] [ 11245: 11245] Allocate a new trap: 0xc0074f97d0 41 D0323 22:35:23.340677 921384 usertrap_amd64.go:225] [ 11245: 11245] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.349346 921384 usertrap_amd64.go:212] [ 11245: 11245] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.349438 921384 usertrap_amd64.go:122] [ 11245: 11245] Allocate a new trap: 0xc0074f97d0 42 D0323 22:35:23.349457 921384 usertrap_amd64.go:225] [ 11245: 11245] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.349940 921384 task_exit.go:204] [ 11245: 11245] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.349974 921384 task_exit.go:204] [ 11245: 11245] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.350056 921384 task_signals.go:204] [ 11245: 11246] Signal 11245, PID: 11246, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.350095 921384 task_exit.go:204] [ 11245: 11246] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.351805 921384 task_exit.go:204] [ 11245: 11246] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.351835 921384 task_exit.go:204] [ 11245: 11246] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.351853 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.352237 921384 task_exit.go:204] [ 11245: 11245] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x0, 0x0) D0323 22:35:23.353868 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.354120 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.362325 921384 usertrap_amd64.go:212] [ 11247: 11247] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.362347 921384 usertrap_amd64.go:122] [ 11247: 11247] Allocate a new trap: 0xc0081839b0 39 D0323 22:35:23.362427 921384 usertrap_amd64.go:225] [ 11247: 11247] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.362777 921384 usertrap_amd64.go:212] [ 11247: 11247] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.362790 921384 usertrap_amd64.go:122] [ 11247: 11247] Allocate a new trap: 0xc0081839b0 40 D0323 22:35:23.362796 921384 usertrap_amd64.go:225] [ 11247: 11247] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.363089 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.363277 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.382660 921384 usertrap_amd64.go:212] [ 11247: 11247] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.382699 921384 usertrap_amd64.go:122] [ 11247: 11247] Allocate a new trap: 0xc0081839b0 41 D0323 22:35:23.382718 921384 usertrap_amd64.go:225] [ 11247: 11247] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.392302 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.392628 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.393732 921384 usertrap_amd64.go:212] [ 11247: 11247] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.393849 921384 usertrap_amd64.go:122] [ 11247: 11247] Allocate a new trap: 0xc0081839b0 42 D0323 22:35:23.393884 921384 usertrap_amd64.go:225] [ 11247: 11247] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.394429 921384 task_exit.go:204] [ 11247: 11247] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.394464 921384 task_exit.go:204] [ 11247: 11247] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.394505 921384 task_signals.go:204] [ 11247: 11248] Signal 11247, PID: 11248, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.394554 921384 task_exit.go:204] [ 11247: 11248] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.396692 921384 task_exit.go:204] [ 11247: 11248] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.396758 921384 task_exit.go:204] [ 11247: 11248] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.396802 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.398398 921384 task_exit.go:204] [ 11247: 11247] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x0, 0x0) D0323 22:35:23.405711 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.405938 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.425953 921384 usertrap_amd64.go:212] [ 11249: 11249] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.426035 921384 usertrap_amd64.go:122] [ 11249: 11249] Allocate a new trap: 0xc00592e0f0 39 D0323 22:35:23.426153 921384 usertrap_amd64.go:225] [ 11249: 11249] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.426569 921384 usertrap_amd64.go:212] [ 11249: 11249] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.426591 921384 usertrap_amd64.go:122] [ 11249: 11249] Allocate a new trap: 0xc00592e0f0 40 D0323 22:35:23.426602 921384 usertrap_amd64.go:225] [ 11249: 11249] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.427093 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.427325 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.429712 921384 usertrap_amd64.go:212] [ 11249: 11249] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.429736 921384 usertrap_amd64.go:122] [ 11249: 11249] Allocate a new trap: 0xc00592e0f0 41 D0323 22:35:23.429747 921384 usertrap_amd64.go:225] [ 11249: 11249] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.436045 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.436273 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.436914 921384 usertrap_amd64.go:212] [ 11249: 11249] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.436989 921384 usertrap_amd64.go:122] [ 11249: 11249] Allocate a new trap: 0xc00592e0f0 42 D0323 22:35:23.437008 921384 usertrap_amd64.go:225] [ 11249: 11249] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.437564 921384 task_exit.go:204] [ 11249: 11249] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.437600 921384 task_exit.go:204] [ 11249: 11249] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.437651 921384 task_signals.go:204] [ 11249: 11250] Signal 11249, PID: 11250, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.437682 921384 task_exit.go:204] [ 11249: 11250] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.439389 921384 task_exit.go:204] [ 11249: 11250] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.439466 921384 task_exit.go:204] [ 11249: 11250] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.439496 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.439542 921384 task_exit.go:204] [ 11249: 11249] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x0, 0x0) D0323 22:35:23.440809 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.440903 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.449030 921384 usertrap_amd64.go:212] [ 11251: 11251] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.449054 921384 usertrap_amd64.go:122] [ 11251: 11251] Allocate a new trap: 0xc00592e120 39 D0323 22:35:23.449155 921384 usertrap_amd64.go:225] [ 11251: 11251] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.449611 921384 usertrap_amd64.go:212] [ 11251: 11251] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.449630 921384 usertrap_amd64.go:122] [ 11251: 11251] Allocate a new trap: 0xc00592e120 40 D0323 22:35:23.449641 921384 usertrap_amd64.go:225] [ 11251: 11251] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.450298 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.450465 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.452711 921384 usertrap_amd64.go:212] [ 11251: 11251] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.452738 921384 usertrap_amd64.go:122] [ 11251: 11251] Allocate a new trap: 0xc00592e120 41 D0323 22:35:23.452751 921384 usertrap_amd64.go:225] [ 11251: 11251] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.459732 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.459897 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.460589 921384 usertrap_amd64.go:212] [ 11251: 11251] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.460677 921384 usertrap_amd64.go:122] [ 11251: 11251] Allocate a new trap: 0xc00592e120 42 D0323 22:35:23.460698 921384 usertrap_amd64.go:225] [ 11251: 11251] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.461074 921384 task_exit.go:204] [ 11251: 11251] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.461102 921384 task_exit.go:204] [ 11251: 11251] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.461170 921384 task_signals.go:204] [ 11251: 11252] Signal 11251, PID: 11252, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.461202 921384 task_exit.go:204] [ 11251: 11252] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.462824 921384 task_exit.go:204] [ 11251: 11252] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.462909 921384 task_exit.go:204] [ 11251: 11252] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.462936 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.463324 921384 task_exit.go:204] [ 11251: 11251] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.465468 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.465676 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x68040) syz_open_pts(r0, 0x10000) socketpair(0x1e, 0x4, 0x1fb, 0x0) D0323 22:35:23.479988 921384 usertrap_amd64.go:212] [ 11253: 11253] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.480045 921384 usertrap_amd64.go:122] [ 11253: 11253] Allocate a new trap: 0xc007d64270 39 D0323 22:35:23.480119 921384 usertrap_amd64.go:225] [ 11253: 11253] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.480695 921384 usertrap_amd64.go:212] [ 11253: 11253] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.480711 921384 usertrap_amd64.go:122] [ 11253: 11253] Allocate a new trap: 0xc007d64270 40 D0323 22:35:23.480722 921384 usertrap_amd64.go:225] [ 11253: 11253] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.481163 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.481404 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.488769 921384 usertrap_amd64.go:212] [ 11253: 11253] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.488798 921384 usertrap_amd64.go:122] [ 11253: 11253] Allocate a new trap: 0xc007d64270 41 D0323 22:35:23.488813 921384 usertrap_amd64.go:225] [ 11253: 11253] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.505477 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.506519 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.510417 921384 usertrap_amd64.go:212] [ 11253: 11254] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:23.510459 921384 usertrap_amd64.go:122] [ 11253: 11254] Allocate a new trap: 0xc007d64270 42 D0323 22:35:23.510484 921384 usertrap_amd64.go:225] [ 11253: 11254] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.514510 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.514732 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.520358 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.520632 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.522236 921384 usertrap_amd64.go:212] [ 11253: 11253] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.522340 921384 usertrap_amd64.go:122] [ 11253: 11253] Allocate a new trap: 0xc007d64270 43 D0323 22:35:23.522367 921384 usertrap_amd64.go:225] [ 11253: 11253] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:23.525608 921384 task_exit.go:204] [ 11253: 11253] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.525674 921384 task_exit.go:204] [ 11253: 11253] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.525773 921384 task_signals.go:204] [ 11253: 11254] Signal 11253, PID: 11254, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.525827 921384 task_exit.go:204] [ 11253: 11254] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.528598 921384 task_exit.go:204] [ 11253: 11254] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.528631 921384 task_exit.go:204] [ 11253: 11254] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.528653 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.529674 921384 task_exit.go:204] [ 11253: 11253] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x68040) syz_open_pts(r0, 0x10000) socketpair(0x1e, 0x4, 0x1fb, 0x0) D0323 22:35:23.531302 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.531419 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.542292 921384 usertrap_amd64.go:212] [ 11255: 11255] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.542331 921384 usertrap_amd64.go:122] [ 11255: 11255] Allocate a new trap: 0xc001fc42a0 39 D0323 22:35:23.542445 921384 usertrap_amd64.go:225] [ 11255: 11255] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.543571 921384 usertrap_amd64.go:212] [ 11255: 11255] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.543618 921384 usertrap_amd64.go:122] [ 11255: 11255] Allocate a new trap: 0xc001fc42a0 40 D0323 22:35:23.543636 921384 usertrap_amd64.go:225] [ 11255: 11255] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.544478 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.544753 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.548377 921384 usertrap_amd64.go:212] [ 11255: 11255] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.548402 921384 usertrap_amd64.go:122] [ 11255: 11255] Allocate a new trap: 0xc001fc42a0 41 D0323 22:35:23.548415 921384 usertrap_amd64.go:225] [ 11255: 11255] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.558637 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.558888 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.560328 921384 usertrap_amd64.go:212] [ 11255: 11256] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:23.560359 921384 usertrap_amd64.go:122] [ 11255: 11256] Allocate a new trap: 0xc001fc42a0 42 D0323 22:35:23.560374 921384 usertrap_amd64.go:225] [ 11255: 11256] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.560838 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.560978 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.565506 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.565652 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.566891 921384 usertrap_amd64.go:212] [ 11255: 11255] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.566936 921384 usertrap_amd64.go:122] [ 11255: 11255] Allocate a new trap: 0xc001fc42a0 43 D0323 22:35:23.566956 921384 usertrap_amd64.go:225] [ 11255: 11255] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:23.567670 921384 task_exit.go:204] [ 11255: 11255] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.567713 921384 task_exit.go:204] [ 11255: 11255] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.567814 921384 task_signals.go:204] [ 11255: 11256] Signal 11255, PID: 11256, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.567857 921384 task_exit.go:204] [ 11255: 11256] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.570107 921384 task_exit.go:204] [ 11255: 11256] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.570144 921384 task_exit.go:204] [ 11255: 11256] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.570161 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.570930 921384 task_exit.go:204] [ 11255: 11255] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x68040) syz_open_pts(r0, 0x10000) socketpair(0x1e, 0x4, 0x1fb, 0x0) D0323 22:35:23.575963 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.576086 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.585492 921384 usertrap_amd64.go:212] [ 11257: 11257] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.585567 921384 usertrap_amd64.go:122] [ 11257: 11257] Allocate a new trap: 0xc001fc46f0 39 D0323 22:35:23.585794 921384 usertrap_amd64.go:225] [ 11257: 11257] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.586229 921384 usertrap_amd64.go:212] [ 11257: 11257] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.586451 921384 usertrap_amd64.go:122] [ 11257: 11257] Allocate a new trap: 0xc001fc46f0 40 D0323 22:35:23.586475 921384 usertrap_amd64.go:225] [ 11257: 11257] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.588147 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.588429 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.593881 921384 usertrap_amd64.go:212] [ 11257: 11257] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.593913 921384 usertrap_amd64.go:122] [ 11257: 11257] Allocate a new trap: 0xc001fc46f0 41 D0323 22:35:23.593927 921384 usertrap_amd64.go:225] [ 11257: 11257] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.602806 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.603067 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.604991 921384 usertrap_amd64.go:212] [ 11257: 11258] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:23.605010 921384 usertrap_amd64.go:122] [ 11257: 11258] Allocate a new trap: 0xc001fc46f0 42 D0323 22:35:23.605025 921384 usertrap_amd64.go:225] [ 11257: 11258] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.605515 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.605624 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.610945 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.611091 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.612752 921384 usertrap_amd64.go:212] [ 11257: 11257] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.612785 921384 usertrap_amd64.go:122] [ 11257: 11257] Allocate a new trap: 0xc001fc46f0 43 D0323 22:35:23.612803 921384 usertrap_amd64.go:225] [ 11257: 11257] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:23.613950 921384 task_exit.go:204] [ 11257: 11257] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.614003 921384 task_exit.go:204] [ 11257: 11257] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.614054 921384 task_signals.go:204] [ 11257: 11258] Signal 11257, PID: 11258, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.614085 921384 task_exit.go:204] [ 11257: 11258] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.616177 921384 task_exit.go:204] [ 11257: 11258] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.616203 921384 task_exit.go:204] [ 11257: 11258] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.616224 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.616750 921384 task_exit.go:204] [ 11257: 11257] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x68040) syz_open_pts(r0, 0x10000) D0323 22:35:23.618378 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.618547 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.636394 921384 usertrap_amd64.go:212] [ 11259: 11259] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.636438 921384 usertrap_amd64.go:122] [ 11259: 11259] Allocate a new trap: 0xc007d64390 39 D0323 22:35:23.636563 921384 usertrap_amd64.go:225] [ 11259: 11259] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.637462 921384 usertrap_amd64.go:212] [ 11259: 11259] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.637491 921384 usertrap_amd64.go:122] [ 11259: 11259] Allocate a new trap: 0xc007d64390 40 D0323 22:35:23.637504 921384 usertrap_amd64.go:225] [ 11259: 11259] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.637957 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.638212 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.640369 921384 usertrap_amd64.go:212] [ 11259: 11259] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.640394 921384 usertrap_amd64.go:122] [ 11259: 11259] Allocate a new trap: 0xc007d64390 41 D0323 22:35:23.640405 921384 usertrap_amd64.go:225] [ 11259: 11259] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.649489 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.649856 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.654047 921384 usertrap_amd64.go:212] [ 11259: 11260] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:23.654089 921384 usertrap_amd64.go:122] [ 11259: 11260] Allocate a new trap: 0xc007d64390 42 D0323 22:35:23.654104 921384 usertrap_amd64.go:225] [ 11259: 11260] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.654811 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.654940 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.658790 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.658900 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.659869 921384 usertrap_amd64.go:212] [ 11259: 11259] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.659910 921384 usertrap_amd64.go:122] [ 11259: 11259] Allocate a new trap: 0xc007d64390 43 D0323 22:35:23.659930 921384 usertrap_amd64.go:225] [ 11259: 11259] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:23.662178 921384 task_exit.go:204] [ 11259: 11259] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.662241 921384 task_exit.go:204] [ 11259: 11259] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.662354 921384 task_signals.go:204] [ 11259: 11260] Signal 11259, PID: 11260, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.662394 921384 task_exit.go:204] [ 11259: 11260] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.666279 921384 task_exit.go:204] [ 11259: 11260] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.666326 921384 task_exit.go:204] [ 11259: 11260] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.666352 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.667539 921384 task_exit.go:204] [ 11259: 11259] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.668563 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.668724 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:23.686102 921384 usertrap_amd64.go:212] [ 11261: 11261] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.686147 921384 usertrap_amd64.go:122] [ 11261: 11261] Allocate a new trap: 0xc00592e750 39 D0323 22:35:23.686212 921384 usertrap_amd64.go:225] [ 11261: 11261] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.689247 921384 usertrap_amd64.go:212] [ 11261: 11261] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.689271 921384 usertrap_amd64.go:122] [ 11261: 11261] Allocate a new trap: 0xc00592e750 40 D0323 22:35:23.689284 921384 usertrap_amd64.go:225] [ 11261: 11261] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.690208 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.690515 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.694913 921384 usertrap_amd64.go:212] [ 11261: 11261] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.694936 921384 usertrap_amd64.go:122] [ 11261: 11261] Allocate a new trap: 0xc00592e750 41 D0323 22:35:23.694948 921384 usertrap_amd64.go:225] [ 11261: 11261] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.703344 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.703661 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.706180 921384 usertrap_amd64.go:212] [ 11261: 11262] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:23.706206 921384 usertrap_amd64.go:122] [ 11261: 11262] Allocate a new trap: 0xc00592e750 42 D0323 22:35:23.706219 921384 usertrap_amd64.go:225] [ 11261: 11262] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.706693 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.706827 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.709048 921384 usertrap_amd64.go:212] [ 11261: 11261] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.709111 921384 usertrap_amd64.go:122] [ 11261: 11261] Allocate a new trap: 0xc00592e750 43 D0323 22:35:23.709146 921384 usertrap_amd64.go:225] [ 11261: 11261] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:23.709597 921384 task_exit.go:204] [ 11261: 11261] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.709678 921384 task_exit.go:204] [ 11261: 11261] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.711210 921384 task_signals.go:204] [ 11261: 11262] Signal 11261, PID: 11262, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.711240 921384 task_exit.go:204] [ 11261: 11262] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.711828 921384 task_exit.go:204] [ 11261: 11262] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.711859 921384 task_exit.go:204] [ 11261: 11262] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.711872 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.716990 921384 task_exit.go:204] [ 11261: 11261] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:23.718935 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.719084 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.731969 921384 usertrap_amd64.go:212] [ 11263: 11263] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.732020 921384 usertrap_amd64.go:122] [ 11263: 11263] Allocate a new trap: 0xc00592e7b0 39 D0323 22:35:23.732775 921384 usertrap_amd64.go:225] [ 11263: 11263] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.733515 921384 usertrap_amd64.go:212] [ 11263: 11263] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.733547 921384 usertrap_amd64.go:122] [ 11263: 11263] Allocate a new trap: 0xc00592e7b0 40 D0323 22:35:23.733559 921384 usertrap_amd64.go:225] [ 11263: 11263] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.734410 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.734632 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.739608 921384 usertrap_amd64.go:212] [ 11263: 11263] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.739668 921384 usertrap_amd64.go:122] [ 11263: 11263] Allocate a new trap: 0xc00592e7b0 41 D0323 22:35:23.739685 921384 usertrap_amd64.go:225] [ 11263: 11263] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.747680 921384 usertrap_amd64.go:212] [ 11263: 11263] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.747709 921384 usertrap_amd64.go:122] [ 11263: 11263] Allocate a new trap: 0xc00592e7b0 42 D0323 22:35:23.747726 921384 usertrap_amd64.go:225] [ 11263: 11263] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.749911 921384 task_exit.go:204] [ 11263: 11263] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.750020 921384 task_exit.go:204] [ 11263: 11263] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.750059 921384 task_signals.go:204] [ 11263: 11264] Signal 11263, PID: 11264, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.750101 921384 task_exit.go:204] [ 11263: 11264] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.752602 921384 task_exit.go:204] [ 11263: 11264] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.752666 921384 task_exit.go:204] [ 11263: 11264] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.752692 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.753524 921384 task_exit.go:204] [ 11263: 11263] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:23.755496 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.755715 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.765077 921384 usertrap_amd64.go:212] [ 11265: 11265] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.765118 921384 usertrap_amd64.go:122] [ 11265: 11265] Allocate a new trap: 0xc00592e9f0 39 D0323 22:35:23.765211 921384 usertrap_amd64.go:225] [ 11265: 11265] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.765754 921384 usertrap_amd64.go:212] [ 11265: 11265] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.765781 921384 usertrap_amd64.go:122] [ 11265: 11265] Allocate a new trap: 0xc00592e9f0 40 D0323 22:35:23.765795 921384 usertrap_amd64.go:225] [ 11265: 11265] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.766296 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.766802 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.771252 921384 usertrap_amd64.go:212] [ 11265: 11265] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.771283 921384 usertrap_amd64.go:122] [ 11265: 11265] Allocate a new trap: 0xc00592e9f0 41 D0323 22:35:23.771296 921384 usertrap_amd64.go:225] [ 11265: 11265] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.784293 921384 usertrap_amd64.go:212] [ 11265: 11265] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.784327 921384 usertrap_amd64.go:122] [ 11265: 11265] Allocate a new trap: 0xc00592e9f0 42 D0323 22:35:23.784345 921384 usertrap_amd64.go:225] [ 11265: 11265] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.784807 921384 task_exit.go:204] [ 11265: 11265] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.784885 921384 task_exit.go:204] [ 11265: 11265] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.785004 921384 task_signals.go:204] [ 11265: 11266] Signal 11265, PID: 11266, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.785057 921384 task_exit.go:204] [ 11265: 11266] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.787307 921384 task_exit.go:204] [ 11265: 11266] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.787356 921384 task_exit.go:204] [ 11265: 11266] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.787377 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.787644 921384 task_exit.go:204] [ 11265: 11265] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.789398 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.789606 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:23 executing program 0: syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:23.801591 921384 usertrap_amd64.go:212] [ 11267: 11267] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.801658 921384 usertrap_amd64.go:122] [ 11267: 11267] Allocate a new trap: 0xc007d64630 39 D0323 22:35:23.801744 921384 usertrap_amd64.go:225] [ 11267: 11267] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.803430 921384 usertrap_amd64.go:212] [ 11267: 11267] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.803472 921384 usertrap_amd64.go:122] [ 11267: 11267] Allocate a new trap: 0xc007d64630 40 D0323 22:35:23.803492 921384 usertrap_amd64.go:225] [ 11267: 11267] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.805117 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.805376 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.811867 921384 usertrap_amd64.go:212] [ 11267: 11267] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.811910 921384 usertrap_amd64.go:122] [ 11267: 11267] Allocate a new trap: 0xc007d64630 41 D0323 22:35:23.811929 921384 usertrap_amd64.go:225] [ 11267: 11267] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.821862 921384 usertrap_amd64.go:212] [ 11267: 11267] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.821894 921384 usertrap_amd64.go:122] [ 11267: 11267] Allocate a new trap: 0xc007d64630 42 D0323 22:35:23.821938 921384 usertrap_amd64.go:225] [ 11267: 11267] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.823804 921384 task_exit.go:204] [ 11267: 11267] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.823849 921384 task_exit.go:204] [ 11267: 11267] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.823933 921384 task_signals.go:204] [ 11267: 11268] Signal 11267, PID: 11268, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.823973 921384 task_exit.go:204] [ 11267: 11268] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.826672 921384 task_exit.go:204] [ 11267: 11268] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.826704 921384 task_exit.go:204] [ 11267: 11268] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.826721 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.828244 921384 task_exit.go:204] [ 11267: 11267] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:23.830213 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.830401 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.840772 921384 usertrap_amd64.go:212] [ 11269: 11269] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.840821 921384 usertrap_amd64.go:122] [ 11269: 11269] Allocate a new trap: 0xc000bca300 39 D0323 22:35:23.841002 921384 usertrap_amd64.go:225] [ 11269: 11269] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.843460 921384 usertrap_amd64.go:212] [ 11269: 11269] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.843496 921384 usertrap_amd64.go:122] [ 11269: 11269] Allocate a new trap: 0xc000bca300 40 D0323 22:35:23.843512 921384 usertrap_amd64.go:225] [ 11269: 11269] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.843893 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.844097 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.846993 921384 usertrap_amd64.go:212] [ 11269: 11269] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.847019 921384 usertrap_amd64.go:122] [ 11269: 11269] Allocate a new trap: 0xc000bca300 41 D0323 22:35:23.847030 921384 usertrap_amd64.go:225] [ 11269: 11269] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.856152 921384 usertrap_amd64.go:212] [ 11269: 11269] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.856188 921384 usertrap_amd64.go:122] [ 11269: 11269] Allocate a new trap: 0xc000bca300 42 D0323 22:35:23.856215 921384 usertrap_amd64.go:225] [ 11269: 11269] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.857419 921384 task_exit.go:204] [ 11269: 11269] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.857568 921384 task_exit.go:204] [ 11269: 11269] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.857643 921384 task_signals.go:204] [ 11269: 11270] Signal 11269, PID: 11270, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.857666 921384 task_exit.go:204] [ 11269: 11270] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.859168 921384 task_exit.go:204] [ 11269: 11270] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.859266 921384 task_exit.go:204] [ 11269: 11270] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.859303 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.860143 921384 task_exit.go:204] [ 11269: 11269] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:23.861796 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.862080 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.872763 921384 usertrap_amd64.go:212] [ 11271: 11271] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.872818 921384 usertrap_amd64.go:122] [ 11271: 11271] Allocate a new trap: 0xc000bca660 39 D0323 22:35:23.872925 921384 usertrap_amd64.go:225] [ 11271: 11271] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.873546 921384 usertrap_amd64.go:212] [ 11271: 11271] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.873574 921384 usertrap_amd64.go:122] [ 11271: 11271] Allocate a new trap: 0xc000bca660 40 D0323 22:35:23.873585 921384 usertrap_amd64.go:225] [ 11271: 11271] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.874869 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.875084 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.880150 921384 usertrap_amd64.go:212] [ 11271: 11271] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.880191 921384 usertrap_amd64.go:122] [ 11271: 11271] Allocate a new trap: 0xc000bca660 41 D0323 22:35:23.880207 921384 usertrap_amd64.go:225] [ 11271: 11271] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.890266 921384 usertrap_amd64.go:212] [ 11271: 11271] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.890326 921384 usertrap_amd64.go:122] [ 11271: 11271] Allocate a new trap: 0xc000bca660 42 D0323 22:35:23.890364 921384 usertrap_amd64.go:225] [ 11271: 11271] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.890864 921384 task_exit.go:204] [ 11271: 11271] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.891013 921384 task_exit.go:204] [ 11271: 11271] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.891123 921384 task_signals.go:204] [ 11271: 11272] Signal 11271, PID: 11272, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.891172 921384 task_exit.go:204] [ 11271: 11272] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.892418 921384 task_exit.go:204] [ 11271: 11272] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.892452 921384 task_exit.go:204] [ 11271: 11272] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.892478 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.893852 921384 task_exit.go:204] [ 11271: 11271] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:23.897026 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.897293 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.906203 921384 usertrap_amd64.go:212] [ 11273: 11273] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.906263 921384 usertrap_amd64.go:122] [ 11273: 11273] Allocate a new trap: 0xc007d647e0 39 D0323 22:35:23.906367 921384 usertrap_amd64.go:225] [ 11273: 11273] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.907723 921384 usertrap_amd64.go:212] [ 11273: 11273] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.907776 921384 usertrap_amd64.go:122] [ 11273: 11273] Allocate a new trap: 0xc007d647e0 40 D0323 22:35:23.907792 921384 usertrap_amd64.go:225] [ 11273: 11273] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.911421 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.911684 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.916070 921384 usertrap_amd64.go:212] [ 11273: 11273] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.916093 921384 usertrap_amd64.go:122] [ 11273: 11273] Allocate a new trap: 0xc007d647e0 41 D0323 22:35:23.916109 921384 usertrap_amd64.go:225] [ 11273: 11273] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.924853 921384 usertrap_amd64.go:212] [ 11273: 11273] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.924892 921384 usertrap_amd64.go:122] [ 11273: 11273] Allocate a new trap: 0xc007d647e0 42 D0323 22:35:23.924922 921384 usertrap_amd64.go:225] [ 11273: 11273] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.925605 921384 task_exit.go:204] [ 11273: 11273] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.925646 921384 task_exit.go:204] [ 11273: 11273] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.925773 921384 task_signals.go:204] [ 11273: 11274] Signal 11273, PID: 11274, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.925814 921384 task_exit.go:204] [ 11273: 11274] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.927136 921384 task_exit.go:204] [ 11273: 11274] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.927172 921384 task_exit.go:204] [ 11273: 11274] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.927195 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.928478 921384 task_exit.go:204] [ 11273: 11273] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:23.930518 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.930697 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.945093 921384 usertrap_amd64.go:212] [ 11275: 11275] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.945128 921384 usertrap_amd64.go:122] [ 11275: 11275] Allocate a new trap: 0xc005df6660 39 D0323 22:35:23.945211 921384 usertrap_amd64.go:225] [ 11275: 11275] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.945475 921384 usertrap_amd64.go:212] [ 11275: 11275] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.945486 921384 usertrap_amd64.go:122] [ 11275: 11275] Allocate a new trap: 0xc005df6660 40 D0323 22:35:23.945494 921384 usertrap_amd64.go:225] [ 11275: 11275] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.946311 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.947133 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.949169 921384 usertrap_amd64.go:212] [ 11275: 11275] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.949198 921384 usertrap_amd64.go:122] [ 11275: 11275] Allocate a new trap: 0xc005df6660 41 D0323 22:35:23.949210 921384 usertrap_amd64.go:225] [ 11275: 11275] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.959850 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.960127 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.961608 921384 usertrap_amd64.go:212] [ 11275: 11275] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:23.961635 921384 usertrap_amd64.go:122] [ 11275: 11275] Allocate a new trap: 0xc005df6660 42 D0323 22:35:23.961645 921384 usertrap_amd64.go:225] [ 11275: 11275] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:23.962478 921384 task_exit.go:204] [ 11275: 11275] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.962510 921384 task_exit.go:204] [ 11275: 11275] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.962601 921384 task_signals.go:204] [ 11275: 11276] Signal 11275, PID: 11276, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:23.962635 921384 task_exit.go:204] [ 11275: 11276] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:23.964473 921384 task_exit.go:204] [ 11275: 11276] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:23.964500 921384 task_exit.go:204] [ 11275: 11276] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:23.964520 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:23.964629 921384 task_exit.go:204] [ 11275: 11275] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:23 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:23.968177 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.968387 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.982033 921384 usertrap_amd64.go:212] [ 11277: 11277] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:23.982072 921384 usertrap_amd64.go:122] [ 11277: 11277] Allocate a new trap: 0xc000bca750 39 D0323 22:35:23.982198 921384 usertrap_amd64.go:225] [ 11277: 11277] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:23.982874 921384 usertrap_amd64.go:212] [ 11277: 11277] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:23.982899 921384 usertrap_amd64.go:122] [ 11277: 11277] Allocate a new trap: 0xc000bca750 40 D0323 22:35:23.982911 921384 usertrap_amd64.go:225] [ 11277: 11277] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:23.983501 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:23.983647 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:23.987403 921384 usertrap_amd64.go:212] [ 11277: 11277] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:23.987436 921384 usertrap_amd64.go:122] [ 11277: 11277] Allocate a new trap: 0xc000bca750 41 D0323 22:35:23.987453 921384 usertrap_amd64.go:225] [ 11277: 11277] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:23.998240 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:23.998507 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.003528 921384 usertrap_amd64.go:212] [ 11277: 11277] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.003561 921384 usertrap_amd64.go:122] [ 11277: 11277] Allocate a new trap: 0xc000bca750 42 D0323 22:35:24.003577 921384 usertrap_amd64.go:225] [ 11277: 11277] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.004299 921384 task_exit.go:204] [ 11277: 11277] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.004350 921384 task_exit.go:204] [ 11277: 11277] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.004427 921384 task_signals.go:204] [ 11277: 11278] Signal 11277, PID: 11278, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.004448 921384 task_exit.go:204] [ 11277: 11278] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.006084 921384 task_exit.go:204] [ 11277: 11278] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.006121 921384 task_exit.go:204] [ 11277: 11278] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.006134 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.007057 921384 task_exit.go:204] [ 11277: 11277] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:24.011675 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.011859 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.022111 921384 usertrap_amd64.go:212] [ 11279: 11279] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.022207 921384 usertrap_amd64.go:122] [ 11279: 11279] Allocate a new trap: 0xc007d64a50 39 D0323 22:35:24.022276 921384 usertrap_amd64.go:225] [ 11279: 11279] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.022910 921384 usertrap_amd64.go:212] [ 11279: 11279] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.022939 921384 usertrap_amd64.go:122] [ 11279: 11279] Allocate a new trap: 0xc007d64a50 40 D0323 22:35:24.022952 921384 usertrap_amd64.go:225] [ 11279: 11279] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.023420 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.023608 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.026313 921384 usertrap_amd64.go:212] [ 11279: 11279] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.026337 921384 usertrap_amd64.go:122] [ 11279: 11279] Allocate a new trap: 0xc007d64a50 41 D0323 22:35:24.026350 921384 usertrap_amd64.go:225] [ 11279: 11279] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.035411 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.035579 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.037608 921384 usertrap_amd64.go:212] [ 11279: 11279] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.037641 921384 usertrap_amd64.go:122] [ 11279: 11279] Allocate a new trap: 0xc007d64a50 42 D0323 22:35:24.037658 921384 usertrap_amd64.go:225] [ 11279: 11279] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.038567 921384 task_exit.go:204] [ 11279: 11279] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.038604 921384 task_exit.go:204] [ 11279: 11279] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.038654 921384 task_signals.go:204] [ 11279: 11280] Signal 11279, PID: 11280, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.038674 921384 task_exit.go:204] [ 11279: 11280] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.040511 921384 task_exit.go:204] [ 11279: 11280] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.040541 921384 task_exit.go:204] [ 11279: 11280] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.040561 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.041165 921384 task_exit.go:204] [ 11279: 11279] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:24.045249 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.045752 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.056843 921384 usertrap_amd64.go:212] [ 11281: 11281] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.056883 921384 usertrap_amd64.go:122] [ 11281: 11281] Allocate a new trap: 0xc005df6930 39 D0323 22:35:24.057044 921384 usertrap_amd64.go:225] [ 11281: 11281] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.058547 921384 usertrap_amd64.go:212] [ 11281: 11281] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.058586 921384 usertrap_amd64.go:122] [ 11281: 11281] Allocate a new trap: 0xc005df6930 40 D0323 22:35:24.058601 921384 usertrap_amd64.go:225] [ 11281: 11281] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.059777 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.061191 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.064162 921384 usertrap_amd64.go:212] [ 11281: 11281] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.064194 921384 usertrap_amd64.go:122] [ 11281: 11281] Allocate a new trap: 0xc005df6930 41 D0323 22:35:24.064206 921384 usertrap_amd64.go:225] [ 11281: 11281] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.071278 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.071438 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.072710 921384 usertrap_amd64.go:212] [ 11281: 11282] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.072733 921384 usertrap_amd64.go:122] [ 11281: 11282] Allocate a new trap: 0xc005df6930 42 D0323 22:35:24.072743 921384 usertrap_amd64.go:225] [ 11281: 11282] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.073215 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.073320 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.075998 921384 usertrap_amd64.go:212] [ 11281: 11281] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.076022 921384 usertrap_amd64.go:122] [ 11281: 11281] Allocate a new trap: 0xc005df6930 43 D0323 22:35:24.076034 921384 usertrap_amd64.go:225] [ 11281: 11281] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.076553 921384 task_exit.go:204] [ 11281: 11281] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.076603 921384 task_exit.go:204] [ 11281: 11281] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.076695 921384 task_signals.go:204] [ 11281: 11282] Signal 11281, PID: 11282, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.076731 921384 task_exit.go:204] [ 11281: 11282] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.078422 921384 task_exit.go:204] [ 11281: 11282] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.078462 921384 task_exit.go:204] [ 11281: 11282] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.078478 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.079754 921384 task_exit.go:204] [ 11281: 11281] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:24.080973 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.081094 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.090656 921384 usertrap_amd64.go:212] [ 11283: 11283] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.090698 921384 usertrap_amd64.go:122] [ 11283: 11283] Allocate a new trap: 0xc005df6b70 39 D0323 22:35:24.090803 921384 usertrap_amd64.go:225] [ 11283: 11283] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.091299 921384 usertrap_amd64.go:212] [ 11283: 11283] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.091329 921384 usertrap_amd64.go:122] [ 11283: 11283] Allocate a new trap: 0xc005df6b70 40 D0323 22:35:24.091342 921384 usertrap_amd64.go:225] [ 11283: 11283] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.092597 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.092813 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.094945 921384 usertrap_amd64.go:212] [ 11283: 11283] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.094972 921384 usertrap_amd64.go:122] [ 11283: 11283] Allocate a new trap: 0xc005df6b70 41 D0323 22:35:24.094983 921384 usertrap_amd64.go:225] [ 11283: 11283] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.102162 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.102392 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.103929 921384 usertrap_amd64.go:212] [ 11283: 11284] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.103951 921384 usertrap_amd64.go:122] [ 11283: 11284] Allocate a new trap: 0xc005df6b70 42 D0323 22:35:24.103967 921384 usertrap_amd64.go:225] [ 11283: 11284] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.104979 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.105198 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.108104 921384 usertrap_amd64.go:212] [ 11283: 11283] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.108130 921384 usertrap_amd64.go:122] [ 11283: 11283] Allocate a new trap: 0xc005df6b70 43 D0323 22:35:24.108143 921384 usertrap_amd64.go:225] [ 11283: 11283] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.108724 921384 task_exit.go:204] [ 11283: 11283] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.108762 921384 task_exit.go:204] [ 11283: 11283] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.108817 921384 task_signals.go:204] [ 11283: 11284] Signal 11283, PID: 11284, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.108848 921384 task_exit.go:204] [ 11283: 11284] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.110431 921384 task_exit.go:204] [ 11283: 11284] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.110462 921384 task_exit.go:204] [ 11283: 11284] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.110475 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.111154 921384 task_exit.go:204] [ 11283: 11283] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:24.116125 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.116264 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.133414 921384 usertrap_amd64.go:212] [ 11285: 11285] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.133460 921384 usertrap_amd64.go:122] [ 11285: 11285] Allocate a new trap: 0xc000bcaea0 39 D0323 22:35:24.133585 921384 usertrap_amd64.go:225] [ 11285: 11285] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.134311 921384 usertrap_amd64.go:212] [ 11285: 11285] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.134346 921384 usertrap_amd64.go:122] [ 11285: 11285] Allocate a new trap: 0xc000bcaea0 40 D0323 22:35:24.134360 921384 usertrap_amd64.go:225] [ 11285: 11285] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.135121 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.135360 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.139718 921384 usertrap_amd64.go:212] [ 11285: 11285] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.139746 921384 usertrap_amd64.go:122] [ 11285: 11285] Allocate a new trap: 0xc000bcaea0 41 D0323 22:35:24.139758 921384 usertrap_amd64.go:225] [ 11285: 11285] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.147918 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.148186 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.150211 921384 usertrap_amd64.go:212] [ 11285: 11286] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.150230 921384 usertrap_amd64.go:122] [ 11285: 11286] Allocate a new trap: 0xc000bcaea0 42 D0323 22:35:24.150242 921384 usertrap_amd64.go:225] [ 11285: 11286] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.150726 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.150908 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.153493 921384 usertrap_amd64.go:212] [ 11285: 11285] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.153529 921384 usertrap_amd64.go:122] [ 11285: 11285] Allocate a new trap: 0xc000bcaea0 43 D0323 22:35:24.153542 921384 usertrap_amd64.go:225] [ 11285: 11285] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.154803 921384 task_exit.go:204] [ 11285: 11285] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.154855 921384 task_exit.go:204] [ 11285: 11285] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.154947 921384 task_signals.go:204] [ 11285: 11286] Signal 11285, PID: 11286, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.154980 921384 task_exit.go:204] [ 11285: 11286] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.156728 921384 task_exit.go:204] [ 11285: 11286] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.156763 921384 task_exit.go:204] [ 11285: 11286] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.156785 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.157331 921384 task_exit.go:204] [ 11285: 11285] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.160478 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.160599 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:24.176085 921384 usertrap_amd64.go:212] [ 11287: 11287] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.176113 921384 usertrap_amd64.go:122] [ 11287: 11287] Allocate a new trap: 0xc0021f0660 39 D0323 22:35:24.176385 921384 usertrap_amd64.go:225] [ 11287: 11287] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.177843 921384 usertrap_amd64.go:212] [ 11287: 11287] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.177872 921384 usertrap_amd64.go:122] [ 11287: 11287] Allocate a new trap: 0xc0021f0660 40 D0323 22:35:24.177887 921384 usertrap_amd64.go:225] [ 11287: 11287] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.178859 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.179110 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.183573 921384 usertrap_amd64.go:212] [ 11287: 11287] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.183687 921384 usertrap_amd64.go:122] [ 11287: 11287] Allocate a new trap: 0xc0021f0660 41 D0323 22:35:24.183773 921384 usertrap_amd64.go:225] [ 11287: 11287] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.190120 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.190340 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.192149 921384 usertrap_amd64.go:212] [ 11287: 11288] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.192179 921384 usertrap_amd64.go:122] [ 11287: 11288] Allocate a new trap: 0xc0021f0660 42 D0323 22:35:24.192199 921384 usertrap_amd64.go:225] [ 11287: 11288] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.192760 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.193519 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.196966 921384 usertrap_amd64.go:212] [ 11287: 11287] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.196992 921384 usertrap_amd64.go:122] [ 11287: 11287] Allocate a new trap: 0xc0021f0660 43 D0323 22:35:24.197008 921384 usertrap_amd64.go:225] [ 11287: 11287] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.197544 921384 task_exit.go:204] [ 11287: 11287] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.197600 921384 task_exit.go:204] [ 11287: 11287] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.197745 921384 task_signals.go:204] [ 11287: 11288] Signal 11287, PID: 11288, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.197781 921384 task_exit.go:204] [ 11287: 11288] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.199644 921384 task_exit.go:204] [ 11287: 11288] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.199680 921384 task_exit.go:204] [ 11287: 11288] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.199694 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.200192 921384 task_exit.go:204] [ 11287: 11287] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.201645 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.201773 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:24.214770 921384 usertrap_amd64.go:212] [ 11289: 11289] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.214802 921384 usertrap_amd64.go:122] [ 11289: 11289] Allocate a new trap: 0xc0074f8240 39 D0323 22:35:24.214912 921384 usertrap_amd64.go:225] [ 11289: 11289] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.216338 921384 usertrap_amd64.go:212] [ 11289: 11289] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.216380 921384 usertrap_amd64.go:122] [ 11289: 11289] Allocate a new trap: 0xc0074f8240 40 D0323 22:35:24.216397 921384 usertrap_amd64.go:225] [ 11289: 11289] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.217357 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.217620 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.221495 921384 usertrap_amd64.go:212] [ 11289: 11289] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.221518 921384 usertrap_amd64.go:122] [ 11289: 11289] Allocate a new trap: 0xc0074f8240 41 D0323 22:35:24.221533 921384 usertrap_amd64.go:225] [ 11289: 11289] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.227585 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.227795 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.230381 921384 usertrap_amd64.go:212] [ 11289: 11290] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.230508 921384 usertrap_amd64.go:122] [ 11289: 11290] Allocate a new trap: 0xc0074f8240 42 D0323 22:35:24.230524 921384 usertrap_amd64.go:225] [ 11289: 11290] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.231941 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.232140 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.235263 921384 usertrap_amd64.go:212] [ 11289: 11289] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.235292 921384 usertrap_amd64.go:122] [ 11289: 11289] Allocate a new trap: 0xc0074f8240 43 D0323 22:35:24.235305 921384 usertrap_amd64.go:225] [ 11289: 11289] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.235999 921384 task_exit.go:204] [ 11289: 11289] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.236046 921384 task_exit.go:204] [ 11289: 11289] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.236140 921384 task_signals.go:204] [ 11289: 11290] Signal 11289, PID: 11290, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.236202 921384 task_exit.go:204] [ 11289: 11290] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.238204 921384 task_exit.go:204] [ 11289: 11290] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.238244 921384 task_exit.go:204] [ 11289: 11290] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.238261 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.239003 921384 task_exit.go:204] [ 11289: 11289] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:24.245852 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.246164 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.266829 921384 usertrap_amd64.go:212] [ 11291: 11291] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.266880 921384 usertrap_amd64.go:122] [ 11291: 11291] Allocate a new trap: 0xc000bcb380 39 D0323 22:35:24.267004 921384 usertrap_amd64.go:225] [ 11291: 11291] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.268134 921384 usertrap_amd64.go:212] [ 11291: 11291] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.268223 921384 usertrap_amd64.go:122] [ 11291: 11291] Allocate a new trap: 0xc000bcb380 40 D0323 22:35:24.268269 921384 usertrap_amd64.go:225] [ 11291: 11291] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.269221 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.269577 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.273544 921384 usertrap_amd64.go:212] [ 11291: 11291] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.273626 921384 usertrap_amd64.go:122] [ 11291: 11291] Allocate a new trap: 0xc000bcb380 41 D0323 22:35:24.273661 921384 usertrap_amd64.go:225] [ 11291: 11291] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.281304 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.281562 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.283486 921384 usertrap_amd64.go:212] [ 11291: 11292] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.283512 921384 usertrap_amd64.go:122] [ 11291: 11292] Allocate a new trap: 0xc000bcb380 42 D0323 22:35:24.283523 921384 usertrap_amd64.go:225] [ 11291: 11292] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.283987 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.284710 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.287786 921384 usertrap_amd64.go:212] [ 11291: 11291] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.287818 921384 usertrap_amd64.go:122] [ 11291: 11291] Allocate a new trap: 0xc000bcb380 43 D0323 22:35:24.287830 921384 usertrap_amd64.go:225] [ 11291: 11291] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.288377 921384 task_exit.go:204] [ 11291: 11291] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.288425 921384 task_exit.go:204] [ 11291: 11291] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.288487 921384 task_signals.go:204] [ 11291: 11292] Signal 11291, PID: 11292, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.288514 921384 task_exit.go:204] [ 11291: 11292] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.290838 921384 task_exit.go:204] [ 11291: 11292] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.290881 921384 task_exit.go:204] [ 11291: 11292] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.290903 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.292266 921384 task_exit.go:204] [ 11291: 11291] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:24.296058 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.296255 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.305560 921384 usertrap_amd64.go:212] [ 11293: 11293] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.305590 921384 usertrap_amd64.go:122] [ 11293: 11293] Allocate a new trap: 0xc007d65050 39 D0323 22:35:24.305662 921384 usertrap_amd64.go:225] [ 11293: 11293] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.306360 921384 usertrap_amd64.go:212] [ 11293: 11293] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.306383 921384 usertrap_amd64.go:122] [ 11293: 11293] Allocate a new trap: 0xc007d65050 40 D0323 22:35:24.306396 921384 usertrap_amd64.go:225] [ 11293: 11293] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.307058 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.307218 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.310496 921384 usertrap_amd64.go:212] [ 11293: 11293] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.310537 921384 usertrap_amd64.go:122] [ 11293: 11293] Allocate a new trap: 0xc007d65050 41 D0323 22:35:24.310549 921384 usertrap_amd64.go:225] [ 11293: 11293] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.316465 921384 usertrap_amd64.go:212] [ 11293: 11293] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.316563 921384 usertrap_amd64.go:122] [ 11293: 11293] Allocate a new trap: 0xc007d65050 42 D0323 22:35:24.316624 921384 usertrap_amd64.go:225] [ 11293: 11293] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.317551 921384 task_exit.go:204] [ 11293: 11293] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.317594 921384 task_exit.go:204] [ 11293: 11293] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.317668 921384 task_signals.go:204] [ 11293: 11294] Signal 11293, PID: 11294, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.317696 921384 task_exit.go:204] [ 11293: 11294] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.320819 921384 task_exit.go:204] [ 11293: 11294] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.320852 921384 task_exit.go:204] [ 11293: 11294] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.320868 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.321616 921384 task_exit.go:204] [ 11293: 11293] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:24.323491 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.323705 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.335633 921384 usertrap_amd64.go:212] [ 11295: 11295] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.335667 921384 usertrap_amd64.go:122] [ 11295: 11295] Allocate a new trap: 0xc007d65380 39 D0323 22:35:24.335784 921384 usertrap_amd64.go:225] [ 11295: 11295] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.336646 921384 usertrap_amd64.go:212] [ 11295: 11295] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.336706 921384 usertrap_amd64.go:122] [ 11295: 11295] Allocate a new trap: 0xc007d65380 40 D0323 22:35:24.336725 921384 usertrap_amd64.go:225] [ 11295: 11295] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.337547 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.337773 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.341336 921384 usertrap_amd64.go:212] [ 11295: 11295] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.341364 921384 usertrap_amd64.go:122] [ 11295: 11295] Allocate a new trap: 0xc007d65380 41 D0323 22:35:24.341378 921384 usertrap_amd64.go:225] [ 11295: 11295] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.348455 921384 usertrap_amd64.go:212] [ 11295: 11295] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.348483 921384 usertrap_amd64.go:122] [ 11295: 11295] Allocate a new trap: 0xc007d65380 42 D0323 22:35:24.348497 921384 usertrap_amd64.go:225] [ 11295: 11295] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.349253 921384 task_exit.go:204] [ 11295: 11295] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.349351 921384 task_signals.go:204] [ 11295: 11296] Signal 11295, PID: 11296, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.349380 921384 task_exit.go:204] [ 11295: 11296] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.349433 921384 task_exit.go:204] [ 11295: 11296] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.349443 921384 task_exit.go:204] [ 11295: 11296] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.351445 921384 task_exit.go:204] [ 11295: 11295] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.351496 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.352100 921384 task_exit.go:204] [ 11295: 11295] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:24.354098 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.354325 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.367910 921384 usertrap_amd64.go:212] [ 11297: 11297] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.367935 921384 usertrap_amd64.go:122] [ 11297: 11297] Allocate a new trap: 0xc007d65440 39 D0323 22:35:24.368422 921384 usertrap_amd64.go:225] [ 11297: 11297] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.369546 921384 usertrap_amd64.go:212] [ 11297: 11297] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.369609 921384 usertrap_amd64.go:122] [ 11297: 11297] Allocate a new trap: 0xc007d65440 40 D0323 22:35:24.369630 921384 usertrap_amd64.go:225] [ 11297: 11297] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.371096 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.371356 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.377756 921384 usertrap_amd64.go:212] [ 11297: 11297] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.377847 921384 usertrap_amd64.go:122] [ 11297: 11297] Allocate a new trap: 0xc007d65440 41 D0323 22:35:24.377895 921384 usertrap_amd64.go:225] [ 11297: 11297] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.384216 921384 usertrap_amd64.go:212] [ 11297: 11297] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.384253 921384 usertrap_amd64.go:122] [ 11297: 11297] Allocate a new trap: 0xc007d65440 42 D0323 22:35:24.384271 921384 usertrap_amd64.go:225] [ 11297: 11297] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.384844 921384 task_exit.go:204] [ 11297: 11297] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.384892 921384 task_exit.go:204] [ 11297: 11297] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.384996 921384 task_signals.go:204] [ 11297: 11298] Signal 11297, PID: 11298, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.385029 921384 task_exit.go:204] [ 11297: 11298] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.386585 921384 task_exit.go:204] [ 11297: 11298] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.386622 921384 task_exit.go:204] [ 11297: 11298] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.386640 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.387249 921384 task_exit.go:204] [ 11297: 11297] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:24.389771 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.389927 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.399421 921384 usertrap_amd64.go:212] [ 11299: 11299] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.399456 921384 usertrap_amd64.go:122] [ 11299: 11299] Allocate a new trap: 0xc007d65500 39 D0323 22:35:24.399562 921384 usertrap_amd64.go:225] [ 11299: 11299] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.400454 921384 usertrap_amd64.go:212] [ 11299: 11299] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.400483 921384 usertrap_amd64.go:122] [ 11299: 11299] Allocate a new trap: 0xc007d65500 40 D0323 22:35:24.400494 921384 usertrap_amd64.go:225] [ 11299: 11299] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.401164 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.401455 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.405295 921384 usertrap_amd64.go:212] [ 11299: 11299] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.405394 921384 usertrap_amd64.go:122] [ 11299: 11299] Allocate a new trap: 0xc007d65500 41 D0323 22:35:24.405425 921384 usertrap_amd64.go:225] [ 11299: 11299] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.415094 921384 usertrap_amd64.go:212] [ 11299: 11299] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.415163 921384 usertrap_amd64.go:122] [ 11299: 11299] Allocate a new trap: 0xc007d65500 42 D0323 22:35:24.415185 921384 usertrap_amd64.go:225] [ 11299: 11299] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.415884 921384 task_exit.go:204] [ 11299: 11299] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.415942 921384 task_exit.go:204] [ 11299: 11299] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.416095 921384 task_signals.go:204] [ 11299: 11300] Signal 11299, PID: 11300, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.416220 921384 task_exit.go:204] [ 11299: 11300] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.418571 921384 task_exit.go:204] [ 11299: 11300] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.418608 921384 task_exit.go:204] [ 11299: 11300] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.418629 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.420033 921384 task_exit.go:204] [ 11299: 11299] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:24.421789 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.421995 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.431360 921384 usertrap_amd64.go:212] [ 11301: 11301] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.431418 921384 usertrap_amd64.go:122] [ 11301: 11301] Allocate a new trap: 0xc005df6f60 39 D0323 22:35:24.432049 921384 usertrap_amd64.go:225] [ 11301: 11301] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.432930 921384 usertrap_amd64.go:212] [ 11301: 11301] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.432995 921384 usertrap_amd64.go:122] [ 11301: 11301] Allocate a new trap: 0xc005df6f60 40 D0323 22:35:24.433010 921384 usertrap_amd64.go:225] [ 11301: 11301] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.434116 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.434405 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.437817 921384 usertrap_amd64.go:212] [ 11301: 11301] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.437863 921384 usertrap_amd64.go:122] [ 11301: 11301] Allocate a new trap: 0xc005df6f60 41 D0323 22:35:24.437882 921384 usertrap_amd64.go:225] [ 11301: 11301] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.444284 921384 usertrap_amd64.go:212] [ 11301: 11301] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.444346 921384 usertrap_amd64.go:122] [ 11301: 11301] Allocate a new trap: 0xc005df6f60 42 D0323 22:35:24.444365 921384 usertrap_amd64.go:225] [ 11301: 11301] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.445212 921384 task_exit.go:204] [ 11301: 11301] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.445261 921384 task_exit.go:204] [ 11301: 11301] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.445342 921384 task_signals.go:204] [ 11301: 11302] Signal 11301, PID: 11302, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.445401 921384 task_exit.go:204] [ 11301: 11302] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.446868 921384 task_exit.go:204] [ 11301: 11302] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.446901 921384 task_exit.go:204] [ 11301: 11302] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.446914 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.447407 921384 task_exit.go:204] [ 11301: 11301] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x10000) D0323 22:35:24.450904 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.451281 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.462026 921384 usertrap_amd64.go:212] [ 11303: 11303] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.462154 921384 usertrap_amd64.go:122] [ 11303: 11303] Allocate a new trap: 0xc008f80990 39 D0323 22:35:24.462239 921384 usertrap_amd64.go:225] [ 11303: 11303] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.463172 921384 usertrap_amd64.go:212] [ 11303: 11303] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.463257 921384 usertrap_amd64.go:122] [ 11303: 11303] Allocate a new trap: 0xc008f80990 40 D0323 22:35:24.463316 921384 usertrap_amd64.go:225] [ 11303: 11303] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.464138 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.464493 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.470373 921384 usertrap_amd64.go:212] [ 11303: 11303] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.470400 921384 usertrap_amd64.go:122] [ 11303: 11303] Allocate a new trap: 0xc008f80990 41 D0323 22:35:24.470415 921384 usertrap_amd64.go:225] [ 11303: 11303] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.480316 921384 usertrap_amd64.go:212] [ 11303: 11303] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.480364 921384 usertrap_amd64.go:122] [ 11303: 11303] Allocate a new trap: 0xc008f80990 42 D0323 22:35:24.480393 921384 usertrap_amd64.go:225] [ 11303: 11303] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.481202 921384 task_exit.go:204] [ 11303: 11303] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.481286 921384 task_exit.go:204] [ 11303: 11303] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.481400 921384 task_signals.go:204] [ 11303: 11304] Signal 11303, PID: 11304, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.481445 921384 task_exit.go:204] [ 11303: 11304] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.483595 921384 task_exit.go:204] [ 11303: 11304] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.483630 921384 task_exit.go:204] [ 11303: 11304] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.483651 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.484791 921384 task_exit.go:204] [ 11303: 11303] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:24.486615 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.486780 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.497617 921384 usertrap_amd64.go:212] [ 11305: 11305] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.497658 921384 usertrap_amd64.go:122] [ 11305: 11305] Allocate a new trap: 0xc007d65710 39 D0323 22:35:24.497782 921384 usertrap_amd64.go:225] [ 11305: 11305] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.498436 921384 usertrap_amd64.go:212] [ 11305: 11305] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.498467 921384 usertrap_amd64.go:122] [ 11305: 11305] Allocate a new trap: 0xc007d65710 40 D0323 22:35:24.498482 921384 usertrap_amd64.go:225] [ 11305: 11305] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.499011 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.499315 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.503275 921384 usertrap_amd64.go:212] [ 11305: 11305] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.503369 921384 usertrap_amd64.go:122] [ 11305: 11305] Allocate a new trap: 0xc007d65710 41 D0323 22:35:24.503431 921384 usertrap_amd64.go:225] [ 11305: 11305] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.512567 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.512804 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.514783 921384 usertrap_amd64.go:212] [ 11305: 11305] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.514806 921384 usertrap_amd64.go:122] [ 11305: 11305] Allocate a new trap: 0xc007d65710 42 D0323 22:35:24.514823 921384 usertrap_amd64.go:225] [ 11305: 11305] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.515430 921384 task_exit.go:204] [ 11305: 11305] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.515471 921384 task_exit.go:204] [ 11305: 11305] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.515571 921384 task_signals.go:204] [ 11305: 11306] Signal 11305, PID: 11306, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.515605 921384 task_exit.go:204] [ 11305: 11306] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.517209 921384 task_exit.go:204] [ 11305: 11306] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.517255 921384 task_exit.go:204] [ 11305: 11306] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.517282 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.518351 921384 task_exit.go:204] [ 11305: 11305] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:24.519712 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.519832 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.530031 921384 usertrap_amd64.go:212] [ 11307: 11307] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.530053 921384 usertrap_amd64.go:122] [ 11307: 11307] Allocate a new trap: 0xc008f80c30 39 D0323 22:35:24.530153 921384 usertrap_amd64.go:225] [ 11307: 11307] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.530922 921384 usertrap_amd64.go:212] [ 11307: 11307] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.530949 921384 usertrap_amd64.go:122] [ 11307: 11307] Allocate a new trap: 0xc008f80c30 40 D0323 22:35:24.530959 921384 usertrap_amd64.go:225] [ 11307: 11307] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.531513 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.531706 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.534031 921384 usertrap_amd64.go:212] [ 11307: 11307] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.534056 921384 usertrap_amd64.go:122] [ 11307: 11307] Allocate a new trap: 0xc008f80c30 41 D0323 22:35:24.534066 921384 usertrap_amd64.go:225] [ 11307: 11307] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.542669 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.542913 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.544814 921384 usertrap_amd64.go:212] [ 11307: 11307] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.544868 921384 usertrap_amd64.go:122] [ 11307: 11307] Allocate a new trap: 0xc008f80c30 42 D0323 22:35:24.544891 921384 usertrap_amd64.go:225] [ 11307: 11307] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.545366 921384 task_exit.go:204] [ 11307: 11307] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.545409 921384 task_exit.go:204] [ 11307: 11307] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.545471 921384 task_signals.go:204] [ 11307: 11308] Signal 11307, PID: 11308, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.545497 921384 task_exit.go:204] [ 11307: 11308] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.547119 921384 task_exit.go:204] [ 11307: 11308] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.547151 921384 task_exit.go:204] [ 11307: 11308] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.547164 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.548727 921384 task_exit.go:204] [ 11307: 11307] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x10000) D0323 22:35:24.549929 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.550043 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.562001 921384 usertrap_amd64.go:212] [ 11309: 11309] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.562038 921384 usertrap_amd64.go:122] [ 11309: 11309] Allocate a new trap: 0xc0021f0cf0 39 D0323 22:35:24.562208 921384 usertrap_amd64.go:225] [ 11309: 11309] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.562959 921384 usertrap_amd64.go:212] [ 11309: 11309] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.562989 921384 usertrap_amd64.go:122] [ 11309: 11309] Allocate a new trap: 0xc0021f0cf0 40 D0323 22:35:24.563003 921384 usertrap_amd64.go:225] [ 11309: 11309] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.563685 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.563850 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.566453 921384 usertrap_amd64.go:212] [ 11309: 11309] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.566484 921384 usertrap_amd64.go:122] [ 11309: 11309] Allocate a new trap: 0xc0021f0cf0 41 D0323 22:35:24.566497 921384 usertrap_amd64.go:225] [ 11309: 11309] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.575117 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.575336 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.577169 921384 usertrap_amd64.go:212] [ 11309: 11309] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.577194 921384 usertrap_amd64.go:122] [ 11309: 11309] Allocate a new trap: 0xc0021f0cf0 42 D0323 22:35:24.577204 921384 usertrap_amd64.go:225] [ 11309: 11309] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.577829 921384 task_exit.go:204] [ 11309: 11309] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.577882 921384 task_exit.go:204] [ 11309: 11309] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.577953 921384 task_signals.go:204] [ 11309: 11310] Signal 11309, PID: 11310, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.577996 921384 task_exit.go:204] [ 11309: 11310] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.579239 921384 task_exit.go:204] [ 11309: 11310] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.579272 921384 task_exit.go:204] [ 11309: 11310] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.579284 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.580463 921384 task_exit.go:204] [ 11309: 11309] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:24.582248 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.582416 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.589216 921384 usertrap_amd64.go:212] [ 11311: 11311] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.589254 921384 usertrap_amd64.go:122] [ 11311: 11311] Allocate a new trap: 0xc000bcb9e0 39 D0323 22:35:24.589380 921384 usertrap_amd64.go:225] [ 11311: 11311] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.589802 921384 usertrap_amd64.go:212] [ 11311: 11311] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.589824 921384 usertrap_amd64.go:122] [ 11311: 11311] Allocate a new trap: 0xc000bcb9e0 40 D0323 22:35:24.589834 921384 usertrap_amd64.go:225] [ 11311: 11311] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.590296 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.590501 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.592919 921384 usertrap_amd64.go:212] [ 11311: 11311] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.592972 921384 usertrap_amd64.go:122] [ 11311: 11311] Allocate a new trap: 0xc000bcb9e0 41 D0323 22:35:24.592984 921384 usertrap_amd64.go:225] [ 11311: 11311] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.601051 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.603413 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.605189 921384 usertrap_amd64.go:212] [ 11311: 11312] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.605217 921384 usertrap_amd64.go:122] [ 11311: 11312] Allocate a new trap: 0xc000bcb9e0 42 D0323 22:35:24.605227 921384 usertrap_amd64.go:225] [ 11311: 11312] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.605757 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.605870 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.608174 921384 usertrap_amd64.go:212] [ 11311: 11311] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.608197 921384 usertrap_amd64.go:122] [ 11311: 11311] Allocate a new trap: 0xc000bcb9e0 43 D0323 22:35:24.608205 921384 usertrap_amd64.go:225] [ 11311: 11311] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.608638 921384 task_exit.go:204] [ 11311: 11311] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.608675 921384 task_exit.go:204] [ 11311: 11311] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.608733 921384 task_signals.go:204] [ 11311: 11312] Signal 11311, PID: 11312, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.608761 921384 task_exit.go:204] [ 11311: 11312] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.610594 921384 task_exit.go:204] [ 11311: 11312] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.610628 921384 task_exit.go:204] [ 11311: 11312] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.610643 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.611573 921384 task_exit.go:204] [ 11311: 11311] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:24.612799 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.612978 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.621715 921384 usertrap_amd64.go:212] [ 11313: 11313] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.621760 921384 usertrap_amd64.go:122] [ 11313: 11313] Allocate a new trap: 0xc000bcbaa0 39 D0323 22:35:24.621880 921384 usertrap_amd64.go:225] [ 11313: 11313] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.622443 921384 usertrap_amd64.go:212] [ 11313: 11313] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.622469 921384 usertrap_amd64.go:122] [ 11313: 11313] Allocate a new trap: 0xc000bcbaa0 40 D0323 22:35:24.622481 921384 usertrap_amd64.go:225] [ 11313: 11313] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.622854 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.622994 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.625255 921384 usertrap_amd64.go:212] [ 11313: 11313] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.625269 921384 usertrap_amd64.go:122] [ 11313: 11313] Allocate a new trap: 0xc000bcbaa0 41 D0323 22:35:24.625277 921384 usertrap_amd64.go:225] [ 11313: 11313] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.631531 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.631700 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.633808 921384 usertrap_amd64.go:212] [ 11313: 11314] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.633848 921384 usertrap_amd64.go:122] [ 11313: 11314] Allocate a new trap: 0xc000bcbaa0 42 D0323 22:35:24.633864 921384 usertrap_amd64.go:225] [ 11313: 11314] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.634571 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.634736 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.637361 921384 usertrap_amd64.go:212] [ 11313: 11313] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.637390 921384 usertrap_amd64.go:122] [ 11313: 11313] Allocate a new trap: 0xc000bcbaa0 43 D0323 22:35:24.637402 921384 usertrap_amd64.go:225] [ 11313: 11313] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.638663 921384 task_exit.go:204] [ 11313: 11313] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.638702 921384 task_exit.go:204] [ 11313: 11313] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.638744 921384 task_signals.go:204] [ 11313: 11314] Signal 11313, PID: 11314, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.638779 921384 task_exit.go:204] [ 11313: 11314] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.640376 921384 task_exit.go:204] [ 11313: 11314] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.640413 921384 task_exit.go:204] [ 11313: 11314] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.640427 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.641309 921384 task_exit.go:204] [ 11313: 11313] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:24.647272 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.647432 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.655501 921384 usertrap_amd64.go:212] [ 11315: 11315] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.655525 921384 usertrap_amd64.go:122] [ 11315: 11315] Allocate a new trap: 0xc001fc5170 39 D0323 22:35:24.655613 921384 usertrap_amd64.go:225] [ 11315: 11315] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.656379 921384 usertrap_amd64.go:212] [ 11315: 11315] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.656407 921384 usertrap_amd64.go:122] [ 11315: 11315] Allocate a new trap: 0xc001fc5170 40 D0323 22:35:24.656418 921384 usertrap_amd64.go:225] [ 11315: 11315] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.657194 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.657420 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.660563 921384 usertrap_amd64.go:212] [ 11315: 11315] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.660591 921384 usertrap_amd64.go:122] [ 11315: 11315] Allocate a new trap: 0xc001fc5170 41 D0323 22:35:24.660603 921384 usertrap_amd64.go:225] [ 11315: 11315] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.666755 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.666960 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.668430 921384 usertrap_amd64.go:212] [ 11315: 11316] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.668458 921384 usertrap_amd64.go:122] [ 11315: 11316] Allocate a new trap: 0xc001fc5170 42 D0323 22:35:24.668472 921384 usertrap_amd64.go:225] [ 11315: 11316] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.669240 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.669392 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.671464 921384 usertrap_amd64.go:212] [ 11315: 11315] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.671487 921384 usertrap_amd64.go:122] [ 11315: 11315] Allocate a new trap: 0xc001fc5170 43 D0323 22:35:24.671497 921384 usertrap_amd64.go:225] [ 11315: 11315] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.671960 921384 task_exit.go:204] [ 11315: 11315] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.671995 921384 task_exit.go:204] [ 11315: 11315] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.672019 921384 task_signals.go:204] [ 11315: 11316] Signal 11315, PID: 11316, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.672052 921384 task_exit.go:204] [ 11315: 11316] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.673639 921384 task_exit.go:204] [ 11315: 11316] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.673666 921384 task_exit.go:204] [ 11315: 11316] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.673679 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.674893 921384 task_exit.go:204] [ 11315: 11315] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.678394 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.679088 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x68040) syz_open_pts(r0, 0x10000) D0323 22:35:24.695028 921384 usertrap_amd64.go:212] [ 11317: 11317] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.695059 921384 usertrap_amd64.go:122] [ 11317: 11317] Allocate a new trap: 0xc007d65dd0 39 D0323 22:35:24.695347 921384 usertrap_amd64.go:225] [ 11317: 11317] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.696141 921384 usertrap_amd64.go:212] [ 11317: 11317] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.696167 921384 usertrap_amd64.go:122] [ 11317: 11317] Allocate a new trap: 0xc007d65dd0 40 D0323 22:35:24.696181 921384 usertrap_amd64.go:225] [ 11317: 11317] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.697228 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.697450 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.702435 921384 usertrap_amd64.go:212] [ 11317: 11317] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.702468 921384 usertrap_amd64.go:122] [ 11317: 11317] Allocate a new trap: 0xc007d65dd0 41 D0323 22:35:24.702482 921384 usertrap_amd64.go:225] [ 11317: 11317] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.711103 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.711340 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.712838 921384 usertrap_amd64.go:212] [ 11317: 11318] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.712860 921384 usertrap_amd64.go:122] [ 11317: 11318] Allocate a new trap: 0xc007d65dd0 42 D0323 22:35:24.712870 921384 usertrap_amd64.go:225] [ 11317: 11318] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.713426 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.713538 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.717331 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.717419 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.717884 921384 usertrap_amd64.go:212] [ 11317: 11317] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.717912 921384 usertrap_amd64.go:122] [ 11317: 11317] Allocate a new trap: 0xc007d65dd0 43 D0323 22:35:24.717923 921384 usertrap_amd64.go:225] [ 11317: 11317] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.718361 921384 task_exit.go:204] [ 11317: 11317] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.718405 921384 task_exit.go:204] [ 11317: 11317] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.718504 921384 task_signals.go:204] [ 11317: 11318] Signal 11317, PID: 11318, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.718531 921384 task_exit.go:204] [ 11317: 11318] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.720145 921384 task_exit.go:204] [ 11317: 11318] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.720177 921384 task_exit.go:204] [ 11317: 11318] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.720196 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.720777 921384 task_exit.go:204] [ 11317: 11317] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x68040) syz_open_pts(r0, 0x10000) D0323 22:35:24.729406 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.729663 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.740050 921384 usertrap_amd64.go:212] [ 11319: 11319] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.740084 921384 usertrap_amd64.go:122] [ 11319: 11319] Allocate a new trap: 0xc000bcbce0 39 D0323 22:35:24.740180 921384 usertrap_amd64.go:225] [ 11319: 11319] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.740734 921384 usertrap_amd64.go:212] [ 11319: 11319] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.740759 921384 usertrap_amd64.go:122] [ 11319: 11319] Allocate a new trap: 0xc000bcbce0 40 D0323 22:35:24.740781 921384 usertrap_amd64.go:225] [ 11319: 11319] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.741231 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.741410 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.743862 921384 usertrap_amd64.go:212] [ 11319: 11319] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.743931 921384 usertrap_amd64.go:122] [ 11319: 11319] Allocate a new trap: 0xc000bcbce0 41 D0323 22:35:24.743957 921384 usertrap_amd64.go:225] [ 11319: 11319] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.749433 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.749687 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.751283 921384 usertrap_amd64.go:212] [ 11319: 11320] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.751300 921384 usertrap_amd64.go:122] [ 11319: 11320] Allocate a new trap: 0xc000bcbce0 42 D0323 22:35:24.751311 921384 usertrap_amd64.go:225] [ 11319: 11320] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.751824 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.751966 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.755681 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.755777 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.756612 921384 usertrap_amd64.go:212] [ 11319: 11319] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.756641 921384 usertrap_amd64.go:122] [ 11319: 11319] Allocate a new trap: 0xc000bcbce0 43 D0323 22:35:24.756652 921384 usertrap_amd64.go:225] [ 11319: 11319] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.757573 921384 task_exit.go:204] [ 11319: 11319] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.757612 921384 task_exit.go:204] [ 11319: 11319] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.757659 921384 task_signals.go:204] [ 11319: 11320] Signal 11319, PID: 11320, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.757711 921384 task_exit.go:204] [ 11319: 11320] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.759265 921384 task_exit.go:204] [ 11319: 11320] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.759289 921384 task_exit.go:204] [ 11319: 11320] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.759308 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.760196 921384 task_exit.go:204] [ 11319: 11319] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x68040) syz_open_pts(r0, 0x10000) D0323 22:35:24.761002 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.761132 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.768795 921384 usertrap_amd64.go:212] [ 11321: 11321] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.768821 921384 usertrap_amd64.go:122] [ 11321: 11321] Allocate a new trap: 0xc001fc5440 39 D0323 22:35:24.768909 921384 usertrap_amd64.go:225] [ 11321: 11321] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.769361 921384 usertrap_amd64.go:212] [ 11321: 11321] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.769381 921384 usertrap_amd64.go:122] [ 11321: 11321] Allocate a new trap: 0xc001fc5440 40 D0323 22:35:24.769394 921384 usertrap_amd64.go:225] [ 11321: 11321] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.770225 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.770417 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.772246 921384 usertrap_amd64.go:212] [ 11321: 11321] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.772268 921384 usertrap_amd64.go:122] [ 11321: 11321] Allocate a new trap: 0xc001fc5440 41 D0323 22:35:24.772278 921384 usertrap_amd64.go:225] [ 11321: 11321] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.779630 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.779801 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.781105 921384 usertrap_amd64.go:212] [ 11321: 11322] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.781131 921384 usertrap_amd64.go:122] [ 11321: 11322] Allocate a new trap: 0xc001fc5440 42 D0323 22:35:24.781139 921384 usertrap_amd64.go:225] [ 11321: 11322] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.781489 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.781567 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.784187 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.784285 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.784840 921384 usertrap_amd64.go:212] [ 11321: 11321] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.784868 921384 usertrap_amd64.go:122] [ 11321: 11321] Allocate a new trap: 0xc001fc5440 43 D0323 22:35:24.784878 921384 usertrap_amd64.go:225] [ 11321: 11321] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.785357 921384 task_exit.go:204] [ 11321: 11321] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.785389 921384 task_exit.go:204] [ 11321: 11321] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.785482 921384 task_signals.go:204] [ 11321: 11322] Signal 11321, PID: 11322, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.785531 921384 task_exit.go:204] [ 11321: 11322] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.788199 921384 task_exit.go:204] [ 11321: 11322] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.788232 921384 task_exit.go:204] [ 11321: 11322] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.788247 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.788548 921384 task_exit.go:204] [ 11321: 11321] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x68040) D0323 22:35:24.793233 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.793345 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.799655 921384 usertrap_amd64.go:212] [ 11323: 11323] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.799684 921384 usertrap_amd64.go:122] [ 11323: 11323] Allocate a new trap: 0xc005df7770 39 D0323 22:35:24.799769 921384 usertrap_amd64.go:225] [ 11323: 11323] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.800656 921384 usertrap_amd64.go:212] [ 11323: 11323] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.800683 921384 usertrap_amd64.go:122] [ 11323: 11323] Allocate a new trap: 0xc005df7770 40 D0323 22:35:24.800692 921384 usertrap_amd64.go:225] [ 11323: 11323] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.801100 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.801264 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.803637 921384 usertrap_amd64.go:212] [ 11323: 11323] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.803658 921384 usertrap_amd64.go:122] [ 11323: 11323] Allocate a new trap: 0xc005df7770 41 D0323 22:35:24.803691 921384 usertrap_amd64.go:225] [ 11323: 11323] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.809834 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.809981 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.811211 921384 usertrap_amd64.go:212] [ 11323: 11324] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:24.811233 921384 usertrap_amd64.go:122] [ 11323: 11324] Allocate a new trap: 0xc005df7770 42 D0323 22:35:24.811244 921384 usertrap_amd64.go:225] [ 11323: 11324] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.811790 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.811866 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.813796 921384 usertrap_amd64.go:212] [ 11323: 11323] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.813823 921384 usertrap_amd64.go:122] [ 11323: 11323] Allocate a new trap: 0xc005df7770 43 D0323 22:35:24.813840 921384 usertrap_amd64.go:225] [ 11323: 11323] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:24.814418 921384 task_exit.go:204] [ 11323: 11323] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.814452 921384 task_exit.go:204] [ 11323: 11323] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.814466 921384 task_signals.go:204] [ 11323: 11324] Signal 11323, PID: 11324, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.814490 921384 task_exit.go:204] [ 11323: 11324] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.816170 921384 task_exit.go:204] [ 11323: 11324] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.816192 921384 task_exit.go:204] [ 11323: 11324] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.816207 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.817050 921384 task_exit.go:204] [ 11323: 11323] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: syz_open_pts(0xffffffffffffffff, 0x68040) D0323 22:35:24.822017 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.822151 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.829270 921384 usertrap_amd64.go:212] [ 11325: 11325] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.829304 921384 usertrap_amd64.go:122] [ 11325: 11325] Allocate a new trap: 0xc001fc56e0 39 D0323 22:35:24.829410 921384 usertrap_amd64.go:225] [ 11325: 11325] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.829823 921384 usertrap_amd64.go:212] [ 11325: 11325] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.829846 921384 usertrap_amd64.go:122] [ 11325: 11325] Allocate a new trap: 0xc001fc56e0 40 D0323 22:35:24.829863 921384 usertrap_amd64.go:225] [ 11325: 11325] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.831073 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.831199 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.833766 921384 usertrap_amd64.go:212] [ 11325: 11325] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.833793 921384 usertrap_amd64.go:122] [ 11325: 11325] Allocate a new trap: 0xc001fc56e0 41 D0323 22:35:24.833804 921384 usertrap_amd64.go:225] [ 11325: 11325] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.843315 921384 usertrap_amd64.go:212] [ 11325: 11325] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.843344 921384 usertrap_amd64.go:122] [ 11325: 11325] Allocate a new trap: 0xc001fc56e0 42 D0323 22:35:24.843358 921384 usertrap_amd64.go:225] [ 11325: 11325] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.843715 921384 task_exit.go:204] [ 11325: 11325] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.843789 921384 task_exit.go:204] [ 11325: 11325] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.843941 921384 task_signals.go:204] [ 11325: 11326] Signal 11325, PID: 11326, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.844006 921384 task_exit.go:204] [ 11325: 11326] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.845245 921384 task_exit.go:204] [ 11325: 11326] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.845275 921384 task_exit.go:204] [ 11325: 11326] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.845290 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.846318 921384 task_exit.go:204] [ 11325: 11325] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: syz_open_pts(0xffffffffffffffff, 0x68040) D0323 22:35:24.847182 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.847331 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.857711 921384 usertrap_amd64.go:212] [ 11327: 11327] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.857765 921384 usertrap_amd64.go:122] [ 11327: 11327] Allocate a new trap: 0xc0021f1110 39 D0323 22:35:24.857886 921384 usertrap_amd64.go:225] [ 11327: 11327] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.858260 921384 usertrap_amd64.go:212] [ 11327: 11327] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.858275 921384 usertrap_amd64.go:122] [ 11327: 11327] Allocate a new trap: 0xc0021f1110 40 D0323 22:35:24.858283 921384 usertrap_amd64.go:225] [ 11327: 11327] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.858885 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.859123 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.861202 921384 usertrap_amd64.go:212] [ 11327: 11327] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.861229 921384 usertrap_amd64.go:122] [ 11327: 11327] Allocate a new trap: 0xc0021f1110 41 D0323 22:35:24.861239 921384 usertrap_amd64.go:225] [ 11327: 11327] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.872290 921384 usertrap_amd64.go:212] [ 11327: 11327] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.872320 921384 usertrap_amd64.go:122] [ 11327: 11327] Allocate a new trap: 0xc0021f1110 42 D0323 22:35:24.872330 921384 usertrap_amd64.go:225] [ 11327: 11327] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.872755 921384 task_exit.go:204] [ 11327: 11327] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.872791 921384 task_exit.go:204] [ 11327: 11327] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.872824 921384 task_signals.go:204] [ 11327: 11328] Signal 11327, PID: 11328, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.872905 921384 task_exit.go:204] [ 11327: 11328] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.874883 921384 task_exit.go:204] [ 11327: 11328] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.874914 921384 task_exit.go:204] [ 11327: 11328] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.874928 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.875593 921384 task_exit.go:204] [ 11327: 11327] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: syz_open_pts(0xffffffffffffffff, 0x68040) D0323 22:35:24.889910 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.890094 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.901452 921384 usertrap_amd64.go:212] [ 11329: 11329] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.901483 921384 usertrap_amd64.go:122] [ 11329: 11329] Allocate a new trap: 0xc0021f1140 39 D0323 22:35:24.901593 921384 usertrap_amd64.go:225] [ 11329: 11329] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.902172 921384 usertrap_amd64.go:212] [ 11329: 11329] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.902203 921384 usertrap_amd64.go:122] [ 11329: 11329] Allocate a new trap: 0xc0021f1140 40 D0323 22:35:24.902217 921384 usertrap_amd64.go:225] [ 11329: 11329] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.902642 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.902828 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.904758 921384 usertrap_amd64.go:212] [ 11329: 11329] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.904787 921384 usertrap_amd64.go:122] [ 11329: 11329] Allocate a new trap: 0xc0021f1140 41 D0323 22:35:24.904799 921384 usertrap_amd64.go:225] [ 11329: 11329] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.914860 921384 usertrap_amd64.go:212] [ 11329: 11329] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.914885 921384 usertrap_amd64.go:122] [ 11329: 11329] Allocate a new trap: 0xc0021f1140 42 D0323 22:35:24.914896 921384 usertrap_amd64.go:225] [ 11329: 11329] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.915296 921384 task_exit.go:204] [ 11329: 11329] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.915341 921384 task_exit.go:204] [ 11329: 11329] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.915412 921384 task_signals.go:204] [ 11329: 11330] Signal 11329, PID: 11330, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.915446 921384 task_exit.go:204] [ 11329: 11330] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.918453 921384 task_exit.go:204] [ 11329: 11330] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.918469 921384 task_exit.go:204] [ 11329: 11330] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.918480 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.920250 921384 task_exit.go:204] [ 11329: 11329] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x68040) D0323 22:35:24.921748 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.921974 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.932913 921384 usertrap_amd64.go:212] [ 11331: 11331] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.932985 921384 usertrap_amd64.go:122] [ 11331: 11331] Allocate a new trap: 0xc001fc59e0 39 D0323 22:35:24.933076 921384 usertrap_amd64.go:225] [ 11331: 11331] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.933615 921384 usertrap_amd64.go:212] [ 11331: 11331] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.933658 921384 usertrap_amd64.go:122] [ 11331: 11331] Allocate a new trap: 0xc001fc59e0 40 D0323 22:35:24.933692 921384 usertrap_amd64.go:225] [ 11331: 11331] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.934455 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.934653 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.938598 921384 usertrap_amd64.go:212] [ 11331: 11331] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.938630 921384 usertrap_amd64.go:122] [ 11331: 11331] Allocate a new trap: 0xc001fc59e0 41 D0323 22:35:24.938643 921384 usertrap_amd64.go:225] [ 11331: 11331] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.948301 921384 usertrap_amd64.go:212] [ 11331: 11331] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.948332 921384 usertrap_amd64.go:122] [ 11331: 11331] Allocate a new trap: 0xc001fc59e0 42 D0323 22:35:24.948346 921384 usertrap_amd64.go:225] [ 11331: 11331] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.948934 921384 task_exit.go:204] [ 11331: 11331] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.949003 921384 task_exit.go:204] [ 11331: 11331] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.949081 921384 task_signals.go:204] [ 11331: 11332] Signal 11331, PID: 11332, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.949116 921384 task_exit.go:204] [ 11331: 11332] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.950679 921384 task_exit.go:204] [ 11331: 11332] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.950774 921384 task_exit.go:204] [ 11331: 11332] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.950796 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.951590 921384 task_exit.go:204] [ 11331: 11331] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x68040) D0323 22:35:24.953079 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.953227 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.965719 921384 usertrap_amd64.go:212] [ 11333: 11333] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.965753 921384 usertrap_amd64.go:122] [ 11333: 11333] Allocate a new trap: 0xc009b5e120 39 D0323 22:35:24.965868 921384 usertrap_amd64.go:225] [ 11333: 11333] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.966727 921384 usertrap_amd64.go:212] [ 11333: 11333] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.966755 921384 usertrap_amd64.go:122] [ 11333: 11333] Allocate a new trap: 0xc009b5e120 40 D0323 22:35:24.966766 921384 usertrap_amd64.go:225] [ 11333: 11333] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.967828 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.968053 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.970496 921384 usertrap_amd64.go:212] [ 11333: 11333] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.970524 921384 usertrap_amd64.go:122] [ 11333: 11333] Allocate a new trap: 0xc009b5e120 41 D0323 22:35:24.970540 921384 usertrap_amd64.go:225] [ 11333: 11333] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:24.980769 921384 usertrap_amd64.go:212] [ 11333: 11333] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:24.980826 921384 usertrap_amd64.go:122] [ 11333: 11333] Allocate a new trap: 0xc009b5e120 42 D0323 22:35:24.980847 921384 usertrap_amd64.go:225] [ 11333: 11333] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:24.981261 921384 task_exit.go:204] [ 11333: 11333] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.981319 921384 task_exit.go:204] [ 11333: 11333] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.981373 921384 task_signals.go:204] [ 11333: 11334] Signal 11333, PID: 11334, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:24.981412 921384 task_exit.go:204] [ 11333: 11334] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:24.983106 921384 task_exit.go:204] [ 11333: 11334] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:24.983139 921384 task_exit.go:204] [ 11333: 11334] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.983156 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:24.983977 921384 task_exit.go:204] [ 11333: 11333] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:24.985675 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:24.985859 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(r0, 0x68040) D0323 22:35:24.994222 921384 usertrap_amd64.go:212] [ 11335: 11335] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:24.994241 921384 usertrap_amd64.go:122] [ 11335: 11335] Allocate a new trap: 0xc0021f1290 39 D0323 22:35:24.994306 921384 usertrap_amd64.go:225] [ 11335: 11335] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:24.994843 921384 usertrap_amd64.go:212] [ 11335: 11335] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:24.994918 921384 usertrap_amd64.go:122] [ 11335: 11335] Allocate a new trap: 0xc0021f1290 40 D0323 22:35:24.994964 921384 usertrap_amd64.go:225] [ 11335: 11335] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:24.995297 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:24.995486 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:24.996961 921384 usertrap_amd64.go:212] [ 11335: 11335] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:24.996988 921384 usertrap_amd64.go:122] [ 11335: 11335] Allocate a new trap: 0xc0021f1290 41 D0323 22:35:24.997000 921384 usertrap_amd64.go:225] [ 11335: 11335] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.006736 921384 usertrap_amd64.go:212] [ 11335: 11335] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.006764 921384 usertrap_amd64.go:122] [ 11335: 11335] Allocate a new trap: 0xc0021f1290 42 D0323 22:35:25.006773 921384 usertrap_amd64.go:225] [ 11335: 11335] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.007239 921384 task_exit.go:204] [ 11335: 11335] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.007266 921384 task_exit.go:204] [ 11335: 11335] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.007327 921384 task_signals.go:204] [ 11335: 11336] Signal 11335, PID: 11336, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.007367 921384 task_exit.go:204] [ 11335: 11336] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.008777 921384 task_exit.go:204] [ 11335: 11336] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.008819 921384 task_exit.go:204] [ 11335: 11336] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.008836 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.010217 921384 task_exit.go:204] [ 11335: 11335] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x68040) D0323 22:35:25.011168 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.011321 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.019351 921384 usertrap_amd64.go:212] [ 11337: 11337] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.019375 921384 usertrap_amd64.go:122] [ 11337: 11337] Allocate a new trap: 0xc008cdc0f0 39 D0323 22:35:25.019439 921384 usertrap_amd64.go:225] [ 11337: 11337] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.020644 921384 usertrap_amd64.go:212] [ 11337: 11337] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.020670 921384 usertrap_amd64.go:122] [ 11337: 11337] Allocate a new trap: 0xc008cdc0f0 40 D0323 22:35:25.020678 921384 usertrap_amd64.go:225] [ 11337: 11337] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.021060 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.021242 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.023190 921384 usertrap_amd64.go:212] [ 11337: 11337] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.023288 921384 usertrap_amd64.go:122] [ 11337: 11337] Allocate a new trap: 0xc008cdc0f0 41 D0323 22:35:25.023311 921384 usertrap_amd64.go:225] [ 11337: 11337] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.034225 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.034423 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.035737 921384 usertrap_amd64.go:212] [ 11337: 11337] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.035768 921384 usertrap_amd64.go:122] [ 11337: 11337] Allocate a new trap: 0xc008cdc0f0 42 D0323 22:35:25.035779 921384 usertrap_amd64.go:225] [ 11337: 11337] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.036229 921384 task_exit.go:204] [ 11337: 11337] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.036263 921384 task_exit.go:204] [ 11337: 11337] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.036319 921384 task_signals.go:204] [ 11337: 11338] Signal 11337, PID: 11338, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.036356 921384 task_exit.go:204] [ 11337: 11338] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.037776 921384 task_exit.go:204] [ 11337: 11338] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.037818 921384 task_exit.go:204] [ 11337: 11338] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.037833 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.037892 921384 task_exit.go:204] [ 11337: 11337] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x68040) D0323 22:35:25.041132 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.041292 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.053916 921384 usertrap_amd64.go:212] [ 11339: 11339] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.053949 921384 usertrap_amd64.go:122] [ 11339: 11339] Allocate a new trap: 0xc009b5e270 39 D0323 22:35:25.054044 921384 usertrap_amd64.go:225] [ 11339: 11339] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.054662 921384 usertrap_amd64.go:212] [ 11339: 11339] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.054683 921384 usertrap_amd64.go:122] [ 11339: 11339] Allocate a new trap: 0xc009b5e270 40 D0323 22:35:25.054693 921384 usertrap_amd64.go:225] [ 11339: 11339] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.055059 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.055246 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.057272 921384 usertrap_amd64.go:212] [ 11339: 11339] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.057299 921384 usertrap_amd64.go:122] [ 11339: 11339] Allocate a new trap: 0xc009b5e270 41 D0323 22:35:25.057313 921384 usertrap_amd64.go:225] [ 11339: 11339] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.063239 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.063535 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.065030 921384 usertrap_amd64.go:212] [ 11339: 11339] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.065080 921384 usertrap_amd64.go:122] [ 11339: 11339] Allocate a new trap: 0xc009b5e270 42 D0323 22:35:25.065097 921384 usertrap_amd64.go:225] [ 11339: 11339] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.065715 921384 task_exit.go:204] [ 11339: 11339] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.065751 921384 task_exit.go:204] [ 11339: 11339] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.065813 921384 task_signals.go:204] [ 11339: 11340] Signal 11339, PID: 11340, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.065847 921384 task_exit.go:204] [ 11339: 11340] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.069027 921384 task_exit.go:204] [ 11339: 11340] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.069140 921384 task_exit.go:204] [ 11339: 11340] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.069204 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.070351 921384 task_exit.go:204] [ 11339: 11339] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x68040) D0323 22:35:25.071534 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.071738 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.079427 921384 usertrap_amd64.go:212] [ 11341: 11341] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.079461 921384 usertrap_amd64.go:122] [ 11341: 11341] Allocate a new trap: 0xc00592ec00 39 D0323 22:35:25.079550 921384 usertrap_amd64.go:225] [ 11341: 11341] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.079996 921384 usertrap_amd64.go:212] [ 11341: 11341] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.080021 921384 usertrap_amd64.go:122] [ 11341: 11341] Allocate a new trap: 0xc00592ec00 40 D0323 22:35:25.080033 921384 usertrap_amd64.go:225] [ 11341: 11341] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.080384 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.080548 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.082353 921384 usertrap_amd64.go:212] [ 11341: 11341] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.082375 921384 usertrap_amd64.go:122] [ 11341: 11341] Allocate a new trap: 0xc00592ec00 41 D0323 22:35:25.082384 921384 usertrap_amd64.go:225] [ 11341: 11341] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.089061 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.089296 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.091085 921384 usertrap_amd64.go:212] [ 11341: 11341] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.091137 921384 usertrap_amd64.go:122] [ 11341: 11341] Allocate a new trap: 0xc00592ec00 42 D0323 22:35:25.091154 921384 usertrap_amd64.go:225] [ 11341: 11341] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.091575 921384 task_exit.go:204] [ 11341: 11341] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.091618 921384 task_exit.go:204] [ 11341: 11341] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.092225 921384 task_signals.go:204] [ 11341: 11342] Signal 11341, PID: 11342, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.092262 921384 task_exit.go:204] [ 11341: 11342] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.094741 921384 task_exit.go:204] [ 11341: 11342] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.094777 921384 task_exit.go:204] [ 11341: 11342] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.094792 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.095850 921384 task_exit.go:204] [ 11341: 11341] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:25.106073 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.106239 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.118147 921384 usertrap_amd64.go:212] [ 11343: 11343] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.118207 921384 usertrap_amd64.go:122] [ 11343: 11343] Allocate a new trap: 0xc0074f8d20 39 D0323 22:35:25.118357 921384 usertrap_amd64.go:225] [ 11343: 11343] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.119141 921384 usertrap_amd64.go:212] [ 11343: 11343] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.119170 921384 usertrap_amd64.go:122] [ 11343: 11343] Allocate a new trap: 0xc0074f8d20 40 D0323 22:35:25.119183 921384 usertrap_amd64.go:225] [ 11343: 11343] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.119978 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.120205 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.122389 921384 usertrap_amd64.go:212] [ 11343: 11343] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.122424 921384 usertrap_amd64.go:122] [ 11343: 11343] Allocate a new trap: 0xc0074f8d20 41 D0323 22:35:25.122440 921384 usertrap_amd64.go:225] [ 11343: 11343] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.130592 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.130950 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.132354 921384 usertrap_amd64.go:212] [ 11343: 11344] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.132380 921384 usertrap_amd64.go:122] [ 11343: 11344] Allocate a new trap: 0xc0074f8d20 42 D0323 22:35:25.132393 921384 usertrap_amd64.go:225] [ 11343: 11344] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.132877 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.133023 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.135812 921384 usertrap_amd64.go:212] [ 11343: 11343] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.135839 921384 usertrap_amd64.go:122] [ 11343: 11343] Allocate a new trap: 0xc0074f8d20 43 D0323 22:35:25.135854 921384 usertrap_amd64.go:225] [ 11343: 11343] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.136269 921384 task_exit.go:204] [ 11343: 11343] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.136311 921384 task_exit.go:204] [ 11343: 11343] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.136380 921384 task_signals.go:204] [ 11343: 11344] Signal 11343, PID: 11344, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.136420 921384 task_exit.go:204] [ 11343: 11344] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.137869 921384 task_exit.go:204] [ 11343: 11344] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.137898 921384 task_exit.go:204] [ 11343: 11344] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.137924 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.139023 921384 task_exit.go:204] [ 11343: 11343] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.140023 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.140143 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2d668565657a657220"], 0x9) socket$inet_udp(0x2, 0x2, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:25.157945 921384 usertrap_amd64.go:212] [ 11345: 11345] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.157992 921384 usertrap_amd64.go:122] [ 11345: 11345] Allocate a new trap: 0xc009b5e570 39 D0323 22:35:25.158128 921384 usertrap_amd64.go:225] [ 11345: 11345] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.158937 921384 usertrap_amd64.go:212] [ 11345: 11345] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.158971 921384 usertrap_amd64.go:122] [ 11345: 11345] Allocate a new trap: 0xc009b5e570 40 D0323 22:35:25.158983 921384 usertrap_amd64.go:225] [ 11345: 11345] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.159538 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.159765 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.163287 921384 usertrap_amd64.go:212] [ 11345: 11345] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.163309 921384 usertrap_amd64.go:122] [ 11345: 11345] Allocate a new trap: 0xc009b5e570 41 D0323 22:35:25.163325 921384 usertrap_amd64.go:225] [ 11345: 11345] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.177043 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.177729 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.179165 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.179304 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.181718 921384 usertrap_amd64.go:212] [ 11345: 11346] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.181750 921384 usertrap_amd64.go:122] [ 11345: 11346] Allocate a new trap: 0xc009b5e570 42 D0323 22:35:25.181766 921384 usertrap_amd64.go:225] [ 11345: 11346] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.182464 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.182651 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.185078 921384 usertrap_amd64.go:212] [ 11345: 11345] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.185113 921384 usertrap_amd64.go:122] [ 11345: 11345] Allocate a new trap: 0xc009b5e570 43 D0323 22:35:25.185130 921384 usertrap_amd64.go:225] [ 11345: 11345] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.185726 921384 task_exit.go:204] [ 11345: 11345] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.185761 921384 task_exit.go:204] [ 11345: 11345] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.185841 921384 task_signals.go:204] [ 11345: 11346] Signal 11345, PID: 11346, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.185897 921384 task_exit.go:204] [ 11345: 11346] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.187831 921384 task_exit.go:204] [ 11345: 11346] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.187869 921384 task_exit.go:204] [ 11345: 11346] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.187884 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.189229 921384 task_exit.go:204] [ 11345: 11345] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2d668565657a657220"], 0x9) socket$inet_udp(0x2, 0x2, 0x0) syz_open_pts(r0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2d668565657a657220"], 0x9) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) syz_open_pts(r0, 0x0) (async) D0323 22:35:25.190659 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.190763 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.201726 921384 usertrap_amd64.go:212] [ 11347: 11347] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.201751 921384 usertrap_amd64.go:122] [ 11347: 11347] Allocate a new trap: 0xc0021f15f0 39 D0323 22:35:25.201841 921384 usertrap_amd64.go:225] [ 11347: 11347] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.202481 921384 usertrap_amd64.go:212] [ 11347: 11347] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.202495 921384 usertrap_amd64.go:122] [ 11347: 11347] Allocate a new trap: 0xc0021f15f0 40 D0323 22:35:25.202505 921384 usertrap_amd64.go:225] [ 11347: 11347] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.202937 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.203114 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.206600 921384 usertrap_amd64.go:212] [ 11347: 11347] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.206625 921384 usertrap_amd64.go:122] [ 11347: 11347] Allocate a new trap: 0xc0021f15f0 41 D0323 22:35:25.206636 921384 usertrap_amd64.go:225] [ 11347: 11347] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.212194 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.212351 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.212713 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.212870 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.213926 921384 usertrap_amd64.go:212] [ 11347: 11348] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.213946 921384 usertrap_amd64.go:122] [ 11347: 11348] Allocate a new trap: 0xc0021f15f0 42 D0323 22:35:25.213960 921384 usertrap_amd64.go:225] [ 11347: 11348] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.214314 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.214455 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.215533 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.215623 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.217044 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.217108 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.218395 921384 usertrap_amd64.go:212] [ 11347: 11347] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:25.218416 921384 usertrap_amd64.go:122] [ 11347: 11347] Allocate a new trap: 0xc0021f15f0 43 D0323 22:35:25.218429 921384 usertrap_amd64.go:225] [ 11347: 11347] Apply the binary patch addr 5650abb02e1a trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.224533 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.224686 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.225767 921384 usertrap_amd64.go:212] [ 11347: 11347] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.225799 921384 usertrap_amd64.go:122] [ 11347: 11347] Allocate a new trap: 0xc0021f15f0 44 D0323 22:35:25.225812 921384 usertrap_amd64.go:225] [ 11347: 11347] Apply the binary patch addr 5650aba8ffa4 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0323 22:35:25.226241 921384 task_exit.go:204] [ 11347: 11347] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.226287 921384 task_exit.go:204] [ 11347: 11347] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.226741 921384 task_signals.go:204] [ 11347: 11349] Signal 11347, PID: 11349, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.226765 921384 task_exit.go:204] [ 11347: 11349] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.226785 921384 task_exit.go:204] [ 11347: 11349] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.226799 921384 task_exit.go:204] [ 11347: 11349] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.226826 921384 task_signals.go:204] [ 11347: 11350] Signal 11347, PID: 11350, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.226841 921384 task_exit.go:204] [ 11347: 11350] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.226850 921384 task_exit.go:204] [ 11347: 11350] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.226856 921384 task_exit.go:204] [ 11347: 11350] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.226916 921384 task_signals.go:204] [ 11347: 11348] Signal 11347, PID: 11348, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.226967 921384 task_exit.go:204] [ 11347: 11348] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.231617 921384 task_exit.go:204] [ 11347: 11348] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.231658 921384 task_exit.go:204] [ 11347: 11348] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.231672 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2d668565657a657220"], 0x9) socket$inet_udp(0x2, 0x2, 0x0) syz_open_pts(r0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2000, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2d668565657a657220"], 0x9) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) syz_open_pts(r0, 0x0) (async) D0323 22:35:25.233041 921384 task_exit.go:204] [ 11347: 11347] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.237563 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.237763 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.248129 921384 usertrap_amd64.go:212] [ 11351: 11351] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.248158 921384 usertrap_amd64.go:122] [ 11351: 11351] Allocate a new trap: 0xc0080702a0 39 D0323 22:35:25.248275 921384 usertrap_amd64.go:225] [ 11351: 11351] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.248833 921384 usertrap_amd64.go:212] [ 11351: 11351] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.248853 921384 usertrap_amd64.go:122] [ 11351: 11351] Allocate a new trap: 0xc0080702a0 40 D0323 22:35:25.248861 921384 usertrap_amd64.go:225] [ 11351: 11351] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.249402 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.249572 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.253613 921384 usertrap_amd64.go:212] [ 11351: 11351] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.253648 921384 usertrap_amd64.go:122] [ 11351: 11351] Allocate a new trap: 0xc0080702a0 41 D0323 22:35:25.253664 921384 usertrap_amd64.go:225] [ 11351: 11351] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.258205 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.258711 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.259073 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.259178 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.259830 921384 usertrap_amd64.go:212] [ 11351: 11352] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.259859 921384 usertrap_amd64.go:122] [ 11351: 11352] Allocate a new trap: 0xc0080702a0 42 D0323 22:35:25.259874 921384 usertrap_amd64.go:225] [ 11351: 11352] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.260164 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.260398 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.261489 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.261599 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.264313 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.264750 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.266506 921384 usertrap_amd64.go:212] [ 11351: 11351] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:25.266569 921384 usertrap_amd64.go:122] [ 11351: 11351] Allocate a new trap: 0xc0080702a0 43 D0323 22:35:25.266589 921384 usertrap_amd64.go:225] [ 11351: 11351] Apply the binary patch addr 5650abb02e1a trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.269276 921384 task_signals.go:470] [ 7: 17] Notified of signal 23 D0323 22:35:25.269648 921384 task_signals.go:220] [ 7: 17] Signal 23: delivering to handler D0323 22:35:25.271365 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.271558 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.272427 921384 usertrap_amd64.go:212] [ 11351: 11351] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.272453 921384 usertrap_amd64.go:122] [ 11351: 11351] Allocate a new trap: 0xc0080702a0 44 D0323 22:35:25.272466 921384 usertrap_amd64.go:225] [ 11351: 11351] Apply the binary patch addr 5650aba8ffa4 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0323 22:35:25.273173 921384 task_exit.go:204] [ 11351: 11351] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.273212 921384 task_signals.go:204] [ 11351: 11354] Signal 11351, PID: 11354, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.273212 921384 task_signals.go:204] [ 11351: 11352] Signal 11351, PID: 11352, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.273227 921384 task_exit.go:204] [ 11351: 11354] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.273275 921384 task_signals.go:204] [ 11351: 11353] Signal 11351, PID: 11353, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.273302 921384 task_exit.go:204] [ 11351: 11351] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.273389 921384 task_exit.go:204] [ 11351: 11354] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.273415 921384 task_exit.go:204] [ 11351: 11354] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.273447 921384 task_exit.go:204] [ 11351: 11353] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.273463 921384 task_exit.go:204] [ 11351: 11353] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.273470 921384 task_exit.go:204] [ 11351: 11353] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.273489 921384 task_exit.go:204] [ 11351: 11352] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.277598 921384 task_exit.go:204] [ 11351: 11352] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.277629 921384 task_exit.go:204] [ 11351: 11352] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.277653 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.278476 921384 task_exit.go:204] [ 11351: 11351] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x20482) D0323 22:35:25.279956 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.280518 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.289560 921384 usertrap_amd64.go:212] [ 11355: 11355] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.289597 921384 usertrap_amd64.go:122] [ 11355: 11355] Allocate a new trap: 0xc008cdc450 39 D0323 22:35:25.289722 921384 usertrap_amd64.go:225] [ 11355: 11355] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.290811 921384 usertrap_amd64.go:212] [ 11355: 11355] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.290838 921384 usertrap_amd64.go:122] [ 11355: 11355] Allocate a new trap: 0xc008cdc450 40 D0323 22:35:25.290850 921384 usertrap_amd64.go:225] [ 11355: 11355] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.291675 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.291855 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.294283 921384 usertrap_amd64.go:212] [ 11355: 11355] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.294312 921384 usertrap_amd64.go:122] [ 11355: 11355] Allocate a new trap: 0xc008cdc450 41 D0323 22:35:25.294327 921384 usertrap_amd64.go:225] [ 11355: 11355] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.302860 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.303356 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.305113 921384 usertrap_amd64.go:212] [ 11355: 11356] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.305199 921384 usertrap_amd64.go:122] [ 11355: 11356] Allocate a new trap: 0xc008cdc450 42 D0323 22:35:25.305227 921384 usertrap_amd64.go:225] [ 11355: 11356] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.306329 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.306536 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.308696 921384 usertrap_amd64.go:212] [ 11355: 11355] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.308727 921384 usertrap_amd64.go:122] [ 11355: 11355] Allocate a new trap: 0xc008cdc450 43 D0323 22:35:25.308745 921384 usertrap_amd64.go:225] [ 11355: 11355] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.309884 921384 task_exit.go:204] [ 11355: 11355] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.309924 921384 task_exit.go:204] [ 11355: 11355] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.310000 921384 task_signals.go:204] [ 11355: 11356] Signal 11355, PID: 11356, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.310025 921384 task_exit.go:204] [ 11355: 11356] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.314461 921384 task_exit.go:204] [ 11355: 11356] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.314546 921384 task_exit.go:204] [ 11355: 11356] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.314566 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.315194 921384 task_exit.go:204] [ 11355: 11355] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x20482) D0323 22:35:25.320735 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.320982 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.333502 921384 usertrap_amd64.go:212] [ 11357: 11357] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.333543 921384 usertrap_amd64.go:122] [ 11357: 11357] Allocate a new trap: 0xc0080704b0 39 D0323 22:35:25.333615 921384 usertrap_amd64.go:225] [ 11357: 11357] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.333892 921384 usertrap_amd64.go:212] [ 11357: 11357] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.333925 921384 usertrap_amd64.go:122] [ 11357: 11357] Allocate a new trap: 0xc0080704b0 40 D0323 22:35:25.333935 921384 usertrap_amd64.go:225] [ 11357: 11357] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.334380 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.334671 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.337559 921384 usertrap_amd64.go:212] [ 11357: 11357] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.337588 921384 usertrap_amd64.go:122] [ 11357: 11357] Allocate a new trap: 0xc0080704b0 41 D0323 22:35:25.337601 921384 usertrap_amd64.go:225] [ 11357: 11357] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.341822 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.342057 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.342682 921384 usertrap_amd64.go:212] [ 11357: 11358] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.342723 921384 usertrap_amd64.go:122] [ 11357: 11358] Allocate a new trap: 0xc0080704b0 42 D0323 22:35:25.342742 921384 usertrap_amd64.go:225] [ 11357: 11358] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.342986 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.343634 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.344661 921384 usertrap_amd64.go:212] [ 11357: 11357] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.344688 921384 usertrap_amd64.go:122] [ 11357: 11357] Allocate a new trap: 0xc0080704b0 43 D0323 22:35:25.344700 921384 usertrap_amd64.go:225] [ 11357: 11357] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.345127 921384 task_exit.go:204] [ 11357: 11357] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.345163 921384 task_exit.go:204] [ 11357: 11357] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.345258 921384 task_signals.go:204] [ 11357: 11358] Signal 11357, PID: 11358, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.345309 921384 task_exit.go:204] [ 11357: 11358] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.347338 921384 task_exit.go:204] [ 11357: 11358] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.347359 921384 task_exit.go:204] [ 11357: 11358] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.347379 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.348377 921384 task_exit.go:204] [ 11357: 11357] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x20482) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) syz_open_pts(r0, 0x20482) (async) D0323 22:35:25.354110 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.354271 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.364079 921384 usertrap_amd64.go:212] [ 11359: 11359] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.364138 921384 usertrap_amd64.go:122] [ 11359: 11359] Allocate a new trap: 0xc0021f1980 39 D0323 22:35:25.364279 921384 usertrap_amd64.go:225] [ 11359: 11359] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.364779 921384 usertrap_amd64.go:212] [ 11359: 11359] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.364805 921384 usertrap_amd64.go:122] [ 11359: 11359] Allocate a new trap: 0xc0021f1980 40 D0323 22:35:25.364812 921384 usertrap_amd64.go:225] [ 11359: 11359] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.365354 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.365594 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.368436 921384 usertrap_amd64.go:212] [ 11359: 11359] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.368466 921384 usertrap_amd64.go:122] [ 11359: 11359] Allocate a new trap: 0xc0021f1980 41 D0323 22:35:25.368483 921384 usertrap_amd64.go:225] [ 11359: 11359] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.374938 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.375168 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.375532 921384 usertrap_amd64.go:212] [ 11359: 11360] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.375552 921384 usertrap_amd64.go:122] [ 11359: 11360] Allocate a new trap: 0xc0021f1980 42 D0323 22:35:25.375563 921384 usertrap_amd64.go:225] [ 11359: 11360] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.375805 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.375984 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.378380 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.378605 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.381055 921384 usertrap_amd64.go:212] [ 11359: 11359] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:25.381088 921384 usertrap_amd64.go:122] [ 11359: 11359] Allocate a new trap: 0xc0021f1980 43 D0323 22:35:25.381103 921384 usertrap_amd64.go:225] [ 11359: 11359] Apply the binary patch addr 5650abb02e1a trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.389711 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.390094 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.391244 921384 usertrap_amd64.go:212] [ 11359: 11359] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.391276 921384 usertrap_amd64.go:122] [ 11359: 11359] Allocate a new trap: 0xc0021f1980 44 D0323 22:35:25.391291 921384 usertrap_amd64.go:225] [ 11359: 11359] Apply the binary patch addr 5650aba8ffa4 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0323 22:35:25.392051 921384 task_exit.go:204] [ 11359: 11359] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.392097 921384 task_exit.go:204] [ 11359: 11359] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.392167 921384 task_signals.go:204] [ 11359: 11360] Signal 11359, PID: 11360, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.392204 921384 task_exit.go:204] [ 11359: 11360] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.392229 921384 task_exit.go:204] [ 11359: 11360] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.392236 921384 task_exit.go:204] [ 11359: 11360] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.392200 921384 task_signals.go:204] [ 11359: 11361] Signal 11359, PID: 11361, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.392262 921384 task_exit.go:204] [ 11359: 11361] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.394768 921384 task_exit.go:204] [ 11359: 11361] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.394815 921384 task_exit.go:204] [ 11359: 11361] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.394837 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.395557 921384 task_exit.go:204] [ 11359: 11359] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.396295 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.397087 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:25 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RSTAT(r3, 0x0, 0x0) bind$packet(r3, &(0x7f0000000100)={0x11, 0x2, 0x0, 0x1, 0x3, 0x6, @broadcast}, 0x14) write$yama_ptrace_scope(r2, &(0x7f00000000c0)='2\x00', 0x2) ioctl$TIOCSBRK(r3, 0x5427) syz_open_pts(r1, 0x0) D0323 22:35:25.409386 921384 usertrap_amd64.go:212] [ 11362: 11362] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.409423 921384 usertrap_amd64.go:122] [ 11362: 11362] Allocate a new trap: 0xc008070750 39 D0323 22:35:25.409543 921384 usertrap_amd64.go:225] [ 11362: 11362] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.410848 921384 usertrap_amd64.go:212] [ 11362: 11362] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.410880 921384 usertrap_amd64.go:122] [ 11362: 11362] Allocate a new trap: 0xc008070750 40 D0323 22:35:25.410896 921384 usertrap_amd64.go:225] [ 11362: 11362] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.412720 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.412979 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.414959 921384 usertrap_amd64.go:212] [ 11362: 11362] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.414988 921384 usertrap_amd64.go:122] [ 11362: 11362] Allocate a new trap: 0xc008070750 41 D0323 22:35:25.415000 921384 usertrap_amd64.go:225] [ 11362: 11362] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.423545 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.423741 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.425581 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.425744 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.427861 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.427983 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.432891 921384 usertrap_amd64.go:212] [ 11362: 11363] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.432924 921384 usertrap_amd64.go:122] [ 11362: 11363] Allocate a new trap: 0xc008070750 42 D0323 22:35:25.432936 921384 usertrap_amd64.go:225] [ 11362: 11363] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.433602 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.433761 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.436748 921384 usertrap_amd64.go:212] [ 11362: 11362] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.436800 921384 usertrap_amd64.go:122] [ 11362: 11362] Allocate a new trap: 0xc008070750 43 D0323 22:35:25.436815 921384 usertrap_amd64.go:225] [ 11362: 11362] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.437493 921384 task_exit.go:204] [ 11362: 11362] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.437536 921384 task_exit.go:204] [ 11362: 11362] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.437604 921384 task_signals.go:204] [ 11362: 11363] Signal 11362, PID: 11363, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.437665 921384 task_exit.go:204] [ 11362: 11363] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.439004 921384 task_exit.go:204] [ 11362: 11363] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.439028 921384 task_exit.go:204] [ 11362: 11363] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.439048 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.440020 921384 task_exit.go:204] [ 11362: 11362] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: socket$packet(0x11, 0x2, 0x300) (async) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RSTAT(r3, 0x0, 0x0) (async) write$P9_RSTAT(r3, 0x0, 0x0) bind$packet(r3, &(0x7f0000000100)={0x11, 0x2, 0x0, 0x1, 0x3, 0x6, @broadcast}, 0x14) write$yama_ptrace_scope(r2, &(0x7f00000000c0)='2\x00', 0x2) (async) write$yama_ptrace_scope(r2, &(0x7f00000000c0)='2\x00', 0x2) ioctl$TIOCSBRK(r3, 0x5427) syz_open_pts(r1, 0x0) D0323 22:35:25.441021 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.441139 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.454981 921384 usertrap_amd64.go:212] [ 11364: 11364] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.455022 921384 usertrap_amd64.go:122] [ 11364: 11364] Allocate a new trap: 0xc0080707e0 39 D0323 22:35:25.455101 921384 usertrap_amd64.go:225] [ 11364: 11364] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.455795 921384 usertrap_amd64.go:212] [ 11364: 11364] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.455819 921384 usertrap_amd64.go:122] [ 11364: 11364] Allocate a new trap: 0xc0080707e0 40 D0323 22:35:25.455832 921384 usertrap_amd64.go:225] [ 11364: 11364] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.456304 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.456510 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.459918 921384 usertrap_amd64.go:212] [ 11364: 11364] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.459969 921384 usertrap_amd64.go:122] [ 11364: 11364] Allocate a new trap: 0xc0080707e0 41 D0323 22:35:25.459983 921384 usertrap_amd64.go:225] [ 11364: 11364] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.472215 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.472557 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.473326 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.473473 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.473757 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.473853 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.475306 921384 usertrap_amd64.go:212] [ 11364: 11365] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.475332 921384 usertrap_amd64.go:122] [ 11364: 11365] Allocate a new trap: 0xc0080707e0 42 D0323 22:35:25.475346 921384 usertrap_amd64.go:225] [ 11364: 11365] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.475633 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.475817 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.477601 921384 usertrap_amd64.go:212] [ 11364: 11364] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.477628 921384 usertrap_amd64.go:122] [ 11364: 11364] Allocate a new trap: 0xc0080707e0 43 D0323 22:35:25.477640 921384 usertrap_amd64.go:225] [ 11364: 11364] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.478169 921384 task_exit.go:204] [ 11364: 11364] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.478364 921384 task_exit.go:204] [ 11364: 11364] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.478532 921384 task_signals.go:204] [ 11364: 11366] Signal 11364, PID: 11366, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.478839 921384 task_exit.go:204] [ 11364: 11366] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.478897 921384 task_signals.go:204] [ 11364: 11365] Signal 11364, PID: 11365, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.478914 921384 task_exit.go:204] [ 11364: 11366] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.478930 921384 task_exit.go:204] [ 11364: 11366] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.479043 921384 task_exit.go:204] [ 11364: 11365] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.482160 921384 task_exit.go:204] [ 11364: 11365] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.482191 921384 task_exit.go:204] [ 11364: 11365] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.482203 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.483083 921384 task_exit.go:204] [ 11364: 11364] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) (async) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) (async) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RSTAT(r3, 0x0, 0x0) bind$packet(r3, &(0x7f0000000100)={0x11, 0x2, 0x0, 0x1, 0x3, 0x6, @broadcast}, 0x14) write$yama_ptrace_scope(r2, &(0x7f00000000c0)='2\x00', 0x2) (async) ioctl$TIOCSBRK(r3, 0x5427) syz_open_pts(r1, 0x0) D0323 22:35:25.484445 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.484553 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.495253 921384 usertrap_amd64.go:212] [ 11367: 11367] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.495288 921384 usertrap_amd64.go:122] [ 11367: 11367] Allocate a new trap: 0xc008070900 39 D0323 22:35:25.495388 921384 usertrap_amd64.go:225] [ 11367: 11367] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.497211 921384 usertrap_amd64.go:212] [ 11367: 11367] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.497238 921384 usertrap_amd64.go:122] [ 11367: 11367] Allocate a new trap: 0xc008070900 40 D0323 22:35:25.497268 921384 usertrap_amd64.go:225] [ 11367: 11367] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.497874 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.498059 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.500175 921384 usertrap_amd64.go:212] [ 11367: 11367] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.500198 921384 usertrap_amd64.go:122] [ 11367: 11367] Allocate a new trap: 0xc008070900 41 D0323 22:35:25.500208 921384 usertrap_amd64.go:225] [ 11367: 11367] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.509561 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.509767 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.516780 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.517133 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.518949 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.519116 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.519819 921384 usertrap_amd64.go:212] [ 11367: 11368] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.519868 921384 usertrap_amd64.go:122] [ 11367: 11368] Allocate a new trap: 0xc008070900 42 D0323 22:35:25.519884 921384 usertrap_amd64.go:225] [ 11367: 11368] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.520202 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.520322 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.520814 921384 usertrap_amd64.go:212] [ 11367: 11367] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.520852 921384 usertrap_amd64.go:122] [ 11367: 11367] Allocate a new trap: 0xc008070900 43 D0323 22:35:25.520870 921384 usertrap_amd64.go:225] [ 11367: 11367] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.521802 921384 task_exit.go:204] [ 11367: 11367] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.521862 921384 task_exit.go:204] [ 11367: 11367] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.521935 921384 task_signals.go:204] [ 11367: 11368] Signal 11367, PID: 11368, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.521965 921384 task_exit.go:204] [ 11367: 11368] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.521983 921384 task_exit.go:204] [ 11367: 11368] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.521990 921384 task_exit.go:204] [ 11367: 11368] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.522023 921384 task_signals.go:204] [ 11367: 11370] Signal 11367, PID: 11370, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.522013 921384 task_signals.go:204] [ 11367: 11369] Signal 11367, PID: 11369, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.522039 921384 task_exit.go:204] [ 11367: 11370] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.522109 921384 task_exit.go:204] [ 11367: 11370] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.522126 921384 task_exit.go:204] [ 11367: 11370] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.522176 921384 task_exit.go:204] [ 11367: 11369] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.527331 921384 task_exit.go:204] [ 11367: 11369] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.527375 921384 task_exit.go:204] [ 11367: 11369] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.527393 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.528535 921384 task_exit.go:204] [ 11367: 11367] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffb000/0x3000)=nil) syz_open_pts(r0, 0x505302) shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffc000/0x1000)=nil) D0323 22:35:25.537498 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.537685 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.550383 921384 usertrap_amd64.go:212] [ 11371: 11371] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.550459 921384 usertrap_amd64.go:122] [ 11371: 11371] Allocate a new trap: 0xc009b5ecf0 39 D0323 22:35:25.550561 921384 usertrap_amd64.go:225] [ 11371: 11371] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.551624 921384 usertrap_amd64.go:212] [ 11371: 11371] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.551648 921384 usertrap_amd64.go:122] [ 11371: 11371] Allocate a new trap: 0xc009b5ecf0 40 D0323 22:35:25.551665 921384 usertrap_amd64.go:225] [ 11371: 11371] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.552689 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.552919 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.555072 921384 usertrap_amd64.go:212] [ 11371: 11371] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.555093 921384 usertrap_amd64.go:122] [ 11371: 11371] Allocate a new trap: 0xc009b5ecf0 41 D0323 22:35:25.555106 921384 usertrap_amd64.go:225] [ 11371: 11371] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.561456 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.561586 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.563576 921384 usertrap_amd64.go:212] [ 11371: 11372] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.563639 921384 usertrap_amd64.go:122] [ 11371: 11372] Allocate a new trap: 0xc009b5ecf0 42 D0323 22:35:25.563666 921384 usertrap_amd64.go:225] [ 11371: 11372] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.567595 921384 usertrap_amd64.go:212] [ 11371: 11371] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.567626 921384 usertrap_amd64.go:122] [ 11371: 11371] Allocate a new trap: 0xc009b5ecf0 43 D0323 22:35:25.567639 921384 usertrap_amd64.go:225] [ 11371: 11371] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.568418 921384 task_exit.go:204] [ 11371: 11371] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.568463 921384 task_exit.go:204] [ 11371: 11371] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.568550 921384 task_signals.go:204] [ 11371: 11372] Signal 11371, PID: 11372, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.568584 921384 task_exit.go:204] [ 11371: 11372] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.569991 921384 task_exit.go:204] [ 11371: 11372] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.570019 921384 task_exit.go:204] [ 11371: 11372] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.570035 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.571149 921384 task_exit.go:204] [ 11371: 11371] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffb000/0x3000)=nil) (async) syz_open_pts(r0, 0x505302) (async) shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffc000/0x1000)=nil) D0323 22:35:25.573456 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.573592 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.587507 921384 usertrap_amd64.go:212] [ 11373: 11373] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.587545 921384 usertrap_amd64.go:122] [ 11373: 11373] Allocate a new trap: 0xc008cdca50 39 D0323 22:35:25.587684 921384 usertrap_amd64.go:225] [ 11373: 11373] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.588481 921384 usertrap_amd64.go:212] [ 11373: 11373] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.588529 921384 usertrap_amd64.go:122] [ 11373: 11373] Allocate a new trap: 0xc008cdca50 40 D0323 22:35:25.588550 921384 usertrap_amd64.go:225] [ 11373: 11373] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.589829 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.590020 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.600563 921384 usertrap_amd64.go:212] [ 11373: 11373] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.601054 921384 usertrap_amd64.go:122] [ 11373: 11373] Allocate a new trap: 0xc008cdca50 41 D0323 22:35:25.601067 921384 usertrap_amd64.go:225] [ 11373: 11373] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.605911 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.606105 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.607951 921384 usertrap_amd64.go:212] [ 11373: 11373] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:25.607976 921384 usertrap_amd64.go:122] [ 11373: 11373] Allocate a new trap: 0xc008cdca50 42 D0323 22:35:25.607987 921384 usertrap_amd64.go:225] [ 11373: 11373] Apply the binary patch addr 5650abb02e1a trap addr 65d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.611633 921384 usertrap_amd64.go:212] [ 11373: 11375] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.611659 921384 usertrap_amd64.go:122] [ 11373: 11375] Allocate a new trap: 0xc008cdca50 43 D0323 22:35:25.611671 921384 usertrap_amd64.go:225] [ 11373: 11375] Apply the binary patch addr 5650aba9027d trap addr 65d70 ([184 1 1 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.613200 921384 usertrap_amd64.go:212] [ 11373: 11373] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.613216 921384 usertrap_amd64.go:122] [ 11373: 11373] Allocate a new trap: 0xc008cdca50 44 D0323 22:35:25.613227 921384 usertrap_amd64.go:225] [ 11373: 11373] Apply the binary patch addr 5650aba8ffa4 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0323 22:35:25.613653 921384 task_exit.go:204] [ 11373: 11373] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.613684 921384 task_exit.go:204] [ 11373: 11373] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.613746 921384 task_signals.go:204] [ 11373: 11375] Signal 11373, PID: 11375, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.613789 921384 task_exit.go:204] [ 11373: 11375] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.613804 921384 task_signals.go:204] [ 11373: 11374] Signal 11373, PID: 11374, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.613819 921384 task_exit.go:204] [ 11373: 11375] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.613825 921384 task_exit.go:204] [ 11373: 11375] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.613848 921384 task_exit.go:204] [ 11373: 11374] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.617004 921384 task_exit.go:204] [ 11373: 11374] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.617053 921384 task_exit.go:204] [ 11373: 11374] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.617075 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.617703 921384 task_exit.go:204] [ 11373: 11373] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.618308 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.618430 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffb000/0x3000)=nil) syz_open_pts(r0, 0x505302) (async, rerun: 64) shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffc000/0x1000)=nil) (rerun: 64) D0323 22:35:25.628503 921384 usertrap_amd64.go:212] [ 11376: 11376] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.628676 921384 usertrap_amd64.go:122] [ 11376: 11376] Allocate a new trap: 0xc0074f94a0 39 D0323 22:35:25.628958 921384 usertrap_amd64.go:225] [ 11376: 11376] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.630215 921384 usertrap_amd64.go:212] [ 11376: 11376] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.630243 921384 usertrap_amd64.go:122] [ 11376: 11376] Allocate a new trap: 0xc0074f94a0 40 D0323 22:35:25.630253 921384 usertrap_amd64.go:225] [ 11376: 11376] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.630806 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.631952 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.634424 921384 usertrap_amd64.go:212] [ 11376: 11376] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.634449 921384 usertrap_amd64.go:122] [ 11376: 11376] Allocate a new trap: 0xc0074f94a0 41 D0323 22:35:25.634458 921384 usertrap_amd64.go:225] [ 11376: 11376] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.642068 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.642246 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.643079 921384 usertrap_amd64.go:212] [ 11376: 11377] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.643107 921384 usertrap_amd64.go:122] [ 11376: 11377] Allocate a new trap: 0xc0074f94a0 42 D0323 22:35:25.643120 921384 usertrap_amd64.go:225] [ 11376: 11377] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.643288 921384 usertrap_amd64.go:212] [ 11376: 11376] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:25.643316 921384 usertrap_amd64.go:122] [ 11376: 11376] Allocate a new trap: 0xc0074f94a0 43 D0323 22:35:25.643324 921384 usertrap_amd64.go:225] [ 11376: 11376] Apply the binary patch addr 5650abb02e1a trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.644846 921384 usertrap_amd64.go:212] [ 11376: 11376] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.644883 921384 usertrap_amd64.go:122] [ 11376: 11376] Allocate a new trap: 0xc0074f94a0 44 D0323 22:35:25.644895 921384 usertrap_amd64.go:225] [ 11376: 11376] Apply the binary patch addr 5650aba8ffa4 trap addr 65dc0 ([184 3 0 0 0 15 5] -> [255 36 37 192 93 6 0]) D0323 22:35:25.645294 921384 task_exit.go:204] [ 11376: 11376] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.645336 921384 task_exit.go:204] [ 11376: 11376] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.645368 921384 task_signals.go:204] [ 11376: 11378] Signal 11376, PID: 11378, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.645399 921384 task_exit.go:204] [ 11376: 11378] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.645426 921384 task_signals.go:204] [ 11376: 11377] Signal 11376, PID: 11377, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.645439 921384 task_exit.go:204] [ 11376: 11378] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.645445 921384 task_exit.go:204] [ 11376: 11378] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.645458 921384 task_exit.go:204] [ 11376: 11377] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.649196 921384 task_exit.go:204] [ 11376: 11377] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.649233 921384 task_exit.go:204] [ 11376: 11377] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.649246 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.649990 921384 task_exit.go:204] [ 11376: 11376] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) D0323 22:35:25.661862 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.662015 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.670301 921384 usertrap_amd64.go:212] [ 11379: 11379] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.670335 921384 usertrap_amd64.go:122] [ 11379: 11379] Allocate a new trap: 0xc008cdcc90 39 D0323 22:35:25.670431 921384 usertrap_amd64.go:225] [ 11379: 11379] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.672466 921384 usertrap_amd64.go:212] [ 11379: 11379] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.672512 921384 usertrap_amd64.go:122] [ 11379: 11379] Allocate a new trap: 0xc008cdcc90 40 D0323 22:35:25.672529 921384 usertrap_amd64.go:225] [ 11379: 11379] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.673275 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.673467 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.677294 921384 usertrap_amd64.go:212] [ 11379: 11379] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.677329 921384 usertrap_amd64.go:122] [ 11379: 11379] Allocate a new trap: 0xc008cdcc90 41 D0323 22:35:25.677346 921384 usertrap_amd64.go:225] [ 11379: 11379] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.684343 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.684583 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.685286 921384 usertrap_amd64.go:212] [ 11379: 11379] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.685364 921384 usertrap_amd64.go:122] [ 11379: 11379] Allocate a new trap: 0xc008cdcc90 42 D0323 22:35:25.685405 921384 usertrap_amd64.go:225] [ 11379: 11379] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.686067 921384 task_exit.go:204] [ 11379: 11379] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.686130 921384 task_exit.go:204] [ 11379: 11379] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.686263 921384 task_signals.go:204] [ 11379: 11380] Signal 11379, PID: 11380, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.686291 921384 task_exit.go:204] [ 11379: 11380] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.687643 921384 task_exit.go:204] [ 11379: 11380] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.687667 921384 task_exit.go:204] [ 11379: 11380] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.687695 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.688753 921384 task_exit.go:204] [ 11379: 11379] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) D0323 22:35:25.693594 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.693731 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.706408 921384 usertrap_amd64.go:212] [ 11381: 11381] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.706446 921384 usertrap_amd64.go:122] [ 11381: 11381] Allocate a new trap: 0xc009b5efc0 39 D0323 22:35:25.706536 921384 usertrap_amd64.go:225] [ 11381: 11381] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.708991 921384 usertrap_amd64.go:212] [ 11381: 11381] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.709013 921384 usertrap_amd64.go:122] [ 11381: 11381] Allocate a new trap: 0xc009b5efc0 40 D0323 22:35:25.709026 921384 usertrap_amd64.go:225] [ 11381: 11381] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.711213 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.712732 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.720656 921384 usertrap_amd64.go:212] [ 11381: 11381] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.720683 921384 usertrap_amd64.go:122] [ 11381: 11381] Allocate a new trap: 0xc009b5efc0 41 D0323 22:35:25.720694 921384 usertrap_amd64.go:225] [ 11381: 11381] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.726690 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.727301 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.728069 921384 usertrap_amd64.go:212] [ 11381: 11381] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.728099 921384 usertrap_amd64.go:122] [ 11381: 11381] Allocate a new trap: 0xc009b5efc0 42 D0323 22:35:25.728114 921384 usertrap_amd64.go:225] [ 11381: 11381] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.728536 921384 task_exit.go:204] [ 11381: 11381] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.728580 921384 task_exit.go:204] [ 11381: 11381] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.728658 921384 task_signals.go:204] [ 11381: 11382] Signal 11381, PID: 11382, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.728691 921384 task_exit.go:204] [ 11381: 11382] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.730038 921384 task_exit.go:204] [ 11381: 11382] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.730069 921384 task_exit.go:204] [ 11381: 11382] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.730090 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.730885 921384 task_exit.go:204] [ 11381: 11381] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.732583 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.732778 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:25 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) D0323 22:35:25.742528 921384 usertrap_amd64.go:212] [ 11383: 11383] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.742567 921384 usertrap_amd64.go:122] [ 11383: 11383] Allocate a new trap: 0xc008cdccf0 39 D0323 22:35:25.742700 921384 usertrap_amd64.go:225] [ 11383: 11383] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.743461 921384 usertrap_amd64.go:212] [ 11383: 11383] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.743487 921384 usertrap_amd64.go:122] [ 11383: 11383] Allocate a new trap: 0xc008cdccf0 40 D0323 22:35:25.743500 921384 usertrap_amd64.go:225] [ 11383: 11383] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.745832 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.746166 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.750782 921384 usertrap_amd64.go:212] [ 11383: 11383] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.750813 921384 usertrap_amd64.go:122] [ 11383: 11383] Allocate a new trap: 0xc008cdccf0 41 D0323 22:35:25.750826 921384 usertrap_amd64.go:225] [ 11383: 11383] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.757326 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.757626 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.758059 921384 usertrap_amd64.go:212] [ 11383: 11383] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.758094 921384 usertrap_amd64.go:122] [ 11383: 11383] Allocate a new trap: 0xc008cdccf0 42 D0323 22:35:25.758113 921384 usertrap_amd64.go:225] [ 11383: 11383] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.758631 921384 task_exit.go:204] [ 11383: 11383] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.758687 921384 task_exit.go:204] [ 11383: 11383] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.758757 921384 task_signals.go:204] [ 11383: 11384] Signal 11383, PID: 11384, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.758816 921384 task_exit.go:204] [ 11383: 11384] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.765425 921384 task_exit.go:204] [ 11383: 11384] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.765690 921384 task_exit.go:204] [ 11383: 11384] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.765715 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.766497 921384 task_exit.go:204] [ 11383: 11383] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: getgroups(0x3, &(0x7f00000000c0)=[0xee01, 0xee01, 0x0]) getgroups(0x5a, &(0x7f0000000100)=[r0, 0xee01]) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x59d840, 0x0) syz_open_pts(r1, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000080)) D0323 22:35:25.769662 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.769775 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.783556 921384 usertrap_amd64.go:212] [ 11385: 11385] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.783588 921384 usertrap_amd64.go:122] [ 11385: 11385] Allocate a new trap: 0xc008070d20 39 D0323 22:35:25.783712 921384 usertrap_amd64.go:225] [ 11385: 11385] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.784719 921384 usertrap_amd64.go:212] [ 11385: 11385] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.784753 921384 usertrap_amd64.go:122] [ 11385: 11385] Allocate a new trap: 0xc008070d20 40 D0323 22:35:25.784768 921384 usertrap_amd64.go:225] [ 11385: 11385] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.785452 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.785635 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.788008 921384 usertrap_amd64.go:212] [ 11385: 11385] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.788036 921384 usertrap_amd64.go:122] [ 11385: 11385] Allocate a new trap: 0xc008070d20 41 D0323 22:35:25.788051 921384 usertrap_amd64.go:225] [ 11385: 11385] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.800191 921384 usertrap_amd64.go:212] [ 11385: 11385] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.800216 921384 usertrap_amd64.go:122] [ 11385: 11385] Allocate a new trap: 0xc008070d20 42 D0323 22:35:25.800232 921384 usertrap_amd64.go:225] [ 11385: 11385] Apply the binary patch addr 5650aba8ffa4 trap addr 65d20 ([184 3 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.801090 921384 task_exit.go:204] [ 11385: 11385] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.801131 921384 task_exit.go:204] [ 11385: 11385] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.801176 921384 task_signals.go:204] [ 11385: 11386] Signal 11385, PID: 11386, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.801201 921384 task_exit.go:204] [ 11385: 11386] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.803029 921384 task_exit.go:204] [ 11385: 11386] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.803085 921384 task_exit.go:204] [ 11385: 11386] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.803109 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.803222 921384 task_exit.go:204] [ 11385: 11385] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: getgroups(0x3, &(0x7f00000000c0)=[0xee01, 0xee01, 0x0]) getgroups(0x5a, &(0x7f0000000100)=[r0, 0xee01]) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x59d840, 0x0) syz_open_pts(r1, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000080)) getgroups(0x3, &(0x7f00000000c0)=[0xee01, 0xee01, 0x0]) (async) getgroups(0x5a, &(0x7f0000000100)=[r0, 0xee01]) (async) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x59d840, 0x0) (async) syz_open_pts(r1, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000080)) (async) D0323 22:35:25.805372 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.805507 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.815251 921384 usertrap_amd64.go:212] [ 11387: 11387] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.815286 921384 usertrap_amd64.go:122] [ 11387: 11387] Allocate a new trap: 0xc00787ed50 39 D0323 22:35:25.815362 921384 usertrap_amd64.go:225] [ 11387: 11387] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.816664 921384 usertrap_amd64.go:212] [ 11387: 11387] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.816694 921384 usertrap_amd64.go:122] [ 11387: 11387] Allocate a new trap: 0xc00787ed50 40 D0323 22:35:25.816713 921384 usertrap_amd64.go:225] [ 11387: 11387] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.818173 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.818489 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.821958 921384 usertrap_amd64.go:212] [ 11387: 11387] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.822022 921384 usertrap_amd64.go:122] [ 11387: 11387] Allocate a new trap: 0xc00787ed50 41 D0323 22:35:25.822044 921384 usertrap_amd64.go:225] [ 11387: 11387] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.836394 921384 usertrap_amd64.go:212] [ 11387: 11387] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:25.836429 921384 usertrap_amd64.go:122] [ 11387: 11387] Allocate a new trap: 0xc00787ed50 42 D0323 22:35:25.836444 921384 usertrap_amd64.go:225] [ 11387: 11387] Apply the binary patch addr 5650abb02e1a trap addr 65d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.840126 921384 task_run.go:312] [ 11387: 11391] Unhandled user fault: addr=0 ip=5650aba83bc4 access=r-- sig=11 err=bad address D0323 22:35:25.840184 921384 task_log.go:87] [ 11387: 11391] Registers: D0323 22:35:25.840208 921384 task_log.go:94] [ 11387: 11391] Cs = 0000000000000033 D0323 22:35:25.840217 921384 task_log.go:94] [ 11387: 11391] Ds = 0000000000000000 D0323 22:35:25.840223 921384 task_log.go:94] [ 11387: 11391] Eflags = 0000000000010202 D0323 22:35:25.840230 921384 task_log.go:94] [ 11387: 11391] Es = 0000000000000000 D0323 22:35:25.840235 921384 task_log.go:94] [ 11387: 11391] Fs = 0000000000000000 D0323 22:35:25.840240 921384 task_log.go:94] [ 11387: 11391] Fs_base = 00007eccc3e23700 D0323 22:35:25.840246 921384 task_log.go:94] [ 11387: 11391] Gs = 0000000000000000 D0323 22:35:25.840254 921384 task_log.go:94] [ 11387: 11391] Gs_base = 00007ffbf6d07000 D0323 22:35:25.840259 921384 task_log.go:94] [ 11387: 11391] Orig_rax = ffffffffffffffff D0323 22:35:25.840264 921384 task_log.go:94] [ 11387: 11391] R10 = 00100b6a3db40f4a D0323 22:35:25.840269 921384 task_log.go:94] [ 11387: 11391] R11 = 00000000861c4b74 D0323 22:35:25.840274 921384 task_log.go:94] [ 11387: 11391] R12 = 0000000000000000 D0323 22:35:25.840279 921384 task_log.go:94] [ 11387: 11391] R13 = 00007eeff73f235f D0323 22:35:25.840284 921384 task_log.go:94] [ 11387: 11391] R14 = 00007eccc3e23300 D0323 22:35:25.840289 921384 task_log.go:94] [ 11387: 11391] R15 = 0000000000022000 D0323 22:35:25.840299 921384 task_log.go:94] [ 11387: 11391] R8 = 000000003427a188 D0323 22:35:25.840306 921384 task_log.go:94] [ 11387: 11391] R9 = 00000000000001cc D0323 22:35:25.840311 921384 task_log.go:94] [ 11387: 11391] Rax = 0000000000000000 D0323 22:35:25.840316 921384 task_log.go:94] [ 11387: 11391] Rbp = 00005650abb39b39 D0323 22:35:25.840321 921384 task_log.go:94] [ 11387: 11391] Rbx = 0000000000000003 D0323 22:35:25.840326 921384 task_log.go:94] [ 11387: 11391] Rcx = 00005650abb3c530 D0323 22:35:25.840333 921384 task_log.go:94] [ 11387: 11391] Rdi = 00005650abb38941 D0323 22:35:25.840349 921384 task_log.go:94] [ 11387: 11391] Rdx = 0000000000037cc4 D0323 22:35:25.840355 921384 task_log.go:94] [ 11387: 11391] Rip = 00005650aba83bc4 D0323 22:35:25.840362 921384 task_log.go:94] [ 11387: 11391] Rsi = 0000000020000080 D0323 22:35:25.840369 921384 task_log.go:94] [ 11387: 11391] Rsp = 00007eccc3e23190 D0323 22:35:25.840375 921384 task_log.go:94] [ 11387: 11391] Ss = 000000000000002b D0323 22:35:25.840382 921384 task_log.go:111] [ 11387: 11391] Stack: D0323 22:35:25.840497 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23190: 00 00 00 00 00 00 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:25.840530 921384 task_log.go:128] [ 11387: 11391] 7eccc3e231a0: 00 00 00 00 00 00 00 00 a3 02 00 00 ff ff ff ff D0323 22:35:25.840540 921384 task_log.go:128] [ 11387: 11391] 7eccc3e231b0: 00 00 00 00 00 00 00 00 b0 89 b8 ab 50 56 00 00 D0323 22:35:25.840548 921384 task_log.go:128] [ 11387: 11391] 7eccc3e231c0: e5 00 00 00 00 00 00 00 88 a1 27 34 00 00 00 00 D0323 22:35:25.840556 921384 task_log.go:128] [ 11387: 11391] 7eccc3e231d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840565 921384 task_log.go:128] [ 11387: 11391] 7eccc3e231e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840574 921384 task_log.go:128] [ 11387: 11391] 7eccc3e231f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840582 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23200: f8 e1 bf ab 50 56 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:25.840590 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23210: fc e1 bf ab 50 56 00 00 e4 7a a8 ab 50 56 00 00 D0323 22:35:25.840599 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840607 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23230: 5e 23 3f f7 ef 7e 00 00 87 cc a8 ab 50 56 00 00 D0323 22:35:25.840613 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23240: 00 00 00 00 00 00 00 00 00 37 e2 c3 cc 7e 00 00 D0323 22:35:25.840634 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23250: 00 37 e2 c3 cc 7e 00 00 30 be 31 66 7f 24 fb 39 D0323 22:35:25.840653 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23260: 5e 23 3f f7 ef 7e 00 00 5f 23 3f f7 ef 7e 00 00 D0323 22:35:25.840672 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23270: 00 33 e2 c3 cc 7e 00 00 00 20 02 00 00 00 00 00 D0323 22:35:25.840684 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23280: 30 be b1 02 bb a3 62 c4 30 be 6b fe 2e 73 5a 95 D0323 22:35:25.840691 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840696 921384 task_log.go:128] [ 11387: 11391] 7eccc3e232a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840702 921384 task_log.go:128] [ 11387: 11391] 7eccc3e232b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840708 921384 task_log.go:128] [ 11387: 11391] 7eccc3e232c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840713 921384 task_log.go:128] [ 11387: 11391] 7eccc3e232d0: 00 00 00 00 00 00 00 00 00 26 88 03 43 46 c5 16 D0323 22:35:25.840718 921384 task_log.go:128] [ 11387: 11391] 7eccc3e232e0: 00 37 e2 c3 cc 7e 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840723 921384 task_log.go:128] [ 11387: 11391] 7eccc3e232f0: 5e 23 3f f7 ef 7e 00 00 2f f5 ad ab 50 56 00 00 D0323 22:35:25.840729 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840734 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840739 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840744 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840749 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840754 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840770 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840775 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840780 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840786 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840790 921384 task_log.go:128] [ 11387: 11391] 7eccc3e233a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840800 921384 task_log.go:128] [ 11387: 11391] 7eccc3e233b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840805 921384 task_log.go:128] [ 11387: 11391] 7eccc3e233c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840809 921384 task_log.go:128] [ 11387: 11391] 7eccc3e233d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840814 921384 task_log.go:128] [ 11387: 11391] 7eccc3e233e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840819 921384 task_log.go:128] [ 11387: 11391] 7eccc3e233f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840824 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840829 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840835 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840840 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840848 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840853 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840859 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840864 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840869 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840892 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840896 921384 task_log.go:128] [ 11387: 11391] 7eccc3e234a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840902 921384 task_log.go:128] [ 11387: 11391] 7eccc3e234b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840908 921384 task_log.go:128] [ 11387: 11391] 7eccc3e234c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840913 921384 task_log.go:128] [ 11387: 11391] 7eccc3e234d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840918 921384 task_log.go:128] [ 11387: 11391] 7eccc3e234e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840923 921384 task_log.go:128] [ 11387: 11391] 7eccc3e234f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840928 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840970 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840978 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840985 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.840991 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.841022 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.841028 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.841033 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.841039 921384 task_log.go:128] [ 11387: 11391] 7eccc3e23580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.841052 921384 task_log.go:149] [ 11387: 11391] Code: D0323 22:35:25.841062 921384 task_log.go:167] [ 11387: 11391] 5650aba83b80: 48 89 ee 48 89 c2 e8 a5 c2 00 00 48 89 ef 49 89 D0323 22:35:25.841067 921384 task_log.go:167] [ 11387: 11391] 5650aba83b90: c4 e8 7a 26 ff ff 49 39 c4 0f 85 b0 03 00 00 48 D0323 22:35:25.841072 921384 task_log.go:167] [ 11387: 11391] 5650aba83ba0: 8b 44 24 08 89 5c 24 1c c6 80 c8 00 00 00 01 80 D0323 22:35:25.841077 921384 task_log.go:167] [ 11387: 11391] 5650aba83bb0: 3d 07 3b ca 00 00 74 13 48 8b 44 24 08 48 8b 80 D0323 22:35:25.841156 921384 task_log.go:167] [ 11387: 11391] 5650aba83bc0: a8 00 00 00 48 c7 00 00 00 00 00 48 8b 5c 24 08 D0323 22:35:25.841192 921384 task_log.go:167] [ 11387: 11391] 5650aba83bd0: 48 c7 83 88 00 00 00 ff ff ff ff e8 a0 d1 00 00 D0323 22:35:25.841202 921384 task_log.go:167] [ 11387: 11391] 5650aba83be0: c7 00 0e 00 00 00 64 f0 83 04 25 b0 ff ff ff 01 D0323 22:35:25.841224 921384 task_log.go:167] [ 11387: 11391] 5650aba83bf0: 64 48 8b 04 25 00 00 00 00 48 8d b8 e8 fe ff ff D0323 22:35:25.841232 921384 task_log.go:71] [ 11387: 11391] Mappings: VMAs: 00065000-0006a000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d320000-1b2d360000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 5650aba52000-5650aba76000 r--p 00000000 00:08 8 /syz-executor 5650aba76000-5650abb28000 r-xp 00024000 00:08 8 /syz-executor 5650abb28000-5650abb7a000 r--p 000d6000 00:08 8 /syz-executor 5650abb7b000-5650abbd4000 r--p 00128000 00:08 8 /syz-executor 5650abbd4000-5650abbdd000 rw-p 00181000 00:08 8 /syz-executor 5650abbe2000-5650ac72e000 rw-p 00000000 00:00 0 5650ac72e000-5650ac750000 rw-p 00000000 00:00 0 [heap] 7eccc3200000-7eccc3400000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3400000-7eccc3600000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3600000-7eccc3800000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3800000-7eccc3a00000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3a00000-7eccc3e00000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7eccc3e03000-7eccc3e04000 ---p 00000000 00:00 0 7eccc3e04000-7eccc3e24000 rw-p 00000000 00:00 0 7eccc3e24000-7eccc3e25000 ---p 00000000 00:00 0 7eccc3e25000-7eccc3e45000 rw-p 00000000 00:00 0 7eccc3e45000-7eccc3e46000 ---p 00000000 00:00 0 7eccc3e46000-7eccc3e66000 rw-p 00000000 00:00 0 7eccc3e66000-7eccc3e67000 ---p 00000000 00:00 0 7eccc3e67000-7eccc3e87000 rw-p 00000000 00:00 0 7eccc3e87000-7eccc3e88000 r--p 00000000 00:00 0 [vvar] 7eccc3e88000-7eccc3e8a000 r-xp 00000000 00:00 0 7eeff6bf3000-7eeff73f3000 rw-p 00000000 00:00 0 [stack] PMAs: 00065000-00066000 r-xp 035f7000 *pgalloc.MemoryFile 00066000-0006a000 r-xp 00bfa000 *pgalloc.MemoryFile 20000000-20200000 rwxp 07400000 *pgalloc.MemoryFile 1b2d320000-1b2d360000 rw-s 09800000 *pgalloc.MemoryFile 5650aba52000-5650aba76000 r--p 05dc0000 *pgalloc.MemoryFile 5650aba76000-5650aba8f000 r-xs 00024000 *gofer.dentryPlatformFile 5650aba8f000-5650aba90000 r-xp 035fa000 *pgalloc.MemoryFile 5650aba90000-5650aba91000 r-xp 035f8000 *pgalloc.MemoryFile 5650aba91000-5650aba92000 r-xp 00bff000 *pgalloc.MemoryFile 5650aba92000-5650abadb000 r-xs 00040000 *gofer.dentryPlatformFile 5650abadb000-5650abadc000 r-xp 03fff000 *pgalloc.MemoryFile 5650abadc000-5650abadd000 r-xp 035f9000 *pgalloc.MemoryFile 5650abadd000-5650abade000 r-xp 043ff000 *pgalloc.MemoryFile 5650abade000-5650abadf000 r-xp 023f5000 *pgalloc.MemoryFile 5650abadf000-5650abae0000 r-xp 0605c000 *pgalloc.MemoryFile 5650abae0000-5650abb02000 r-xs 0008e000 *gofer.dentryPlatformFile 5650abb02000-5650abb03000 r-xp 062a1000 *pgalloc.MemoryFile 5650abb03000-5650abb04000 r-xp 035ff000 *pgalloc.MemoryFile 5650abb1b000-5650abb1c000 r-xp 035fb000 *pgalloc.MemoryFile 5650abb27000-5650abb28000 r-xp 005fc000 *pgalloc.MemoryFile 5650abb28000-5650abb7a000 r--p 06515000 *pgalloc.MemoryFile 5650abb7b000-5650abbdd000 rw-p 071f0000 *pgalloc.MemoryFile 5650abbe2000-5650abc00000 rw-p 066fc000 *pgalloc.MemoryFile 5650ac600000-5650ac72e000 rw-p 070c2000 *pgalloc.MemoryFile 5650ac72e000-5650ac72f000 rw-p 005ff000 *pgalloc.MemoryFile 5650ac72f000-5650ac750000 rw-p 06b18000 *pgalloc.MemoryFile 7eccc3400000-7eccc3600000 rw-s 0b000000 *pgalloc.MemoryFile 7eccc3600000-7eccc3800000 rw-s 0ae00000 *pgalloc.MemoryFile 7eccc3800000-7eccc3a00000 rw-s 0ac00000 *pgalloc.MemoryFile 7eccc3a00000-7eccc3e00000 r--s 09400000 *pgalloc.MemoryFile 7eccc3e04000-7eccc3e24000 rw-p 06b9a000 *pgalloc.MemoryFile 7eccc3e25000-7eccc3e45000 rw-p 06ae8000 *pgalloc.MemoryFile 7eccc3e46000-7eccc3e66000 rw-p 06ac0000 *pgalloc.MemoryFile 7eccc3e67000-7eccc3e87000 rw-p 0684d000 *pgalloc.MemoryFile 7eccc3e87000-7eccc3e88000 r--s 00002000 *pgalloc.MemoryFile 7eccc3e88000-7eccc3e8a000 r-xs 00000000 *pgalloc.MemoryFile 7eeff7200000-7eeff73ef000 r--p 0a800000 *pgalloc.MemoryFile 7eeff73ef000-7eeff73f1000 r--p 023fe000 *pgalloc.MemoryFile 7eeff73f1000-7eeff73f3000 rw-p 035fd000 *pgalloc.MemoryFile D0323 22:35:25.841483 921384 task_log.go:73] [ 11387: 11391] FDTable: fd:226 => name /sys/kernel/debug/kcov fd:215 => name /sys/kernel/debug/kcov fd:217 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov fd:1 => name pipe:[5] fd:222 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:218 => name /sys/kernel/debug/kcov fd:219 => name /sys/kernel/debug/kcov fd:0 => name pipe:[5] fd:2 => name pipe:[5] fd:216 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:200 => name /dev/net/tun fd:201 => name / fd:220 => name /sys/kernel/debug/kcov D0323 22:35:25.841544 921384 task_signals.go:470] [ 11387: 11391] Notified of signal 11 D0323 22:35:25.841556 921384 task_signals.go:220] [ 11387: 11391] Signal 11: delivering to handler D0323 22:35:25.841693 921384 task_exit.go:204] [ 11387: 11391] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.841742 921384 task_signals.go:204] [ 11387: 11389] Signal 11387, PID: 11389, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.841748 921384 task_signals.go:204] [ 11387: 11390] Signal 11387, PID: 11390, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.841764 921384 task_exit.go:204] [ 11387: 11389] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.841782 921384 task_exit.go:204] [ 11387: 11389] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.841789 921384 task_exit.go:204] [ 11387: 11389] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.841780 921384 task_signals.go:204] [ 11387: 11388] Signal 11387, PID: 11388, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.841901 921384 task_exit.go:204] [ 11387: 11390] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.841942 921384 task_signals.go:204] [ 11387: 11387] Signal 11387, PID: 11387, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.841953 921384 task_exit.go:204] [ 11387: 11390] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.841962 921384 task_exit.go:204] [ 11387: 11390] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.841987 921384 task_exit.go:204] [ 11387: 11391] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.842003 921384 task_exit.go:204] [ 11387: 11391] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.842020 921384 task_exit.go:204] [ 11387: 11388] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.842034 921384 task_exit.go:204] [ 11387: 11388] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.842049 921384 task_exit.go:204] [ 11387: 11388] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.842061 921384 task_exit.go:204] [ 11387: 11387] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.847026 921384 task_exit.go:204] [ 11387: 11387] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.847068 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.848019 921384 task_exit.go:204] [ 11387: 11387] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: getgroups(0x3, &(0x7f00000000c0)=[0xee01, 0xee01, 0x0]) getgroups(0x5a, &(0x7f0000000100)=[r0, 0xee01]) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x59d840, 0x0) syz_open_pts(r1, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000080)) getgroups(0x3, &(0x7f00000000c0)=[0xee01, 0xee01, 0x0]) (async) getgroups(0x5a, &(0x7f0000000100)=[r0, 0xee01]) (async) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x59d840, 0x0) (async) syz_open_pts(r1, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000080)) (async) D0323 22:35:25.853999 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.854271 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.864202 921384 usertrap_amd64.go:212] [ 11392: 11392] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.864230 921384 usertrap_amd64.go:122] [ 11392: 11392] Allocate a new trap: 0xc00049a990 39 D0323 22:35:25.864323 921384 usertrap_amd64.go:225] [ 11392: 11392] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.865002 921384 usertrap_amd64.go:212] [ 11392: 11392] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.865027 921384 usertrap_amd64.go:122] [ 11392: 11392] Allocate a new trap: 0xc00049a990 40 D0323 22:35:25.865037 921384 usertrap_amd64.go:225] [ 11392: 11392] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.865496 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.865690 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.867548 921384 usertrap_amd64.go:212] [ 11392: 11392] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.867570 921384 usertrap_amd64.go:122] [ 11392: 11392] Allocate a new trap: 0xc00049a990 41 D0323 22:35:25.867579 921384 usertrap_amd64.go:225] [ 11392: 11392] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.883963 921384 usertrap_amd64.go:212] [ 11392: 11392] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:25.884010 921384 usertrap_amd64.go:122] [ 11392: 11392] Allocate a new trap: 0xc00049a990 42 D0323 22:35:25.884028 921384 usertrap_amd64.go:225] [ 11392: 11392] Apply the binary patch addr 5650abb02e1a trap addr 65d20 ([184 230 0 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.892200 921384 task_run.go:312] [ 11392: 11396] Unhandled user fault: addr=0 ip=5650aba83bc4 access=r-- sig=11 err=bad address D0323 22:35:25.892275 921384 task_log.go:87] [ 11392: 11396] Registers: D0323 22:35:25.892299 921384 task_log.go:94] [ 11392: 11396] Cs = 0000000000000033 D0323 22:35:25.892305 921384 task_log.go:94] [ 11392: 11396] Ds = 0000000000000000 D0323 22:35:25.892313 921384 task_log.go:94] [ 11392: 11396] Eflags = 0000000000010202 D0323 22:35:25.892321 921384 task_log.go:94] [ 11392: 11396] Es = 0000000000000000 D0323 22:35:25.892325 921384 task_log.go:94] [ 11392: 11396] Fs = 0000000000000000 D0323 22:35:25.892329 921384 task_log.go:94] [ 11392: 11396] Fs_base = 00007eccc3e23700 D0323 22:35:25.892333 921384 task_log.go:94] [ 11392: 11396] Gs = 0000000000000000 D0323 22:35:25.892337 921384 task_log.go:94] [ 11392: 11396] Gs_base = 00007ffbf6d1f000 D0323 22:35:25.892340 921384 task_log.go:94] [ 11392: 11396] Orig_rax = ffffffffffffffff D0323 22:35:25.892344 921384 task_log.go:94] [ 11392: 11396] R10 = 00100b6a3db40f4a D0323 22:35:25.892347 921384 task_log.go:94] [ 11392: 11396] R11 = 00000000861c4b74 D0323 22:35:25.892350 921384 task_log.go:94] [ 11392: 11396] R12 = 0000000000000000 D0323 22:35:25.892354 921384 task_log.go:94] [ 11392: 11396] R13 = 00007eeff73f235f D0323 22:35:25.892357 921384 task_log.go:94] [ 11392: 11396] R14 = 00007eccc3e23300 D0323 22:35:25.892360 921384 task_log.go:94] [ 11392: 11396] R15 = 0000000000022000 D0323 22:35:25.892363 921384 task_log.go:94] [ 11392: 11396] R8 = 0000000037420130 D0323 22:35:25.892366 921384 task_log.go:94] [ 11392: 11396] R9 = 00000000000001cc D0323 22:35:25.892369 921384 task_log.go:94] [ 11392: 11396] Rax = 0000000000000000 D0323 22:35:25.892372 921384 task_log.go:94] [ 11392: 11396] Rbp = 00005650abb39b39 D0323 22:35:25.892376 921384 task_log.go:94] [ 11392: 11396] Rbx = 0000000000000003 D0323 22:35:25.892379 921384 task_log.go:94] [ 11392: 11396] Rcx = 00005650abb3c530 D0323 22:35:25.892382 921384 task_log.go:94] [ 11392: 11396] Rdi = 00005650abb38941 D0323 22:35:25.892385 921384 task_log.go:94] [ 11392: 11396] Rdx = 0000000000037cf8 D0323 22:35:25.892388 921384 task_log.go:94] [ 11392: 11396] Rip = 00005650aba83bc4 D0323 22:35:25.892391 921384 task_log.go:94] [ 11392: 11396] Rsi = 0000000020000080 D0323 22:35:25.892394 921384 task_log.go:94] [ 11392: 11396] Rsp = 00007eccc3e23190 D0323 22:35:25.892397 921384 task_log.go:94] [ 11392: 11396] Ss = 000000000000002b D0323 22:35:25.892400 921384 task_log.go:111] [ 11392: 11396] Stack: D0323 22:35:25.892405 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23190: 00 00 00 00 00 00 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:25.892411 921384 task_log.go:128] [ 11392: 11396] 7eccc3e231a0: 00 00 00 00 00 00 00 00 a3 02 00 00 ff ff ff ff D0323 22:35:25.892415 921384 task_log.go:128] [ 11392: 11396] 7eccc3e231b0: 00 00 00 00 00 00 00 00 b0 89 b8 ab 50 56 00 00 D0323 22:35:25.892418 921384 task_log.go:128] [ 11392: 11396] 7eccc3e231c0: e5 00 00 00 00 00 00 00 30 01 42 37 00 00 00 00 D0323 22:35:25.892421 921384 task_log.go:128] [ 11392: 11396] 7eccc3e231d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892425 921384 task_log.go:128] [ 11392: 11396] 7eccc3e231e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892428 921384 task_log.go:128] [ 11392: 11396] 7eccc3e231f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892433 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23200: f8 e1 bf ab 50 56 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:25.892436 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23210: fc e1 bf ab 50 56 00 00 e4 7a a8 ab 50 56 00 00 D0323 22:35:25.892440 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892444 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23230: 5e 23 3f f7 ef 7e 00 00 87 cc a8 ab 50 56 00 00 D0323 22:35:25.892447 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23240: 00 00 00 00 00 00 00 00 00 37 e2 c3 cc 7e 00 00 D0323 22:35:25.892454 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23250: 00 37 e2 c3 cc 7e 00 00 30 be 31 66 7f 24 fb 39 D0323 22:35:25.892457 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23260: 5e 23 3f f7 ef 7e 00 00 5f 23 3f f7 ef 7e 00 00 D0323 22:35:25.892461 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23270: 00 33 e2 c3 cc 7e 00 00 00 20 02 00 00 00 00 00 D0323 22:35:25.892464 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23280: 30 be b1 02 bb a3 62 c4 30 be 6b fe 2e 73 5a 95 D0323 22:35:25.892468 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892472 921384 task_log.go:128] [ 11392: 11396] 7eccc3e232a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892476 921384 task_log.go:128] [ 11392: 11396] 7eccc3e232b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892482 921384 task_log.go:128] [ 11392: 11396] 7eccc3e232c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892485 921384 task_log.go:128] [ 11392: 11396] 7eccc3e232d0: 00 00 00 00 00 00 00 00 00 26 88 03 43 46 c5 16 D0323 22:35:25.892489 921384 task_log.go:128] [ 11392: 11396] 7eccc3e232e0: 00 37 e2 c3 cc 7e 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892492 921384 task_log.go:128] [ 11392: 11396] 7eccc3e232f0: 5e 23 3f f7 ef 7e 00 00 2f f5 ad ab 50 56 00 00 D0323 22:35:25.892496 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892502 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892506 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892510 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892513 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892516 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892520 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892523 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892527 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892531 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892534 921384 task_log.go:128] [ 11392: 11396] 7eccc3e233a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892538 921384 task_log.go:128] [ 11392: 11396] 7eccc3e233b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892541 921384 task_log.go:128] [ 11392: 11396] 7eccc3e233c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892545 921384 task_log.go:128] [ 11392: 11396] 7eccc3e233d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892551 921384 task_log.go:128] [ 11392: 11396] 7eccc3e233e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892555 921384 task_log.go:128] [ 11392: 11396] 7eccc3e233f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892558 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892563 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892567 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892570 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892574 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892579 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892582 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892586 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892589 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892593 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892597 921384 task_log.go:128] [ 11392: 11396] 7eccc3e234a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892601 921384 task_log.go:128] [ 11392: 11396] 7eccc3e234b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892604 921384 task_log.go:128] [ 11392: 11396] 7eccc3e234c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892608 921384 task_log.go:128] [ 11392: 11396] 7eccc3e234d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892611 921384 task_log.go:128] [ 11392: 11396] 7eccc3e234e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892615 921384 task_log.go:128] [ 11392: 11396] 7eccc3e234f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892618 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892622 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892625 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892629 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892632 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892635 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892639 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892644 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892648 921384 task_log.go:128] [ 11392: 11396] 7eccc3e23580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:25.892651 921384 task_log.go:149] [ 11392: 11396] Code: D0323 22:35:25.892655 921384 task_log.go:167] [ 11392: 11396] 5650aba83b80: 48 89 ee 48 89 c2 e8 a5 c2 00 00 48 89 ef 49 89 D0323 22:35:25.892659 921384 task_log.go:167] [ 11392: 11396] 5650aba83b90: c4 e8 7a 26 ff ff 49 39 c4 0f 85 b0 03 00 00 48 D0323 22:35:25.892662 921384 task_log.go:167] [ 11392: 11396] 5650aba83ba0: 8b 44 24 08 89 5c 24 1c c6 80 c8 00 00 00 01 80 D0323 22:35:25.892665 921384 task_log.go:167] [ 11392: 11396] 5650aba83bb0: 3d 07 3b ca 00 00 74 13 48 8b 44 24 08 48 8b 80 D0323 22:35:25.892670 921384 task_log.go:167] [ 11392: 11396] 5650aba83bc0: a8 00 00 00 48 c7 00 00 00 00 00 48 8b 5c 24 08 D0323 22:35:25.892677 921384 task_log.go:167] [ 11392: 11396] 5650aba83bd0: 48 c7 83 88 00 00 00 ff ff ff ff e8 a0 d1 00 00 D0323 22:35:25.892684 921384 task_log.go:167] [ 11392: 11396] 5650aba83be0: c7 00 0e 00 00 00 64 f0 83 04 25 b0 ff ff ff 01 D0323 22:35:25.892690 921384 task_log.go:167] [ 11392: 11396] 5650aba83bf0: 64 48 8b 04 25 00 00 00 00 48 8d b8 e8 fe ff ff D0323 22:35:25.892699 921384 task_log.go:71] [ 11392: 11396] Mappings: VMAs: 00065000-0006a000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d320000-1b2d360000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 5650aba52000-5650aba76000 r--p 00000000 00:08 8 /syz-executor 5650aba76000-5650abb28000 r-xp 00024000 00:08 8 /syz-executor 5650abb28000-5650abb7a000 r--p 000d6000 00:08 8 /syz-executor 5650abb7b000-5650abbd4000 r--p 00128000 00:08 8 /syz-executor 5650abbd4000-5650abbdd000 rw-p 00181000 00:08 8 /syz-executor 5650abbe2000-5650ac72e000 rw-p 00000000 00:00 0 5650ac72e000-5650ac750000 rw-p 00000000 00:00 0 [heap] 7eccc3200000-7eccc3400000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3400000-7eccc3600000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3600000-7eccc3800000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3800000-7eccc3a00000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3a00000-7eccc3e00000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7eccc3e03000-7eccc3e04000 ---p 00000000 00:00 0 7eccc3e04000-7eccc3e24000 rw-p 00000000 00:00 0 7eccc3e24000-7eccc3e25000 ---p 00000000 00:00 0 7eccc3e25000-7eccc3e45000 rw-p 00000000 00:00 0 7eccc3e45000-7eccc3e46000 ---p 00000000 00:00 0 7eccc3e46000-7eccc3e66000 rw-p 00000000 00:00 0 7eccc3e66000-7eccc3e67000 ---p 00000000 00:00 0 7eccc3e67000-7eccc3e87000 rw-p 00000000 00:00 0 7eccc3e87000-7eccc3e88000 r--p 00000000 00:00 0 [vvar] 7eccc3e88000-7eccc3e8a000 r-xp 00000000 00:00 0 7eeff6bf3000-7eeff73f3000 rw-p 00000000 00:00 0 [stack] PMAs: 00065000-00066000 r-xp 035f7000 *pgalloc.MemoryFile 00066000-0006a000 r-xp 00bfa000 *pgalloc.MemoryFile 20000000-20200000 rwxp 07400000 *pgalloc.MemoryFile 1b2d320000-1b2d360000 rw-s 09800000 *pgalloc.MemoryFile 5650aba52000-5650aba76000 r--p 05dc0000 *pgalloc.MemoryFile 5650aba76000-5650aba8f000 r-xs 00024000 *gofer.dentryPlatformFile 5650aba8f000-5650aba90000 r-xp 035fa000 *pgalloc.MemoryFile 5650aba90000-5650aba91000 r-xp 035f8000 *pgalloc.MemoryFile 5650aba91000-5650aba92000 r-xp 00bff000 *pgalloc.MemoryFile 5650aba92000-5650abadb000 r-xs 00040000 *gofer.dentryPlatformFile 5650abadb000-5650abadc000 r-xp 03fff000 *pgalloc.MemoryFile 5650abadc000-5650abadd000 r-xp 035f9000 *pgalloc.MemoryFile 5650abadd000-5650abade000 r-xp 043ff000 *pgalloc.MemoryFile 5650abade000-5650abadf000 r-xp 023f5000 *pgalloc.MemoryFile 5650abadf000-5650abae0000 r-xp 0605c000 *pgalloc.MemoryFile 5650abae0000-5650abb02000 r-xs 0008e000 *gofer.dentryPlatformFile 5650abb02000-5650abb03000 r-xp 062a1000 *pgalloc.MemoryFile 5650abb03000-5650abb04000 r-xp 035ff000 *pgalloc.MemoryFile 5650abb1b000-5650abb1c000 r-xp 035fb000 *pgalloc.MemoryFile 5650abb27000-5650abb28000 r-xp 005fc000 *pgalloc.MemoryFile 5650abb28000-5650abb7a000 r--p 06515000 *pgalloc.MemoryFile 5650abb7b000-5650abbdd000 rw-p 071f0000 *pgalloc.MemoryFile 5650abbe2000-5650abc00000 rw-p 066fc000 *pgalloc.MemoryFile 5650ac600000-5650ac72e000 rw-p 070c2000 *pgalloc.MemoryFile 5650ac72e000-5650ac72f000 rw-p 005ff000 *pgalloc.MemoryFile 5650ac72f000-5650ac750000 rw-p 06b18000 *pgalloc.MemoryFile 7eccc3400000-7eccc3600000 rw-s 0b000000 *pgalloc.MemoryFile 7eccc3600000-7eccc3800000 rw-s 0ae00000 *pgalloc.MemoryFile 7eccc3800000-7eccc3a00000 rw-s 0ac00000 *pgalloc.MemoryFile 7eccc3a00000-7eccc3e00000 r--s 09400000 *pgalloc.MemoryFile 7eccc3e04000-7eccc3e24000 rw-p 06b9a000 *pgalloc.MemoryFile 7eccc3e25000-7eccc3e45000 rw-p 06ae8000 *pgalloc.MemoryFile 7eccc3e46000-7eccc3e66000 rw-p 06ac0000 *pgalloc.MemoryFile 7eccc3e67000-7eccc3e87000 rw-p 0684d000 *pgalloc.MemoryFile 7eccc3e87000-7eccc3e88000 r--s 00002000 *pgalloc.MemoryFile 7eccc3e88000-7eccc3e8a000 r-xs 00000000 *pgalloc.MemoryFile 7eeff7200000-7eeff73ef000 r--p 0a800000 *pgalloc.MemoryFile 7eeff73ef000-7eeff73f1000 r--p 023fe000 *pgalloc.MemoryFile 7eeff73f1000-7eeff73f3000 rw-p 06034000 *pgalloc.MemoryFile D0323 22:35:25.892898 921384 task_log.go:73] [ 11392: 11396] FDTable: fd:216 => name /sys/kernel/debug/kcov fd:217 => name /sys/kernel/debug/kcov fd:220 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:0 => name pipe:[5] fd:1 => name pipe:[5] fd:222 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov fd:201 => name / fd:219 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:226 => name /sys/kernel/debug/kcov fd:215 => name /sys/kernel/debug/kcov fd:218 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:2 => name pipe:[5] fd:200 => name /dev/net/tun D0323 22:35:25.893057 921384 task_signals.go:470] [ 11392: 11396] Notified of signal 11 D0323 22:35:25.893083 921384 task_signals.go:220] [ 11392: 11396] Signal 11: delivering to handler D0323 22:35:25.893239 921384 task_exit.go:204] [ 11392: 11396] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.893318 921384 task_exit.go:204] [ 11392: 11396] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.893330 921384 task_exit.go:204] [ 11392: 11396] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.893380 921384 task_signals.go:204] [ 11392: 11393] Signal 11392, PID: 11393, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.893432 921384 task_exit.go:204] [ 11392: 11393] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.893431 921384 task_signals.go:204] [ 11392: 11392] Signal 11392, PID: 11392, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.893458 921384 task_exit.go:204] [ 11392: 11392] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.893472 921384 task_signals.go:204] [ 11392: 11394] Signal 11392, PID: 11394, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.893480 921384 task_exit.go:204] [ 11392: 11392] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.893489 921384 task_exit.go:204] [ 11392: 11394] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.893476 921384 task_signals.go:204] [ 11392: 11395] Signal 11392, PID: 11395, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.893509 921384 task_exit.go:204] [ 11392: 11394] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.893560 921384 task_exit.go:204] [ 11392: 11394] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.893605 921384 task_exit.go:204] [ 11392: 11395] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.893636 921384 task_exit.go:204] [ 11392: 11393] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.893662 921384 task_exit.go:204] [ 11392: 11393] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.900698 921384 task_exit.go:204] [ 11392: 11395] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.900733 921384 task_exit.go:204] [ 11392: 11395] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.900758 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.901837 921384 task_exit.go:204] [ 11392: 11392] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x101000) D0323 22:35:25.903411 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.903559 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.913572 921384 usertrap_amd64.go:212] [ 11397: 11397] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.913605 921384 usertrap_amd64.go:122] [ 11397: 11397] Allocate a new trap: 0xc00049ab10 39 D0323 22:35:25.913691 921384 usertrap_amd64.go:225] [ 11397: 11397] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.914910 921384 usertrap_amd64.go:212] [ 11397: 11397] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.914986 921384 usertrap_amd64.go:122] [ 11397: 11397] Allocate a new trap: 0xc00049ab10 40 D0323 22:35:25.915024 921384 usertrap_amd64.go:225] [ 11397: 11397] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.915683 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.915910 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.922741 921384 usertrap_amd64.go:212] [ 11397: 11397] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.922787 921384 usertrap_amd64.go:122] [ 11397: 11397] Allocate a new trap: 0xc00049ab10 41 D0323 22:35:25.922805 921384 usertrap_amd64.go:225] [ 11397: 11397] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.929667 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.929851 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.933246 921384 usertrap_amd64.go:212] [ 11397: 11398] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.933332 921384 usertrap_amd64.go:122] [ 11397: 11398] Allocate a new trap: 0xc00049ab10 42 D0323 22:35:25.933351 921384 usertrap_amd64.go:225] [ 11397: 11398] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.937113 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.937315 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.940377 921384 usertrap_amd64.go:212] [ 11397: 11397] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.940412 921384 usertrap_amd64.go:122] [ 11397: 11397] Allocate a new trap: 0xc00049ab10 43 D0323 22:35:25.940428 921384 usertrap_amd64.go:225] [ 11397: 11397] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.941196 921384 task_exit.go:204] [ 11397: 11397] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.941258 921384 task_exit.go:204] [ 11397: 11397] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.941297 921384 task_signals.go:204] [ 11397: 11398] Signal 11397, PID: 11398, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.941331 921384 task_exit.go:204] [ 11397: 11398] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.943576 921384 task_exit.go:204] [ 11397: 11398] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.943613 921384 task_exit.go:204] [ 11397: 11398] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.943627 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.944473 921384 task_exit.go:204] [ 11397: 11397] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x101000) D0323 22:35:25.946277 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.946428 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.954682 921384 usertrap_amd64.go:212] [ 11399: 11399] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.954706 921384 usertrap_amd64.go:122] [ 11399: 11399] Allocate a new trap: 0xc008070fc0 39 D0323 22:35:25.954816 921384 usertrap_amd64.go:225] [ 11399: 11399] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.955446 921384 usertrap_amd64.go:212] [ 11399: 11399] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.955466 921384 usertrap_amd64.go:122] [ 11399: 11399] Allocate a new trap: 0xc008070fc0 40 D0323 22:35:25.955474 921384 usertrap_amd64.go:225] [ 11399: 11399] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.956015 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.956179 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.958539 921384 usertrap_amd64.go:212] [ 11399: 11399] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.958565 921384 usertrap_amd64.go:122] [ 11399: 11399] Allocate a new trap: 0xc008070fc0 41 D0323 22:35:25.958573 921384 usertrap_amd64.go:225] [ 11399: 11399] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.963165 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.963401 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.963942 921384 usertrap_amd64.go:212] [ 11399: 11400] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.963969 921384 usertrap_amd64.go:122] [ 11399: 11400] Allocate a new trap: 0xc008070fc0 42 D0323 22:35:25.963985 921384 usertrap_amd64.go:225] [ 11399: 11400] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.964280 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.964421 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.964839 921384 usertrap_amd64.go:212] [ 11399: 11399] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.964881 921384 usertrap_amd64.go:122] [ 11399: 11399] Allocate a new trap: 0xc008070fc0 43 D0323 22:35:25.964892 921384 usertrap_amd64.go:225] [ 11399: 11399] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.965408 921384 task_exit.go:204] [ 11399: 11399] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.965442 921384 task_exit.go:204] [ 11399: 11399] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.965554 921384 task_signals.go:204] [ 11399: 11400] Signal 11399, PID: 11400, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.965609 921384 task_exit.go:204] [ 11399: 11400] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.970772 921384 task_exit.go:204] [ 11399: 11400] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.970808 921384 task_exit.go:204] [ 11399: 11400] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.970824 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.971303 921384 task_exit.go:204] [ 11399: 11399] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x101000) D0323 22:35:25.972444 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.972756 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.983141 921384 usertrap_amd64.go:212] [ 11401: 11401] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:25.983172 921384 usertrap_amd64.go:122] [ 11401: 11401] Allocate a new trap: 0xc00787f8f0 39 D0323 22:35:25.983314 921384 usertrap_amd64.go:225] [ 11401: 11401] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:25.983949 921384 usertrap_amd64.go:212] [ 11401: 11401] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:25.983992 921384 usertrap_amd64.go:122] [ 11401: 11401] Allocate a new trap: 0xc00787f8f0 40 D0323 22:35:25.984003 921384 usertrap_amd64.go:225] [ 11401: 11401] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:25.984526 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:25.984768 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.987030 921384 usertrap_amd64.go:212] [ 11401: 11401] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:25.987059 921384 usertrap_amd64.go:122] [ 11401: 11401] Allocate a new trap: 0xc00787f8f0 41 D0323 22:35:25.987070 921384 usertrap_amd64.go:225] [ 11401: 11401] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:25.992320 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.992476 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.993204 921384 usertrap_amd64.go:212] [ 11401: 11402] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:25.993284 921384 usertrap_amd64.go:122] [ 11401: 11402] Allocate a new trap: 0xc00787f8f0 42 D0323 22:35:25.993318 921384 usertrap_amd64.go:225] [ 11401: 11402] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:25.993697 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:25.993812 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:25.994451 921384 usertrap_amd64.go:212] [ 11401: 11401] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:25.994480 921384 usertrap_amd64.go:122] [ 11401: 11401] Allocate a new trap: 0xc00787f8f0 43 D0323 22:35:25.994492 921384 usertrap_amd64.go:225] [ 11401: 11401] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:25.995151 921384 task_exit.go:204] [ 11401: 11401] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.995189 921384 task_exit.go:204] [ 11401: 11401] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.995267 921384 task_signals.go:204] [ 11401: 11402] Signal 11401, PID: 11402, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:25.995305 921384 task_exit.go:204] [ 11401: 11402] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:25.996780 921384 task_exit.go:204] [ 11401: 11402] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:25.996822 921384 task_exit.go:204] [ 11401: 11402] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:25.996841 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:25.997593 921384 task_exit.go:204] [ 11401: 11401] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r1, 0x68040) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) syz_open_pts(r1, 0x56140) D0323 22:35:26.001837 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.002012 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.013627 921384 usertrap_amd64.go:212] [ 11403: 11403] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.013654 921384 usertrap_amd64.go:122] [ 11403: 11403] Allocate a new trap: 0xc00049ac90 39 D0323 22:35:26.013743 921384 usertrap_amd64.go:225] [ 11403: 11403] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.014335 921384 usertrap_amd64.go:212] [ 11403: 11403] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.014370 921384 usertrap_amd64.go:122] [ 11403: 11403] Allocate a new trap: 0xc00049ac90 40 D0323 22:35:26.014382 921384 usertrap_amd64.go:225] [ 11403: 11403] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.015132 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.015331 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.017879 921384 usertrap_amd64.go:212] [ 11403: 11403] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.017966 921384 usertrap_amd64.go:122] [ 11403: 11403] Allocate a new trap: 0xc00049ac90 41 D0323 22:35:26.017996 921384 usertrap_amd64.go:225] [ 11403: 11403] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.023773 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.024078 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.025898 921384 usertrap_amd64.go:212] [ 11403: 11404] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.025925 921384 usertrap_amd64.go:122] [ 11403: 11404] Allocate a new trap: 0xc00049ac90 42 D0323 22:35:26.025938 921384 usertrap_amd64.go:225] [ 11403: 11404] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.026615 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.026735 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.030388 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.030502 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.032228 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.032337 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.033186 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.033413 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.034896 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.035064 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.035617 921384 usertrap_amd64.go:212] [ 11403: 11403] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.035666 921384 usertrap_amd64.go:122] [ 11403: 11403] Allocate a new trap: 0xc00049ac90 43 D0323 22:35:26.035687 921384 usertrap_amd64.go:225] [ 11403: 11403] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.036360 921384 task_exit.go:204] [ 11403: 11403] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.036429 921384 task_exit.go:204] [ 11403: 11403] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.036461 921384 task_signals.go:204] [ 11403: 11404] Signal 11403, PID: 11404, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.036498 921384 task_exit.go:204] [ 11403: 11404] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.037810 921384 task_exit.go:204] [ 11403: 11404] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.037846 921384 task_exit.go:204] [ 11403: 11404] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.037866 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.038621 921384 task_exit.go:204] [ 11403: 11403] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r1, 0x68040) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) syz_open_pts(r1, 0x56140) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) syz_open_pts(r0, 0x0) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) syz_open_pts(r1, 0x68040) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) (async) write$P9_RUNLINKAT(r2, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) (async) syz_open_pts(r1, 0x56140) (async) D0323 22:35:26.041210 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.041374 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.050955 921384 usertrap_amd64.go:212] [ 11405: 11405] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.051012 921384 usertrap_amd64.go:122] [ 11405: 11405] Allocate a new trap: 0xc008071110 39 D0323 22:35:26.051894 921384 usertrap_amd64.go:225] [ 11405: 11405] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.052440 921384 usertrap_amd64.go:212] [ 11405: 11405] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.052471 921384 usertrap_amd64.go:122] [ 11405: 11405] Allocate a new trap: 0xc008071110 40 D0323 22:35:26.052483 921384 usertrap_amd64.go:225] [ 11405: 11405] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.053411 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.053609 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.055316 921384 usertrap_amd64.go:212] [ 11405: 11405] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.055340 921384 usertrap_amd64.go:122] [ 11405: 11405] Allocate a new trap: 0xc008071110 41 D0323 22:35:26.055353 921384 usertrap_amd64.go:225] [ 11405: 11405] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.061228 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.061434 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.062011 921384 usertrap_amd64.go:212] [ 11405: 11406] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.062041 921384 usertrap_amd64.go:122] [ 11405: 11406] Allocate a new trap: 0xc008071110 42 D0323 22:35:26.062054 921384 usertrap_amd64.go:225] [ 11405: 11406] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.062359 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.062455 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.063217 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.063371 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.063727 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.063831 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.064075 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.064184 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.064504 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.064579 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.064925 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.065574 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.066352 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.066501 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.067891 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.068103 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.070802 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.071255 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.071466 921384 usertrap_amd64.go:212] [ 11405: 11405] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:26.071482 921384 usertrap_amd64.go:122] [ 11405: 11405] Allocate a new trap: 0xc008071110 43 D0323 22:35:26.071491 921384 usertrap_amd64.go:225] [ 11405: 11405] Apply the binary patch addr 5650abb02e1a trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.072218 921384 task_run.go:312] [ 11405: 11409] Unhandled user fault: addr=0 ip=5650aba83bc4 access=r-- sig=11 err=bad address D0323 22:35:26.072323 921384 task_log.go:87] [ 11405: 11409] Registers: D0323 22:35:26.072368 921384 task_log.go:94] [ 11405: 11409] Cs = 0000000000000033 D0323 22:35:26.072401 921384 task_log.go:94] [ 11405: 11409] Ds = 0000000000000000 D0323 22:35:26.072429 921384 task_log.go:94] [ 11405: 11409] Eflags = 0000000000010202 D0323 22:35:26.072454 921384 task_log.go:94] [ 11405: 11409] Es = 0000000000000000 D0323 22:35:26.072483 921384 task_log.go:94] [ 11405: 11409] Fs = 0000000000000000 D0323 22:35:26.072508 921384 task_log.go:94] [ 11405: 11409] Fs_base = 00007eccc3e23700 D0323 22:35:26.072550 921384 task_log.go:94] [ 11405: 11409] Gs = 0000000000000000 D0323 22:35:26.072595 921384 task_log.go:94] [ 11405: 11409] Gs_base = 00007ffbf6d1f000 D0323 22:35:26.072639 921384 task_log.go:94] [ 11405: 11409] Orig_rax = ffffffffffffffff D0323 22:35:26.072702 921384 task_log.go:94] [ 11405: 11409] R10 = 00100b6ac3c5c1af D0323 22:35:26.072746 921384 task_log.go:94] [ 11405: 11409] R11 = 00000000861c4b36 D0323 22:35:26.072793 921384 task_log.go:94] [ 11405: 11409] R12 = 0000000000000000 D0323 22:35:26.072842 921384 task_log.go:94] [ 11405: 11409] R13 = 00007eeff73f235f D0323 22:35:26.072869 921384 task_log.go:94] [ 11405: 11409] R14 = 00007eccc3e23300 D0323 22:35:26.072877 921384 task_log.go:94] [ 11405: 11409] R15 = 0000000000022000 D0323 22:35:26.072882 921384 task_log.go:94] [ 11405: 11409] R8 = 0000000006623a67 D0323 22:35:26.072887 921384 task_log.go:94] [ 11405: 11409] R9 = 00000000000001ce D0323 22:35:26.072892 921384 task_log.go:94] [ 11405: 11409] Rax = 0000000000000000 D0323 22:35:26.072898 921384 task_log.go:94] [ 11405: 11409] Rbp = 00005650abb39b39 D0323 22:35:26.072904 921384 task_log.go:94] [ 11405: 11409] Rbx = 0000000000000003 D0323 22:35:26.072909 921384 task_log.go:94] [ 11405: 11409] Rcx = 00005650abb49184 D0323 22:35:26.072915 921384 task_log.go:94] [ 11405: 11409] Rdi = 00005650abb38941 D0323 22:35:26.072921 921384 task_log.go:94] [ 11405: 11409] Rdx = 0000000000037dac D0323 22:35:26.072927 921384 task_log.go:94] [ 11405: 11409] Rip = 00005650aba83bc4 D0323 22:35:26.073015 921384 task_log.go:94] [ 11405: 11409] Rsi = 0000000000000007 D0323 22:35:26.073026 921384 task_log.go:94] [ 11405: 11409] Rsp = 00007eccc3e23190 D0323 22:35:26.073032 921384 task_log.go:94] [ 11405: 11409] Ss = 000000000000002b D0323 22:35:26.073040 921384 task_log.go:111] [ 11405: 11409] Stack: D0323 22:35:26.073049 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23190: 00 00 00 00 00 00 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:26.073193 921384 task_log.go:128] [ 11405: 11409] 7eccc3e231a0: 00 00 00 00 00 00 00 00 8f 10 00 00 ff ff ff ff D0323 22:35:26.073200 921384 task_log.go:128] [ 11405: 11409] 7eccc3e231b0: 00 00 00 00 00 00 00 00 70 e3 bc ab 50 56 00 00 D0323 22:35:26.073243 921384 task_log.go:128] [ 11405: 11409] 7eccc3e231c0: e6 00 00 00 00 00 00 00 67 3a 62 06 00 00 00 00 D0323 22:35:26.073251 921384 task_log.go:128] [ 11405: 11409] 7eccc3e231d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073258 921384 task_log.go:128] [ 11405: 11409] 7eccc3e231e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073300 921384 task_log.go:128] [ 11405: 11409] 7eccc3e231f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073315 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23200: f8 e1 bf ab 50 56 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:26.073321 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23210: fc e1 bf ab 50 56 00 00 e4 7a a8 ab 50 56 00 00 D0323 22:35:26.073327 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073333 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23230: 5e 23 3f f7 ef 7e 00 00 87 cc a8 ab 50 56 00 00 D0323 22:35:26.073379 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23240: 00 00 00 00 00 00 00 00 00 37 e2 c3 cc 7e 00 00 D0323 22:35:26.073388 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23250: 00 37 e2 c3 cc 7e 00 00 30 be 31 66 7f 24 fb 39 D0323 22:35:26.073396 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23260: 5e 23 3f f7 ef 7e 00 00 5f 23 3f f7 ef 7e 00 00 D0323 22:35:26.073428 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23270: 00 33 e2 c3 cc 7e 00 00 00 20 02 00 00 00 00 00 D0323 22:35:26.073472 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23280: 30 be b1 02 bb a3 62 c4 30 be 6b fe 2e 73 5a 95 D0323 22:35:26.073614 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073668 921384 task_log.go:128] [ 11405: 11409] 7eccc3e232a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073713 921384 task_log.go:128] [ 11405: 11409] 7eccc3e232b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073759 921384 task_log.go:128] [ 11405: 11409] 7eccc3e232c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073774 921384 task_log.go:128] [ 11405: 11409] 7eccc3e232d0: 00 00 00 00 00 00 00 00 00 26 88 03 43 46 c5 16 D0323 22:35:26.073778 921384 task_log.go:128] [ 11405: 11409] 7eccc3e232e0: 00 37 e2 c3 cc 7e 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073784 921384 task_log.go:128] [ 11405: 11409] 7eccc3e232f0: 5e 23 3f f7 ef 7e 00 00 2f f5 ad ab 50 56 00 00 D0323 22:35:26.073790 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073794 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073798 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073803 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073807 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073813 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073817 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073822 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073828 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073832 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073844 921384 task_log.go:128] [ 11405: 11409] 7eccc3e233a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073860 921384 task_log.go:128] [ 11405: 11409] 7eccc3e233b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073871 921384 task_log.go:128] [ 11405: 11409] 7eccc3e233c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073876 921384 task_log.go:128] [ 11405: 11409] 7eccc3e233d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073881 921384 task_log.go:128] [ 11405: 11409] 7eccc3e233e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073885 921384 task_log.go:128] [ 11405: 11409] 7eccc3e233f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073890 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073894 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073899 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073923 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073933 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073940 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073958 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073973 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073978 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073982 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073987 921384 task_log.go:128] [ 11405: 11409] 7eccc3e234a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073992 921384 task_log.go:128] [ 11405: 11409] 7eccc3e234b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.073997 921384 task_log.go:128] [ 11405: 11409] 7eccc3e234c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074002 921384 task_log.go:128] [ 11405: 11409] 7eccc3e234d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074006 921384 task_log.go:128] [ 11405: 11409] 7eccc3e234e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074011 921384 task_log.go:128] [ 11405: 11409] 7eccc3e234f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074016 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074020 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074034 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074038 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074043 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074048 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074052 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074057 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074062 921384 task_log.go:128] [ 11405: 11409] 7eccc3e23580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.074067 921384 task_log.go:149] [ 11405: 11409] Code: D0323 22:35:26.074072 921384 task_log.go:167] [ 11405: 11409] 5650aba83b80: 48 89 ee 48 89 c2 e8 a5 c2 00 00 48 89 ef 49 89 D0323 22:35:26.074083 921384 task_log.go:167] [ 11405: 11409] 5650aba83b90: c4 e8 7a 26 ff ff 49 39 c4 0f 85 b0 03 00 00 48 D0323 22:35:26.074088 921384 task_log.go:167] [ 11405: 11409] 5650aba83ba0: 8b 44 24 08 89 5c 24 1c c6 80 c8 00 00 00 01 80 D0323 22:35:26.074092 921384 task_log.go:167] [ 11405: 11409] 5650aba83bb0: 3d 07 3b ca 00 00 74 13 48 8b 44 24 08 48 8b 80 D0323 22:35:26.074096 921384 task_log.go:167] [ 11405: 11409] 5650aba83bc0: a8 00 00 00 48 c7 00 00 00 00 00 48 8b 5c 24 08 D0323 22:35:26.074101 921384 task_log.go:167] [ 11405: 11409] 5650aba83bd0: 48 c7 83 88 00 00 00 ff ff ff ff e8 a0 d1 00 00 D0323 22:35:26.074105 921384 task_log.go:167] [ 11405: 11409] 5650aba83be0: c7 00 0e 00 00 00 64 f0 83 04 25 b0 ff ff ff 01 D0323 22:35:26.074109 921384 task_log.go:167] [ 11405: 11409] 5650aba83bf0: 64 48 8b 04 25 00 00 00 00 48 8d b8 e8 fe ff ff D0323 22:35:26.074115 921384 task_log.go:71] [ 11405: 11409] Mappings: VMAs: 00065000-0006a000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d320000-1b2d360000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 5650aba52000-5650aba76000 r--p 00000000 00:08 8 /syz-executor 5650aba76000-5650abb28000 r-xp 00024000 00:08 8 /syz-executor 5650abb28000-5650abb7a000 r--p 000d6000 00:08 8 /syz-executor 5650abb7b000-5650abbd4000 r--p 00128000 00:08 8 /syz-executor 5650abbd4000-5650abbdd000 rw-p 00181000 00:08 8 /syz-executor 5650abbe2000-5650ac72e000 rw-p 00000000 00:00 0 5650ac72e000-5650ac750000 rw-p 00000000 00:00 0 [heap] 7eccc3200000-7eccc3400000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3400000-7eccc3600000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3600000-7eccc3800000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3800000-7eccc3a00000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3a00000-7eccc3e00000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7eccc3e03000-7eccc3e04000 ---p 00000000 00:00 0 7eccc3e04000-7eccc3e24000 rw-p 00000000 00:00 0 7eccc3e24000-7eccc3e25000 ---p 00000000 00:00 0 7eccc3e25000-7eccc3e45000 rw-p 00000000 00:00 0 7eccc3e45000-7eccc3e46000 ---p 00000000 00:00 0 7eccc3e46000-7eccc3e66000 rw-p 00000000 00:00 0 7eccc3e66000-7eccc3e67000 ---p 00000000 00:00 0 7eccc3e67000-7eccc3e87000 rw-p 00000000 00:00 0 7eccc3e87000-7eccc3e88000 r--p 00000000 00:00 0 [vvar] 7eccc3e88000-7eccc3e8a000 r-xp 00000000 00:00 0 7eeff6bf3000-7eeff73f3000 rw-p 00000000 00:00 0 [stack] PMAs: 00065000-00066000 r-xp 035f7000 *pgalloc.MemoryFile 00066000-0006a000 r-xp 00bfa000 *pgalloc.MemoryFile 20000000-20200000 rwxp 07400000 *pgalloc.MemoryFile 1b2d320000-1b2d360000 rw-s 09800000 *pgalloc.MemoryFile 5650aba52000-5650aba76000 r--p 05dc0000 *pgalloc.MemoryFile 5650aba76000-5650aba8f000 r-xs 00024000 *gofer.dentryPlatformFile 5650aba8f000-5650aba90000 r-xp 035fa000 *pgalloc.MemoryFile 5650aba90000-5650aba91000 r-xp 062a1000 *pgalloc.MemoryFile 5650aba91000-5650aba92000 r-xp 00bff000 *pgalloc.MemoryFile 5650aba92000-5650abadb000 r-xs 00040000 *gofer.dentryPlatformFile 5650abadb000-5650abadc000 r-xp 03fff000 *pgalloc.MemoryFile 5650abadc000-5650abadd000 r-xp 035f9000 *pgalloc.MemoryFile 5650abadd000-5650abade000 r-xp 043ff000 *pgalloc.MemoryFile 5650abade000-5650abadf000 r-xp 023f5000 *pgalloc.MemoryFile 5650abadf000-5650abae0000 r-xp 0605c000 *pgalloc.MemoryFile 5650abae0000-5650abb02000 r-xs 0008e000 *gofer.dentryPlatformFile 5650abb02000-5650abb03000 r-xp 062ac000 *pgalloc.MemoryFile 5650abb03000-5650abb04000 r-xp 035ff000 *pgalloc.MemoryFile 5650abb1b000-5650abb1c000 r-xp 035fb000 *pgalloc.MemoryFile 5650abb27000-5650abb28000 r-xp 005fc000 *pgalloc.MemoryFile 5650abb28000-5650abb7a000 r--p 06515000 *pgalloc.MemoryFile 5650abb7b000-5650abbdd000 rw-p 071f0000 *pgalloc.MemoryFile 5650abbe2000-5650abc00000 rw-p 066fc000 *pgalloc.MemoryFile 5650ac600000-5650ac72e000 rw-p 070c2000 *pgalloc.MemoryFile 5650ac72e000-5650ac72f000 rw-p 005ff000 *pgalloc.MemoryFile 5650ac72f000-5650ac750000 rw-p 06b18000 *pgalloc.MemoryFile 7eccc3600000-7eccc3800000 rw-s 0ae00000 *pgalloc.MemoryFile 7eccc3800000-7eccc3a00000 rw-s 0ac00000 *pgalloc.MemoryFile 7eccc3a00000-7eccc3e00000 r--s 09400000 *pgalloc.MemoryFile 7eccc3e04000-7eccc3e24000 rw-p 06b9a000 *pgalloc.MemoryFile 7eccc3e25000-7eccc3e45000 rw-p 06ae8000 *pgalloc.MemoryFile 7eccc3e46000-7eccc3e66000 rw-p 06ac0000 *pgalloc.MemoryFile 7eccc3e67000-7eccc3e87000 rw-p 0684d000 *pgalloc.MemoryFile 7eccc3e87000-7eccc3e88000 r--s 00002000 *pgalloc.MemoryFile 7eccc3e88000-7eccc3e8a000 r-xs 00000000 *pgalloc.MemoryFile 7eeff7200000-7eeff73ef000 r--p 0a800000 *pgalloc.MemoryFile 7eeff73ef000-7eeff73f1000 r--p 023fe000 *pgalloc.MemoryFile 7eeff73f1000-7eeff73f3000 rw-p 035fd000 *pgalloc.MemoryFile D0323 22:35:26.074271 921384 task_log.go:73] [ 11405: 11409] FDTable: fd:4 => name /dev/pts/270 fd:9 => name /dev/pts/ptmx fd:10 => name /dev/null fd:200 => name /dev/net/tun fd:220 => name /sys/kernel/debug/kcov fd:1 => name pipe:[5] fd:6 => name /dev/pts/271 fd:8 => name /dev/pts/ptmx fd:222 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:226 => name /sys/kernel/debug/kcov fd:5 => name /dev/pts/ptmx fd:3 => name /dev/pts/ptmx fd:201 => name / fd:215 => name /sys/kernel/debug/kcov fd:219 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov fd:2 => name pipe:[5] fd:7 => name /dev/null fd:216 => name /sys/kernel/debug/kcov fd:217 => name /sys/kernel/debug/kcov fd:218 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:0 => name pipe:[5] D0323 22:35:26.074330 921384 task_signals.go:470] [ 11405: 11409] Notified of signal 11 D0323 22:35:26.074342 921384 task_signals.go:220] [ 11405: 11409] Signal 11: delivering to handler D0323 22:35:26.074643 921384 task_exit.go:204] [ 11405: 11409] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.074751 921384 task_signals.go:204] [ 11405: 11405] Signal 11405, PID: 11405, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.074780 921384 task_signals.go:204] [ 11405: 11407] Signal 11405, PID: 11407, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.074795 921384 task_signals.go:204] [ 11405: 11408] Signal 11405, PID: 11408, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.074800 921384 task_signals.go:204] [ 11405: 11406] Signal 11405, PID: 11406, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.074814 921384 task_exit.go:204] [ 11405: 11409] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.074824 921384 task_exit.go:204] [ 11405: 11409] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.074946 921384 task_exit.go:204] [ 11405: 11405] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.074974 921384 task_exit.go:204] [ 11405: 11405] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.074989 921384 task_exit.go:204] [ 11405: 11407] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.074996 921384 task_exit.go:204] [ 11405: 11407] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.075000 921384 task_exit.go:204] [ 11405: 11407] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.075021 921384 task_exit.go:204] [ 11405: 11408] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.075028 921384 task_exit.go:204] [ 11405: 11408] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.075032 921384 task_exit.go:204] [ 11405: 11408] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.075041 921384 task_exit.go:204] [ 11405: 11406] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.083376 921384 task_exit.go:204] [ 11405: 11406] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.083408 921384 task_exit.go:204] [ 11405: 11406] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.083428 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.083531 921384 task_exit.go:204] [ 11405: 11405] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r1, 0x68040) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) syz_open_pts(r1, 0x56140) D0323 22:35:26.089452 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.090784 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.102058 921384 usertrap_amd64.go:212] [ 11410: 11410] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.102109 921384 usertrap_amd64.go:122] [ 11410: 11410] Allocate a new trap: 0xc00049b200 39 D0323 22:35:26.102228 921384 usertrap_amd64.go:225] [ 11410: 11410] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.102982 921384 usertrap_amd64.go:212] [ 11410: 11410] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.103014 921384 usertrap_amd64.go:122] [ 11410: 11410] Allocate a new trap: 0xc00049b200 40 D0323 22:35:26.103028 921384 usertrap_amd64.go:225] [ 11410: 11410] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.103782 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.103969 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.106784 921384 usertrap_amd64.go:212] [ 11410: 11410] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.106822 921384 usertrap_amd64.go:122] [ 11410: 11410] Allocate a new trap: 0xc00049b200 41 D0323 22:35:26.106834 921384 usertrap_amd64.go:225] [ 11410: 11410] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.113169 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.113437 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.114048 921384 usertrap_amd64.go:212] [ 11410: 11411] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.114083 921384 usertrap_amd64.go:122] [ 11410: 11411] Allocate a new trap: 0xc00049b200 42 D0323 22:35:26.114104 921384 usertrap_amd64.go:225] [ 11410: 11411] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.114459 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.118003 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.119506 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.125703 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.126167 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.126350 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.126898 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.127465 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.127731 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.127832 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.128392 921384 usertrap_amd64.go:212] [ 11410: 11410] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.128424 921384 usertrap_amd64.go:122] [ 11410: 11410] Allocate a new trap: 0xc00049b200 43 D0323 22:35:26.128444 921384 usertrap_amd64.go:225] [ 11410: 11410] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.128832 921384 task_exit.go:204] [ 11410: 11410] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.128874 921384 task_exit.go:204] [ 11410: 11410] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.128926 921384 task_signals.go:204] [ 11410: 11411] Signal 11410, PID: 11411, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.129255 921384 task_exit.go:204] [ 11410: 11411] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.131021 921384 task_exit.go:204] [ 11410: 11411] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.131060 921384 task_exit.go:204] [ 11410: 11411] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.131080 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.132604 921384 task_exit.go:204] [ 11410: 11410] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x82000, 0x0) syz_open_pts(r0, 0x2a0000) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:26.133713 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.133817 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.142421 921384 usertrap_amd64.go:212] [ 11412: 11412] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.142454 921384 usertrap_amd64.go:122] [ 11412: 11412] Allocate a new trap: 0xc00787fb00 39 D0323 22:35:26.142529 921384 usertrap_amd64.go:225] [ 11412: 11412] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.143257 921384 usertrap_amd64.go:212] [ 11412: 11412] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.143284 921384 usertrap_amd64.go:122] [ 11412: 11412] Allocate a new trap: 0xc00787fb00 40 D0323 22:35:26.143297 921384 usertrap_amd64.go:225] [ 11412: 11412] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.144275 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.144921 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.148230 921384 usertrap_amd64.go:212] [ 11412: 11412] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.148344 921384 usertrap_amd64.go:122] [ 11412: 11412] Allocate a new trap: 0xc00787fb00 41 D0323 22:35:26.148443 921384 usertrap_amd64.go:225] [ 11412: 11412] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.157473 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.157731 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.160437 921384 usertrap_amd64.go:212] [ 11412: 11413] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.160489 921384 usertrap_amd64.go:122] [ 11412: 11413] Allocate a new trap: 0xc00787fb00 42 D0323 22:35:26.160509 921384 usertrap_amd64.go:225] [ 11412: 11413] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.161201 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.165101 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.169584 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.169703 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.170424 921384 usertrap_amd64.go:212] [ 11412: 11412] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.170451 921384 usertrap_amd64.go:122] [ 11412: 11412] Allocate a new trap: 0xc00787fb00 43 D0323 22:35:26.170464 921384 usertrap_amd64.go:225] [ 11412: 11412] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.171066 921384 task_exit.go:204] [ 11412: 11412] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.171116 921384 task_exit.go:204] [ 11412: 11412] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.171577 921384 task_signals.go:204] [ 11412: 11413] Signal 11412, PID: 11413, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.171622 921384 task_exit.go:204] [ 11412: 11413] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.173356 921384 task_exit.go:204] [ 11412: 11413] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.173399 921384 task_exit.go:204] [ 11412: 11413] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.173416 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.174513 921384 task_exit.go:204] [ 11412: 11412] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.175823 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.175985 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x82000, 0x0) syz_open_pts(r0, 0x2a0000) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) syz_open_pts(r0, 0x0) D0323 22:35:26.189250 921384 usertrap_amd64.go:212] [ 11414: 11414] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.189284 921384 usertrap_amd64.go:122] [ 11414: 11414] Allocate a new trap: 0xc00592f8c0 39 D0323 22:35:26.189428 921384 usertrap_amd64.go:225] [ 11414: 11414] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.190848 921384 usertrap_amd64.go:212] [ 11414: 11414] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.190875 921384 usertrap_amd64.go:122] [ 11414: 11414] Allocate a new trap: 0xc00592f8c0 40 D0323 22:35:26.190906 921384 usertrap_amd64.go:225] [ 11414: 11414] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.191505 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.191737 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.197620 921384 usertrap_amd64.go:212] [ 11414: 11414] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.197648 921384 usertrap_amd64.go:122] [ 11414: 11414] Allocate a new trap: 0xc00592f8c0 41 D0323 22:35:26.197663 921384 usertrap_amd64.go:225] [ 11414: 11414] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.205583 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.205753 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.206413 921384 usertrap_amd64.go:212] [ 11414: 11415] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.206758 921384 usertrap_amd64.go:122] [ 11414: 11415] Allocate a new trap: 0xc00592f8c0 42 D0323 22:35:26.206822 921384 usertrap_amd64.go:225] [ 11414: 11415] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.208113 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.208287 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.216271 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.216522 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.216780 921384 usertrap_amd64.go:212] [ 11414: 11414] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.216845 921384 usertrap_amd64.go:122] [ 11414: 11414] Allocate a new trap: 0xc00592f8c0 43 D0323 22:35:26.216863 921384 usertrap_amd64.go:225] [ 11414: 11414] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.217493 921384 task_exit.go:204] [ 11414: 11414] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.217553 921384 task_signals.go:204] [ 11414: 11417] Signal 11414, PID: 11417, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.217542 921384 task_signals.go:204] [ 11414: 11415] Signal 11414, PID: 11415, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.217570 921384 task_exit.go:204] [ 11414: 11417] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.217590 921384 task_exit.go:204] [ 11414: 11417] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.217589 921384 task_signals.go:204] [ 11414: 11416] Signal 11414, PID: 11416, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.217597 921384 task_exit.go:204] [ 11414: 11417] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.217640 921384 task_exit.go:204] [ 11414: 11415] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.217673 921384 task_exit.go:204] [ 11414: 11415] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.217682 921384 task_exit.go:204] [ 11414: 11415] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.217702 921384 task_exit.go:204] [ 11414: 11416] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.217736 921384 task_exit.go:204] [ 11414: 11416] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.217743 921384 task_exit.go:204] [ 11414: 11416] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.222482 921384 task_exit.go:204] [ 11414: 11414] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.222524 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.223611 921384 task_exit.go:204] [ 11414: 11414] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x82000, 0x0) syz_open_pts(r0, 0x2a0000) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 64) syz_open_pts(r0, 0x0) (rerun: 64) D0323 22:35:26.225798 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.225971 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.238100 921384 usertrap_amd64.go:212] [ 11418: 11418] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.238155 921384 usertrap_amd64.go:122] [ 11418: 11418] Allocate a new trap: 0xc00787ff50 39 D0323 22:35:26.238237 921384 usertrap_amd64.go:225] [ 11418: 11418] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.240158 921384 usertrap_amd64.go:212] [ 11418: 11418] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.240183 921384 usertrap_amd64.go:122] [ 11418: 11418] Allocate a new trap: 0xc00787ff50 40 D0323 22:35:26.240196 921384 usertrap_amd64.go:225] [ 11418: 11418] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.240848 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.241091 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.245288 921384 usertrap_amd64.go:212] [ 11418: 11418] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.245320 921384 usertrap_amd64.go:122] [ 11418: 11418] Allocate a new trap: 0xc00787ff50 41 D0323 22:35:26.245334 921384 usertrap_amd64.go:225] [ 11418: 11418] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.249435 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.249710 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.250538 921384 usertrap_amd64.go:212] [ 11418: 11419] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.250608 921384 usertrap_amd64.go:122] [ 11418: 11419] Allocate a new trap: 0xc00787ff50 42 D0323 22:35:26.250687 921384 usertrap_amd64.go:225] [ 11418: 11419] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.255190 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.255381 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.256354 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.256429 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.256615 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.256683 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.256767 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.256864 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.256990 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.257204 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.257327 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.257448 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.257671 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.257803 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.257884 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.258008 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.258075 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.258137 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.258192 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.258312 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.258365 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.258516 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.258653 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.259266 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.259532 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.259787 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.259950 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.260098 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.260212 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.260378 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.260498 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.260585 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.260686 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.260793 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.261050 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.261182 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.261311 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.261423 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.261542 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.261681 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.261759 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.261840 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.261942 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.262015 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.262070 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.262144 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.262219 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.262292 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.262433 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.262527 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.262592 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.262688 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.262822 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.262941 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.263083 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.263238 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.263422 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.263637 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.263785 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.263917 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.264072 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.264156 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.264224 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.264344 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.264401 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.264483 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.264577 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.264654 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.264763 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.264865 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.265035 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.265114 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.265205 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.265318 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.265459 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.265529 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.265624 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.265703 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.265797 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.265854 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.265893 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.265932 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.265973 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.266002 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.266095 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.266163 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.266241 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.266349 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.266485 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.266588 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.266654 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.266722 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.266784 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.266885 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.266952 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.267035 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.267091 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.267173 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.267382 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.267490 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.267660 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.267719 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.267990 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.268185 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.268350 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.268450 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.268505 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.268718 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.269161 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.269280 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.273223 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.273448 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.273585 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.273719 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.273813 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.273993 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.274112 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.274213 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.274305 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.274426 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.274914 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.275026 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.275304 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.275413 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.275490 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.275594 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.275726 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.275847 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.275957 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.276053 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.276181 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.276434 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.276611 921384 usertrap_amd64.go:212] [ 11418: 11418] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.276641 921384 usertrap_amd64.go:122] [ 11418: 11418] Allocate a new trap: 0xc00787ff50 43 D0323 22:35:26.276658 921384 usertrap_amd64.go:225] [ 11418: 11418] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.277375 921384 task_exit.go:204] [ 11418: 11418] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.277552 921384 task_exit.go:204] [ 11418: 11418] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.277706 921384 task_signals.go:204] [ 11418: 11419] Signal 11418, PID: 11419, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.277851 921384 task_signals.go:204] [ 11418: 11420] Signal 11418, PID: 11420, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.277887 921384 task_exit.go:204] [ 11418: 11420] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.277906 921384 task_exit.go:204] [ 11418: 11420] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.277913 921384 task_exit.go:204] [ 11418: 11420] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.277974 921384 task_exit.go:204] [ 11418: 11419] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.281445 921384 task_exit.go:204] [ 11418: 11419] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.281488 921384 task_exit.go:204] [ 11418: 11419] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.281511 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.281940 921384 task_exit.go:204] [ 11418: 11418] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x101080) D0323 22:35:26.285024 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.285175 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.295259 921384 usertrap_amd64.go:212] [ 11421: 11421] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.295289 921384 usertrap_amd64.go:122] [ 11421: 11421] Allocate a new trap: 0xc00592f980 39 D0323 22:35:26.295392 921384 usertrap_amd64.go:225] [ 11421: 11421] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.297443 921384 usertrap_amd64.go:212] [ 11421: 11421] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.297476 921384 usertrap_amd64.go:122] [ 11421: 11421] Allocate a new trap: 0xc00592f980 40 D0323 22:35:26.297498 921384 usertrap_amd64.go:225] [ 11421: 11421] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.298819 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.299038 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.302907 921384 usertrap_amd64.go:212] [ 11421: 11421] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.302985 921384 usertrap_amd64.go:122] [ 11421: 11421] Allocate a new trap: 0xc00592f980 41 D0323 22:35:26.303033 921384 usertrap_amd64.go:225] [ 11421: 11421] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.311858 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.312043 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.313942 921384 usertrap_amd64.go:212] [ 11421: 11422] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.313979 921384 usertrap_amd64.go:122] [ 11421: 11422] Allocate a new trap: 0xc00592f980 42 D0323 22:35:26.313997 921384 usertrap_amd64.go:225] [ 11421: 11422] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.314507 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.314628 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.316820 921384 usertrap_amd64.go:212] [ 11421: 11421] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.316848 921384 usertrap_amd64.go:122] [ 11421: 11421] Allocate a new trap: 0xc00592f980 43 D0323 22:35:26.316859 921384 usertrap_amd64.go:225] [ 11421: 11421] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.317191 921384 task_exit.go:204] [ 11421: 11421] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.317222 921384 task_exit.go:204] [ 11421: 11421] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.317299 921384 task_signals.go:204] [ 11421: 11422] Signal 11421, PID: 11422, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.317351 921384 task_exit.go:204] [ 11421: 11422] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.319441 921384 task_exit.go:204] [ 11421: 11422] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.319493 921384 task_exit.go:204] [ 11421: 11422] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.319509 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.320528 921384 task_exit.go:204] [ 11421: 11421] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x101080) D0323 22:35:26.322506 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.322720 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.331212 921384 usertrap_amd64.go:212] [ 11423: 11423] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.331241 921384 usertrap_amd64.go:122] [ 11423: 11423] Allocate a new trap: 0xc002736a20 39 D0323 22:35:26.331339 921384 usertrap_amd64.go:225] [ 11423: 11423] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.331679 921384 usertrap_amd64.go:212] [ 11423: 11423] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.331698 921384 usertrap_amd64.go:122] [ 11423: 11423] Allocate a new trap: 0xc002736a20 40 D0323 22:35:26.331705 921384 usertrap_amd64.go:225] [ 11423: 11423] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.332649 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.332814 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.335600 921384 usertrap_amd64.go:212] [ 11423: 11423] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.335630 921384 usertrap_amd64.go:122] [ 11423: 11423] Allocate a new trap: 0xc002736a20 41 D0323 22:35:26.335641 921384 usertrap_amd64.go:225] [ 11423: 11423] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.340578 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.340793 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.341629 921384 usertrap_amd64.go:212] [ 11423: 11424] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.341717 921384 usertrap_amd64.go:122] [ 11423: 11424] Allocate a new trap: 0xc002736a20 42 D0323 22:35:26.341788 921384 usertrap_amd64.go:225] [ 11423: 11424] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.342073 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.342243 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.342938 921384 usertrap_amd64.go:212] [ 11423: 11423] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.342965 921384 usertrap_amd64.go:122] [ 11423: 11423] Allocate a new trap: 0xc002736a20 43 D0323 22:35:26.342978 921384 usertrap_amd64.go:225] [ 11423: 11423] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.343367 921384 task_exit.go:204] [ 11423: 11423] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.343406 921384 task_exit.go:204] [ 11423: 11423] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.343407 921384 task_signals.go:204] [ 11423: 11424] Signal 11423, PID: 11424, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.343431 921384 task_exit.go:204] [ 11423: 11424] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.345109 921384 task_exit.go:204] [ 11423: 11424] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.345146 921384 task_exit.go:204] [ 11423: 11424] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.345159 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.346328 921384 task_exit.go:204] [ 11423: 11423] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x101080) D0323 22:35:26.349169 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.349423 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.358226 921384 usertrap_amd64.go:212] [ 11425: 11425] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.358248 921384 usertrap_amd64.go:122] [ 11425: 11425] Allocate a new trap: 0xc002736c30 39 D0323 22:35:26.358375 921384 usertrap_amd64.go:225] [ 11425: 11425] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.359122 921384 usertrap_amd64.go:212] [ 11425: 11425] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.359155 921384 usertrap_amd64.go:122] [ 11425: 11425] Allocate a new trap: 0xc002736c30 40 D0323 22:35:26.359167 921384 usertrap_amd64.go:225] [ 11425: 11425] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.359882 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.360060 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.366011 921384 usertrap_amd64.go:212] [ 11425: 11425] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.366038 921384 usertrap_amd64.go:122] [ 11425: 11425] Allocate a new trap: 0xc002736c30 41 D0323 22:35:26.366051 921384 usertrap_amd64.go:225] [ 11425: 11425] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.373754 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.373966 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.374360 921384 usertrap_amd64.go:212] [ 11425: 11426] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.374376 921384 usertrap_amd64.go:122] [ 11425: 11426] Allocate a new trap: 0xc002736c30 42 D0323 22:35:26.374386 921384 usertrap_amd64.go:225] [ 11425: 11426] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.374577 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.374656 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.375234 921384 usertrap_amd64.go:212] [ 11425: 11425] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.375258 921384 usertrap_amd64.go:122] [ 11425: 11425] Allocate a new trap: 0xc002736c30 43 D0323 22:35:26.375270 921384 usertrap_amd64.go:225] [ 11425: 11425] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.375797 921384 task_exit.go:204] [ 11425: 11425] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.375853 921384 task_exit.go:204] [ 11425: 11425] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.375931 921384 task_signals.go:204] [ 11425: 11426] Signal 11425, PID: 11426, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.375964 921384 task_exit.go:204] [ 11425: 11426] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.379144 921384 task_exit.go:204] [ 11425: 11426] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.379173 921384 task_exit.go:204] [ 11425: 11426] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.379186 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.380224 921384 task_exit.go:204] [ 11425: 11425] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.381655 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.381764 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x3, 0xee, 0x1, 0x9, 0x3}}) D0323 22:35:26.391804 921384 usertrap_amd64.go:212] [ 11427: 11427] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.391841 921384 usertrap_amd64.go:122] [ 11427: 11427] Allocate a new trap: 0xc008182750 39 D0323 22:35:26.391903 921384 usertrap_amd64.go:225] [ 11427: 11427] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.392620 921384 usertrap_amd64.go:212] [ 11427: 11427] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.392644 921384 usertrap_amd64.go:122] [ 11427: 11427] Allocate a new trap: 0xc008182750 40 D0323 22:35:26.392655 921384 usertrap_amd64.go:225] [ 11427: 11427] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.393209 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.393429 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.395470 921384 usertrap_amd64.go:212] [ 11427: 11427] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.395494 921384 usertrap_amd64.go:122] [ 11427: 11427] Allocate a new trap: 0xc008182750 41 D0323 22:35:26.395504 921384 usertrap_amd64.go:225] [ 11427: 11427] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.400858 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.401057 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.402520 921384 usertrap_amd64.go:212] [ 11427: 11428] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.402546 921384 usertrap_amd64.go:122] [ 11427: 11428] Allocate a new trap: 0xc008182750 42 D0323 22:35:26.402561 921384 usertrap_amd64.go:225] [ 11427: 11428] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.402984 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.403106 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.405872 921384 usertrap_amd64.go:212] [ 11427: 11427] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.405902 921384 usertrap_amd64.go:122] [ 11427: 11427] Allocate a new trap: 0xc008182750 43 D0323 22:35:26.405912 921384 usertrap_amd64.go:225] [ 11427: 11427] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.406319 921384 task_exit.go:204] [ 11427: 11427] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.406351 921384 task_exit.go:204] [ 11427: 11427] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.406393 921384 task_signals.go:204] [ 11427: 11428] Signal 11427, PID: 11428, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.406419 921384 task_exit.go:204] [ 11427: 11428] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.407561 921384 task_exit.go:204] [ 11427: 11428] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.407593 921384 task_exit.go:204] [ 11427: 11428] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.407612 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.408799 921384 task_exit.go:204] [ 11427: 11427] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x3, 0xee, 0x1, 0x9, 0x3}}) D0323 22:35:26.409689 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.409800 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.423161 921384 usertrap_amd64.go:212] [ 11429: 11429] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.423188 921384 usertrap_amd64.go:122] [ 11429: 11429] Allocate a new trap: 0xc00049b7a0 39 D0323 22:35:26.423272 921384 usertrap_amd64.go:225] [ 11429: 11429] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.423846 921384 usertrap_amd64.go:212] [ 11429: 11429] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.423954 921384 usertrap_amd64.go:122] [ 11429: 11429] Allocate a new trap: 0xc00049b7a0 40 D0323 22:35:26.424034 921384 usertrap_amd64.go:225] [ 11429: 11429] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.424555 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.424697 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.429481 921384 usertrap_amd64.go:212] [ 11429: 11429] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.429566 921384 usertrap_amd64.go:122] [ 11429: 11429] Allocate a new trap: 0xc00049b7a0 41 D0323 22:35:26.429652 921384 usertrap_amd64.go:225] [ 11429: 11429] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.435725 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.435976 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.436592 921384 usertrap_amd64.go:212] [ 11429: 11430] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.436615 921384 usertrap_amd64.go:122] [ 11429: 11430] Allocate a new trap: 0xc00049b7a0 42 D0323 22:35:26.436626 921384 usertrap_amd64.go:225] [ 11429: 11430] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.436918 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.437054 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.437929 921384 usertrap_amd64.go:212] [ 11429: 11429] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.437954 921384 usertrap_amd64.go:122] [ 11429: 11429] Allocate a new trap: 0xc00049b7a0 43 D0323 22:35:26.437968 921384 usertrap_amd64.go:225] [ 11429: 11429] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.438446 921384 task_exit.go:204] [ 11429: 11429] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.438492 921384 task_exit.go:204] [ 11429: 11429] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.438536 921384 task_signals.go:204] [ 11429: 11430] Signal 11429, PID: 11430, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.438565 921384 task_exit.go:204] [ 11429: 11430] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.440756 921384 task_exit.go:204] [ 11429: 11430] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.440792 921384 task_exit.go:204] [ 11429: 11430] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.440807 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.441562 921384 task_exit.go:204] [ 11429: 11429] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x3, 0xee, 0x1, 0x9, 0x3}}) D0323 22:35:26.445562 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.445637 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.462226 921384 usertrap_amd64.go:212] [ 11431: 11431] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.462259 921384 usertrap_amd64.go:122] [ 11431: 11431] Allocate a new trap: 0xc008182b40 39 D0323 22:35:26.462337 921384 usertrap_amd64.go:225] [ 11431: 11431] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.463103 921384 usertrap_amd64.go:212] [ 11431: 11431] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.463131 921384 usertrap_amd64.go:122] [ 11431: 11431] Allocate a new trap: 0xc008182b40 40 D0323 22:35:26.463144 921384 usertrap_amd64.go:225] [ 11431: 11431] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.464156 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.464347 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.468181 921384 usertrap_amd64.go:212] [ 11431: 11431] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.468209 921384 usertrap_amd64.go:122] [ 11431: 11431] Allocate a new trap: 0xc008182b40 41 D0323 22:35:26.468221 921384 usertrap_amd64.go:225] [ 11431: 11431] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.474576 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.474754 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.478119 921384 usertrap_amd64.go:212] [ 11431: 11432] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.478138 921384 usertrap_amd64.go:122] [ 11431: 11432] Allocate a new trap: 0xc008182b40 42 D0323 22:35:26.478150 921384 usertrap_amd64.go:225] [ 11431: 11432] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.478436 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.478577 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.480730 921384 usertrap_amd64.go:212] [ 11431: 11431] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.480755 921384 usertrap_amd64.go:122] [ 11431: 11431] Allocate a new trap: 0xc008182b40 43 D0323 22:35:26.480769 921384 usertrap_amd64.go:225] [ 11431: 11431] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.481664 921384 task_exit.go:204] [ 11431: 11431] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.481704 921384 task_exit.go:204] [ 11431: 11431] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.482316 921384 task_signals.go:204] [ 11431: 11432] Signal 11431, PID: 11432, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.482346 921384 task_exit.go:204] [ 11431: 11432] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.483617 921384 task_exit.go:204] [ 11431: 11432] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.483654 921384 task_exit.go:204] [ 11431: 11432] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.483675 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.484165 921384 task_exit.go:204] [ 11431: 11431] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:26.486060 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.486200 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.497018 921384 usertrap_amd64.go:212] [ 11433: 11433] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.497045 921384 usertrap_amd64.go:122] [ 11433: 11433] Allocate a new trap: 0xc008182e70 39 D0323 22:35:26.497146 921384 usertrap_amd64.go:225] [ 11433: 11433] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.497525 921384 usertrap_amd64.go:212] [ 11433: 11433] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.497543 921384 usertrap_amd64.go:122] [ 11433: 11433] Allocate a new trap: 0xc008182e70 40 D0323 22:35:26.497553 921384 usertrap_amd64.go:225] [ 11433: 11433] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.498403 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.498578 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.500488 921384 usertrap_amd64.go:212] [ 11433: 11433] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.500513 921384 usertrap_amd64.go:122] [ 11433: 11433] Allocate a new trap: 0xc008182e70 41 D0323 22:35:26.500528 921384 usertrap_amd64.go:225] [ 11433: 11433] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.506463 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.506639 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.508573 921384 usertrap_amd64.go:212] [ 11433: 11434] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.508640 921384 usertrap_amd64.go:122] [ 11433: 11434] Allocate a new trap: 0xc008182e70 42 D0323 22:35:26.508658 921384 usertrap_amd64.go:225] [ 11433: 11434] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.509205 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.509330 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.511478 921384 usertrap_amd64.go:212] [ 11433: 11433] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.511529 921384 usertrap_amd64.go:122] [ 11433: 11433] Allocate a new trap: 0xc008182e70 43 D0323 22:35:26.511540 921384 usertrap_amd64.go:225] [ 11433: 11433] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.511824 921384 task_exit.go:204] [ 11433: 11433] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.511847 921384 task_exit.go:204] [ 11433: 11433] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.511912 921384 task_signals.go:204] [ 11433: 11434] Signal 11433, PID: 11434, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.511946 921384 task_exit.go:204] [ 11433: 11434] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.513323 921384 task_exit.go:204] [ 11433: 11434] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.513358 921384 task_exit.go:204] [ 11433: 11434] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.513372 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.513452 921384 task_exit.go:204] [ 11433: 11433] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:26.515186 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.515304 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.523118 921384 usertrap_amd64.go:212] [ 11435: 11435] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.523157 921384 usertrap_amd64.go:122] [ 11435: 11435] Allocate a new trap: 0xc008787500 39 D0323 22:35:26.523250 921384 usertrap_amd64.go:225] [ 11435: 11435] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.523870 921384 usertrap_amd64.go:212] [ 11435: 11435] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.523893 921384 usertrap_amd64.go:122] [ 11435: 11435] Allocate a new trap: 0xc008787500 40 D0323 22:35:26.523904 921384 usertrap_amd64.go:225] [ 11435: 11435] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.524330 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.524466 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.526110 921384 usertrap_amd64.go:212] [ 11435: 11435] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.526133 921384 usertrap_amd64.go:122] [ 11435: 11435] Allocate a new trap: 0xc008787500 41 D0323 22:35:26.526142 921384 usertrap_amd64.go:225] [ 11435: 11435] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.532373 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.532586 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.533116 921384 usertrap_amd64.go:212] [ 11435: 11436] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.533138 921384 usertrap_amd64.go:122] [ 11435: 11436] Allocate a new trap: 0xc008787500 42 D0323 22:35:26.533150 921384 usertrap_amd64.go:225] [ 11435: 11436] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.533530 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.533665 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.534259 921384 usertrap_amd64.go:212] [ 11435: 11435] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.534289 921384 usertrap_amd64.go:122] [ 11435: 11435] Allocate a new trap: 0xc008787500 43 D0323 22:35:26.534300 921384 usertrap_amd64.go:225] [ 11435: 11435] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.534930 921384 task_exit.go:204] [ 11435: 11435] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.534966 921384 task_exit.go:204] [ 11435: 11435] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.535025 921384 task_signals.go:204] [ 11435: 11436] Signal 11435, PID: 11436, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.535055 921384 task_exit.go:204] [ 11435: 11436] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.537111 921384 task_exit.go:204] [ 11435: 11436] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.537141 921384 task_exit.go:204] [ 11435: 11436] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.537154 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.537790 921384 task_exit.go:204] [ 11435: 11435] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x0) D0323 22:35:26.540211 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.540429 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.547535 921384 usertrap_amd64.go:212] [ 11437: 11437] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.547563 921384 usertrap_amd64.go:122] [ 11437: 11437] Allocate a new trap: 0xc0081832c0 39 D0323 22:35:26.547648 921384 usertrap_amd64.go:225] [ 11437: 11437] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.548056 921384 usertrap_amd64.go:212] [ 11437: 11437] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.548079 921384 usertrap_amd64.go:122] [ 11437: 11437] Allocate a new trap: 0xc0081832c0 40 D0323 22:35:26.548088 921384 usertrap_amd64.go:225] [ 11437: 11437] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.548536 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.548719 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.550789 921384 usertrap_amd64.go:212] [ 11437: 11437] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.550812 921384 usertrap_amd64.go:122] [ 11437: 11437] Allocate a new trap: 0xc0081832c0 41 D0323 22:35:26.550823 921384 usertrap_amd64.go:225] [ 11437: 11437] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.556580 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.556718 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.557152 921384 usertrap_amd64.go:212] [ 11437: 11438] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.557177 921384 usertrap_amd64.go:122] [ 11437: 11438] Allocate a new trap: 0xc0081832c0 42 D0323 22:35:26.557187 921384 usertrap_amd64.go:225] [ 11437: 11438] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.557445 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.557547 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.557928 921384 usertrap_amd64.go:212] [ 11437: 11437] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.557958 921384 usertrap_amd64.go:122] [ 11437: 11437] Allocate a new trap: 0xc0081832c0 43 D0323 22:35:26.557973 921384 usertrap_amd64.go:225] [ 11437: 11437] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.558301 921384 task_exit.go:204] [ 11437: 11437] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.558331 921384 task_exit.go:204] [ 11437: 11437] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.558425 921384 task_signals.go:204] [ 11437: 11438] Signal 11437, PID: 11438, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.558452 921384 task_exit.go:204] [ 11437: 11438] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.560202 921384 task_exit.go:204] [ 11437: 11438] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.560227 921384 task_exit.go:204] [ 11437: 11438] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.560237 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.562123 921384 task_exit.go:204] [ 11437: 11437] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x40000) D0323 22:35:26.562986 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.563070 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.571862 921384 usertrap_amd64.go:212] [ 11439: 11439] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.571892 921384 usertrap_amd64.go:122] [ 11439: 11439] Allocate a new trap: 0xc003300270 39 D0323 22:35:26.572029 921384 usertrap_amd64.go:225] [ 11439: 11439] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.572866 921384 usertrap_amd64.go:212] [ 11439: 11439] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.572892 921384 usertrap_amd64.go:122] [ 11439: 11439] Allocate a new trap: 0xc003300270 40 D0323 22:35:26.572904 921384 usertrap_amd64.go:225] [ 11439: 11439] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.573545 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.573718 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.576745 921384 usertrap_amd64.go:212] [ 11439: 11439] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.576785 921384 usertrap_amd64.go:122] [ 11439: 11439] Allocate a new trap: 0xc003300270 41 D0323 22:35:26.576802 921384 usertrap_amd64.go:225] [ 11439: 11439] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.582979 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.583310 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.585940 921384 usertrap_amd64.go:212] [ 11439: 11440] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.585996 921384 usertrap_amd64.go:122] [ 11439: 11440] Allocate a new trap: 0xc003300270 42 D0323 22:35:26.586015 921384 usertrap_amd64.go:225] [ 11439: 11440] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.586655 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.586820 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.589510 921384 usertrap_amd64.go:212] [ 11439: 11439] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.589541 921384 usertrap_amd64.go:122] [ 11439: 11439] Allocate a new trap: 0xc003300270 43 D0323 22:35:26.589555 921384 usertrap_amd64.go:225] [ 11439: 11439] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.590611 921384 task_exit.go:204] [ 11439: 11439] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.590660 921384 task_exit.go:204] [ 11439: 11439] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.590711 921384 task_signals.go:204] [ 11439: 11440] Signal 11439, PID: 11440, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.590755 921384 task_exit.go:204] [ 11439: 11440] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.592336 921384 task_exit.go:204] [ 11439: 11440] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.592371 921384 task_exit.go:204] [ 11439: 11440] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.592417 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.593323 921384 task_exit.go:204] [ 11439: 11439] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x40000) D0323 22:35:26.597876 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.598056 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.606933 921384 usertrap_amd64.go:212] [ 11441: 11441] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.606960 921384 usertrap_amd64.go:122] [ 11441: 11441] Allocate a new trap: 0xc008787b00 39 D0323 22:35:26.607096 921384 usertrap_amd64.go:225] [ 11441: 11441] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.607580 921384 usertrap_amd64.go:212] [ 11441: 11441] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.607602 921384 usertrap_amd64.go:122] [ 11441: 11441] Allocate a new trap: 0xc008787b00 40 D0323 22:35:26.607609 921384 usertrap_amd64.go:225] [ 11441: 11441] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.608159 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.608344 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.611125 921384 usertrap_amd64.go:212] [ 11441: 11441] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.611151 921384 usertrap_amd64.go:122] [ 11441: 11441] Allocate a new trap: 0xc008787b00 41 D0323 22:35:26.611167 921384 usertrap_amd64.go:225] [ 11441: 11441] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.617093 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.617265 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.617891 921384 usertrap_amd64.go:212] [ 11441: 11442] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.617921 921384 usertrap_amd64.go:122] [ 11441: 11442] Allocate a new trap: 0xc008787b00 42 D0323 22:35:26.617935 921384 usertrap_amd64.go:225] [ 11441: 11442] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.618251 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.618413 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.619264 921384 usertrap_amd64.go:212] [ 11441: 11441] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.619307 921384 usertrap_amd64.go:122] [ 11441: 11441] Allocate a new trap: 0xc008787b00 43 D0323 22:35:26.619321 921384 usertrap_amd64.go:225] [ 11441: 11441] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.619950 921384 task_exit.go:204] [ 11441: 11441] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.619990 921384 task_exit.go:204] [ 11441: 11441] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.620060 921384 task_signals.go:204] [ 11441: 11442] Signal 11441, PID: 11442, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.620098 921384 task_exit.go:204] [ 11441: 11442] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.624423 921384 task_exit.go:204] [ 11441: 11442] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.624467 921384 task_exit.go:204] [ 11441: 11442] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.624493 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.624580 921384 task_exit.go:204] [ 11441: 11441] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r0, 0x40000) D0323 22:35:26.625627 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.625742 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.639505 921384 usertrap_amd64.go:212] [ 11443: 11443] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.639532 921384 usertrap_amd64.go:122] [ 11443: 11443] Allocate a new trap: 0xc002f70210 39 D0323 22:35:26.639615 921384 usertrap_amd64.go:225] [ 11443: 11443] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.640139 921384 usertrap_amd64.go:212] [ 11443: 11443] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.640168 921384 usertrap_amd64.go:122] [ 11443: 11443] Allocate a new trap: 0xc002f70210 40 D0323 22:35:26.640181 921384 usertrap_amd64.go:225] [ 11443: 11443] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.640869 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.641079 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.646630 921384 usertrap_amd64.go:212] [ 11443: 11443] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.646653 921384 usertrap_amd64.go:122] [ 11443: 11443] Allocate a new trap: 0xc002f70210 41 D0323 22:35:26.646662 921384 usertrap_amd64.go:225] [ 11443: 11443] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.651064 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.651299 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.651871 921384 usertrap_amd64.go:212] [ 11443: 11444] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.651897 921384 usertrap_amd64.go:122] [ 11443: 11444] Allocate a new trap: 0xc002f70210 42 D0323 22:35:26.651916 921384 usertrap_amd64.go:225] [ 11443: 11444] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.652332 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.652500 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.653188 921384 usertrap_amd64.go:212] [ 11443: 11443] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.653216 921384 usertrap_amd64.go:122] [ 11443: 11443] Allocate a new trap: 0xc002f70210 43 D0323 22:35:26.653229 921384 usertrap_amd64.go:225] [ 11443: 11443] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.653758 921384 task_exit.go:204] [ 11443: 11443] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.653797 921384 task_exit.go:204] [ 11443: 11443] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.653817 921384 task_signals.go:204] [ 11443: 11444] Signal 11443, PID: 11444, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.653857 921384 task_exit.go:204] [ 11443: 11444] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.655602 921384 task_exit.go:204] [ 11443: 11444] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.655643 921384 task_exit.go:204] [ 11443: 11444] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.655672 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.655734 921384 task_exit.go:204] [ 11443: 11443] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.657353 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.657507 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.658898 921384 task_signals.go:470] [ 7: 1637] Notified of signal 23 D0323 22:35:26.659016 921384 task_signals.go:220] [ 7: 1637] Signal 23: delivering to handler D0323 22:35:26.659035 921384 task_signals.go:470] [ 7: 3919] Notified of signal 23 D0323 22:35:26.659144 921384 task_signals.go:220] [ 7: 3919] Signal 23: delivering to handler D0323 22:35:26.659151 921384 task_signals.go:470] [ 7: 17] Notified of signal 23 D0323 22:35:26.659377 921384 task_signals.go:470] [ 7: 20] Notified of signal 23 D0323 22:35:26.659473 921384 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0323 22:35:26.659579 921384 task_signals.go:470] [ 7: 2345] Notified of signal 23 D0323 22:35:26.659673 921384 task_signals.go:220] [ 7: 2345] Signal 23: delivering to handler D0323 22:35:26.659985 921384 task_signals.go:470] [ 7: 1637] Notified of signal 23 D0323 22:35:26.660052 921384 task_signals.go:470] [ 7: 20] Notified of signal 23 D0323 22:35:26.660169 921384 task_signals.go:470] [ 7: 21] Notified of signal 23 D0323 22:35:26.660261 921384 task_signals.go:220] [ 7: 21] Signal 23: delivering to handler D0323 22:35:26.661039 921384 task_signals.go:470] [ 7: 11] Notified of signal 23 D0323 22:35:26.661097 921384 task_signals.go:179] [ 7: 11] Restarting syscall 202: interrupted by signal 23 D0323 22:35:26.661107 921384 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0323 22:35:26.661573 921384 task_signals.go:470] [ 7: 1638] Notified of signal 23 D0323 22:35:26.661727 921384 task_signals.go:220] [ 7: 1637] Signal 23: delivering to handler D0323 22:35:26.661745 921384 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0323 22:35:26.662080 921384 task_signals.go:220] [ 7: 17] Signal 23: delivering to handler D0323 22:35:26.662159 921384 task_signals.go:470] [ 7: 1873] Notified of signal 23 D0323 22:35:26.662211 921384 task_signals.go:179] [ 7: 1873] Restarting syscall 202: interrupted by signal 23 D0323 22:35:26.662222 921384 task_signals.go:220] [ 7: 1873] Signal 23: delivering to handler D0323 22:35:26.662378 921384 task_signals.go:220] [ 7: 1638] Signal 23: delivering to handler D0323 22:35:26.662903 921384 task_signals.go:470] [ 7: 17] Notified of signal 23 D0323 22:35:26.663003 921384 task_signals.go:470] [ 7: 1637] Notified of signal 23 D0323 22:35:26.663061 921384 task_signals.go:220] [ 7: 1637] Signal 23: delivering to handler D0323 22:35:26.663070 921384 task_signals.go:176] [ 7: 17] Not restarting syscall 35 after errno &{516 %!d(string=interrupted by signal)}: interrupted by signal 23 D0323 22:35:26.663100 921384 task_signals.go:220] [ 7: 17] Signal 23: delivering to handler D0323 22:35:26.663174 921384 task_signals.go:470] [ 7: 3919] Notified of signal 23 D0323 22:35:26.663200 921384 task_signals.go:470] [ 7: 1637] Notified of signal 23 D0323 22:35:26.663299 921384 task_signals.go:220] [ 7: 1637] Signal 23: delivering to handler D0323 22:35:26.663320 921384 task_signals.go:470] [ 7: 17] Notified of signal 23 D0323 22:35:26.663355 921384 task_signals.go:179] [ 7: 17] Restarting syscall 202: interrupted by signal 23 D0323 22:35:26.663379 921384 task_signals.go:220] [ 7: 17] Signal 23: delivering to handler D0323 22:35:26.663616 921384 task_signals.go:220] [ 7: 3919] Signal 23: delivering to handler D0323 22:35:26.663742 921384 task_signals.go:470] [ 7: 2145] Notified of signal 23 D0323 22:35:26.663810 921384 task_signals.go:220] [ 7: 2145] Signal 23: delivering to handler D0323 22:35:26.665577 921384 task_signals.go:470] [ 7: 2145] Notified of signal 23 D0323 22:35:26.665630 921384 task_signals.go:179] [ 7: 2145] Restarting syscall 202: interrupted by signal 23 D0323 22:35:26.665640 921384 task_signals.go:220] [ 7: 2145] Signal 23: delivering to handler D0323 22:35:26.665872 921384 task_signals.go:470] [ 7: 2145] Notified of signal 23 D0323 22:35:26.665928 921384 task_signals.go:179] [ 7: 2145] Restarting syscall 202: interrupted by signal 23 D0323 22:35:26.665940 921384 task_signals.go:220] [ 7: 2145] Signal 23: delivering to handler D0323 22:35:26.666171 921384 task_signals.go:470] [ 7: 2145] Notified of signal 23 D0323 22:35:26.666227 921384 task_signals.go:179] [ 7: 2145] Restarting syscall 202: interrupted by signal 23 D0323 22:35:26.666237 921384 task_signals.go:220] [ 7: 2145] Signal 23: delivering to handler 22:35:26 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2000040, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@max_read={'max_read', 0x3d, 0x3ff}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x200}}], [{@subj_type={'subj_type', 0x3d, '*}+!'}}, {@subj_type={'subj_type', 0x3d, ')'}}, {@pcr={'pcr', 0x3d, 0x1f}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_type}]}}, 0x0, 0x0, &(0x7f00000002c0)="72eec4e62503a406d9ada65b2dd2e3585575429b8573397c5a0c20d4d94f088a6c2c239e2ae75cd7892573b986bafb64f431e2ca49444e74e123ea1a626514b87d762cf71141bb88b8b8656bbda9fd5a5689d5820269823805272b840531") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r1, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) D0323 22:35:26.676613 921384 usertrap_amd64.go:212] [ 11445: 11445] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.676664 921384 usertrap_amd64.go:122] [ 11445: 11445] Allocate a new trap: 0xc003246120 39 D0323 22:35:26.676778 921384 usertrap_amd64.go:225] [ 11445: 11445] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.677501 921384 usertrap_amd64.go:212] [ 11445: 11445] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.677527 921384 usertrap_amd64.go:122] [ 11445: 11445] Allocate a new trap: 0xc003246120 40 D0323 22:35:26.677537 921384 usertrap_amd64.go:225] [ 11445: 11445] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.678088 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.678312 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.682703 921384 usertrap_amd64.go:212] [ 11445: 11445] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.682731 921384 usertrap_amd64.go:122] [ 11445: 11445] Allocate a new trap: 0xc003246120 41 D0323 22:35:26.682750 921384 usertrap_amd64.go:225] [ 11445: 11445] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.691207 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.691419 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.694816 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.694973 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.695953 921384 usertrap_amd64.go:212] [ 11445: 11446] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.695982 921384 usertrap_amd64.go:122] [ 11445: 11446] Allocate a new trap: 0xc003246120 42 D0323 22:35:26.695999 921384 usertrap_amd64.go:225] [ 11445: 11446] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.696558 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.696671 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.700359 921384 usertrap_amd64.go:212] [ 11445: 11445] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.700400 921384 usertrap_amd64.go:122] [ 11445: 11445] Allocate a new trap: 0xc003246120 43 D0323 22:35:26.700414 921384 usertrap_amd64.go:225] [ 11445: 11445] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.701003 921384 task_exit.go:204] [ 11445: 11445] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.701035 921384 task_exit.go:204] [ 11445: 11445] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.701087 921384 task_signals.go:204] [ 11445: 11446] Signal 11445, PID: 11446, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.701145 921384 task_exit.go:204] [ 11445: 11446] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.702524 921384 task_exit.go:204] [ 11445: 11446] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.702574 921384 task_exit.go:204] [ 11445: 11446] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.702595 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.703961 921384 task_exit.go:204] [ 11445: 11445] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2000040, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@max_read={'max_read', 0x3d, 0x3ff}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x200}}], [{@subj_type={'subj_type', 0x3d, '*}+!'}}, {@subj_type={'subj_type', 0x3d, ')'}}, {@pcr={'pcr', 0x3d, 0x1f}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_type}]}}, 0x0, 0x0, &(0x7f00000002c0)="72eec4e62503a406d9ada65b2dd2e3585575429b8573397c5a0c20d4d94f088a6c2c239e2ae75cd7892573b986bafb64f431e2ca49444e74e123ea1a626514b87d762cf71141bb88b8b8656bbda9fd5a5689d5820269823805272b840531") (async) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2000040, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@max_read={'max_read', 0x3d, 0x3ff}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x200}}], [{@subj_type={'subj_type', 0x3d, '*}+!'}}, {@subj_type={'subj_type', 0x3d, ')'}}, {@pcr={'pcr', 0x3d, 0x1f}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_type}]}}, 0x0, 0x0, &(0x7f00000002c0)="72eec4e62503a406d9ada65b2dd2e3585575429b8573397c5a0c20d4d94f088a6c2c239e2ae75cd7892573b986bafb64f431e2ca49444e74e123ea1a626514b87d762cf71141bb88b8b8656bbda9fd5a5689d5820269823805272b840531") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r1, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) D0323 22:35:26.705143 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.705318 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.713598 921384 usertrap_amd64.go:212] [ 11447: 11447] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.713638 921384 usertrap_amd64.go:122] [ 11447: 11447] Allocate a new trap: 0xc008f81080 39 D0323 22:35:26.713751 921384 usertrap_amd64.go:225] [ 11447: 11447] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.714426 921384 usertrap_amd64.go:212] [ 11447: 11447] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.714446 921384 usertrap_amd64.go:122] [ 11447: 11447] Allocate a new trap: 0xc008f81080 40 D0323 22:35:26.714456 921384 usertrap_amd64.go:225] [ 11447: 11447] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.715090 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.715264 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.718902 921384 usertrap_amd64.go:212] [ 11447: 11447] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.718928 921384 usertrap_amd64.go:122] [ 11447: 11447] Allocate a new trap: 0xc008f81080 41 D0323 22:35:26.718941 921384 usertrap_amd64.go:225] [ 11447: 11447] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.725714 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.725882 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.730923 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.731133 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.731483 921384 usertrap_amd64.go:212] [ 11447: 11448] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.731561 921384 usertrap_amd64.go:122] [ 11447: 11448] Allocate a new trap: 0xc008f81080 42 D0323 22:35:26.731581 921384 usertrap_amd64.go:225] [ 11447: 11448] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.731845 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.731945 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.732800 921384 usertrap_amd64.go:212] [ 11447: 11447] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.732828 921384 usertrap_amd64.go:122] [ 11447: 11447] Allocate a new trap: 0xc008f81080 43 D0323 22:35:26.732847 921384 usertrap_amd64.go:225] [ 11447: 11447] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.733363 921384 task_exit.go:204] [ 11447: 11447] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.733411 921384 task_exit.go:204] [ 11447: 11447] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.733403 921384 task_signals.go:204] [ 11447: 11449] Signal 11447, PID: 11449, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.733474 921384 task_exit.go:204] [ 11447: 11449] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.733492 921384 task_exit.go:204] [ 11447: 11449] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.733507 921384 task_exit.go:204] [ 11447: 11449] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.733569 921384 task_signals.go:204] [ 11447: 11448] Signal 11447, PID: 11448, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.733591 921384 task_exit.go:204] [ 11447: 11448] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.739568 921384 task_exit.go:204] [ 11447: 11448] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.739597 921384 task_exit.go:204] [ 11447: 11448] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.739614 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.740445 921384 task_exit.go:204] [ 11447: 11447] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.741542 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.741764 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} 22:35:26 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2000040, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@max_read={'max_read', 0x3d, 0x3ff}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x200}}], [{@subj_type={'subj_type', 0x3d, '*}+!'}}, {@subj_type={'subj_type', 0x3d, ')'}}, {@pcr={'pcr', 0x3d, 0x1f}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_type}]}}, 0x0, 0x0, &(0x7f00000002c0)="72eec4e62503a406d9ada65b2dd2e3585575429b8573397c5a0c20d4d94f088a6c2c239e2ae75cd7892573b986bafb64f431e2ca49444e74e123ea1a626514b87d762cf71141bb88b8b8656bbda9fd5a5689d5820269823805272b840531") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r1, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) write$P9_RSTAT(r0, 0x0, 0x0) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2000040, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1800}}, {@max_read={'max_read', 0x3d, 0x3ff}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x1400}}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0xe00}}, {@default_permissions}, {@default_permissions}, {@blksize={'blksize', 0x3d, 0x200}}], [{@subj_type={'subj_type', 0x3d, '*}+!'}}, {@subj_type={'subj_type', 0x3d, ')'}}, {@pcr={'pcr', 0x3d, 0x1f}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_type}]}}, 0x0, 0x0, &(0x7f00000002c0)="72eec4e62503a406d9ada65b2dd2e3585575429b8573397c5a0c20d4d94f088a6c2c239e2ae75cd7892573b986bafb64f431e2ca49444e74e123ea1a626514b87d762cf71141bb88b8b8656bbda9fd5a5689d5820269823805272b840531") (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) syz_open_pts(r1, 0x0) (async) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)) (async) D0323 22:35:26.756077 921384 usertrap_amd64.go:212] [ 11450: 11450] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.756116 921384 usertrap_amd64.go:122] [ 11450: 11450] Allocate a new trap: 0xc008f81380 39 D0323 22:35:26.756202 921384 usertrap_amd64.go:225] [ 11450: 11450] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.757002 921384 usertrap_amd64.go:212] [ 11450: 11450] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.757090 921384 usertrap_amd64.go:122] [ 11450: 11450] Allocate a new trap: 0xc008f81380 40 D0323 22:35:26.757107 921384 usertrap_amd64.go:225] [ 11450: 11450] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.757740 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.757962 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.760336 921384 usertrap_amd64.go:212] [ 11450: 11450] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.760363 921384 usertrap_amd64.go:122] [ 11450: 11450] Allocate a new trap: 0xc008f81380 41 D0323 22:35:26.760378 921384 usertrap_amd64.go:225] [ 11450: 11450] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.766134 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.766345 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.767040 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.767171 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.767473 921384 usertrap_amd64.go:212] [ 11450: 11451] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.767496 921384 usertrap_amd64.go:122] [ 11450: 11451] Allocate a new trap: 0xc008f81380 42 D0323 22:35:26.767515 921384 usertrap_amd64.go:225] [ 11450: 11451] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.767814 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.767930 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.768645 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.768755 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.770847 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.770986 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.771989 921384 usertrap_amd64.go:212] [ 11450: 11450] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:26.772013 921384 usertrap_amd64.go:122] [ 11450: 11450] Allocate a new trap: 0xc008f81380 43 D0323 22:35:26.772025 921384 usertrap_amd64.go:225] [ 11450: 11450] Apply the binary patch addr 5650abb02e1a trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.775351 921384 task_run.go:312] [ 11450: 11454] Unhandled user fault: addr=0 ip=5650aba83bc4 access=r-- sig=11 err=bad address D0323 22:35:26.775393 921384 task_log.go:87] [ 11450: 11454] Registers: D0323 22:35:26.775409 921384 task_log.go:94] [ 11450: 11454] Cs = 0000000000000033 D0323 22:35:26.775420 921384 task_log.go:94] [ 11450: 11454] Ds = 0000000000000000 D0323 22:35:26.775424 921384 task_log.go:94] [ 11450: 11454] Eflags = 0000000000010202 D0323 22:35:26.775429 921384 task_log.go:94] [ 11450: 11454] Es = 0000000000000000 D0323 22:35:26.775433 921384 task_log.go:94] [ 11450: 11454] Fs = 0000000000000000 D0323 22:35:26.775437 921384 task_log.go:94] [ 11450: 11454] Fs_base = 00007eccc3e23700 D0323 22:35:26.775443 921384 task_log.go:94] [ 11450: 11454] Gs = 0000000000000000 D0323 22:35:26.775448 921384 task_log.go:94] [ 11450: 11454] Gs_base = 00007ffbf6d1f000 D0323 22:35:26.775452 921384 task_log.go:94] [ 11450: 11454] Orig_rax = ffffffffffffffff D0323 22:35:26.775456 921384 task_log.go:94] [ 11450: 11454] R10 = 00100b6ac3c5c1af D0323 22:35:26.775461 921384 task_log.go:94] [ 11450: 11454] R11 = 00000000861c4b36 D0323 22:35:26.775465 921384 task_log.go:94] [ 11450: 11454] R12 = 0000000000000000 D0323 22:35:26.775469 921384 task_log.go:94] [ 11450: 11454] R13 = 00007eeff73f235f D0323 22:35:26.775485 921384 task_log.go:94] [ 11450: 11454] R14 = 00007eccc3e23300 D0323 22:35:26.775489 921384 task_log.go:94] [ 11450: 11454] R15 = 0000000000022000 D0323 22:35:26.775494 921384 task_log.go:94] [ 11450: 11454] R8 = 00000000304b42e6 D0323 22:35:26.775498 921384 task_log.go:94] [ 11450: 11454] R9 = 00000000000001ce D0323 22:35:26.775502 921384 task_log.go:94] [ 11450: 11454] Rax = 0000000000000000 D0323 22:35:26.775506 921384 task_log.go:94] [ 11450: 11454] Rbp = 00005650abb39b39 D0323 22:35:26.775510 921384 task_log.go:94] [ 11450: 11454] Rbx = 0000000000000002 D0323 22:35:26.775514 921384 task_log.go:94] [ 11450: 11454] Rcx = 00005650abb48852 D0323 22:35:26.775519 921384 task_log.go:94] [ 11450: 11454] Rdi = 00005650abb38941 D0323 22:35:26.775523 921384 task_log.go:94] [ 11450: 11454] Rdx = 000000000003806b D0323 22:35:26.775529 921384 task_log.go:94] [ 11450: 11454] Rip = 00005650aba83bc4 D0323 22:35:26.775533 921384 task_log.go:94] [ 11450: 11454] Rsi = 0000000000000000 D0323 22:35:26.775537 921384 task_log.go:94] [ 11450: 11454] Rsp = 00007eccc3e23190 D0323 22:35:26.775541 921384 task_log.go:94] [ 11450: 11454] Ss = 000000000000002b D0323 22:35:26.775545 921384 task_log.go:111] [ 11450: 11454] Stack: D0323 22:35:26.775551 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23190: 00 00 00 00 00 00 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:26.775557 921384 task_log.go:128] [ 11450: 11454] 7eccc3e231a0: 00 00 00 00 00 00 00 00 03 10 00 00 ff ff ff ff D0323 22:35:26.775576 921384 task_log.go:128] [ 11450: 11454] 7eccc3e231b0: 00 00 00 00 00 00 00 00 b0 b7 bc ab 50 56 00 00 D0323 22:35:26.775582 921384 task_log.go:128] [ 11450: 11454] 7eccc3e231c0: e6 00 00 00 00 00 00 00 e6 42 4b 30 00 00 00 00 D0323 22:35:26.775587 921384 task_log.go:128] [ 11450: 11454] 7eccc3e231d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775592 921384 task_log.go:128] [ 11450: 11454] 7eccc3e231e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775597 921384 task_log.go:128] [ 11450: 11454] 7eccc3e231f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775601 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23200: f8 e1 bf ab 50 56 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:26.775606 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23210: fc e1 bf ab 50 56 00 00 e4 7a a8 ab 50 56 00 00 D0323 22:35:26.775611 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775616 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23230: 5e 23 3f f7 ef 7e 00 00 87 cc a8 ab 50 56 00 00 D0323 22:35:26.775621 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23240: 00 00 00 00 00 00 00 00 00 37 e2 c3 cc 7e 00 00 D0323 22:35:26.775625 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23250: 00 37 e2 c3 cc 7e 00 00 30 be 31 66 7f 24 fb 39 D0323 22:35:26.775630 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23260: 5e 23 3f f7 ef 7e 00 00 5f 23 3f f7 ef 7e 00 00 D0323 22:35:26.775636 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23270: 00 33 e2 c3 cc 7e 00 00 00 20 02 00 00 00 00 00 D0323 22:35:26.775641 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23280: 30 be b1 02 bb a3 62 c4 30 be 6b fe 2e 73 5a 95 D0323 22:35:26.775646 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775651 921384 task_log.go:128] [ 11450: 11454] 7eccc3e232a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775656 921384 task_log.go:128] [ 11450: 11454] 7eccc3e232b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775661 921384 task_log.go:128] [ 11450: 11454] 7eccc3e232c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775666 921384 task_log.go:128] [ 11450: 11454] 7eccc3e232d0: 00 00 00 00 00 00 00 00 00 26 88 03 43 46 c5 16 D0323 22:35:26.775671 921384 task_log.go:128] [ 11450: 11454] 7eccc3e232e0: 00 37 e2 c3 cc 7e 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775676 921384 task_log.go:128] [ 11450: 11454] 7eccc3e232f0: 5e 23 3f f7 ef 7e 00 00 2f f5 ad ab 50 56 00 00 D0323 22:35:26.775681 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775687 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775692 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775697 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775702 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775707 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775712 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775724 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775728 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775733 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775738 921384 task_log.go:128] [ 11450: 11454] 7eccc3e233a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775742 921384 task_log.go:128] [ 11450: 11454] 7eccc3e233b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775747 921384 task_log.go:128] [ 11450: 11454] 7eccc3e233c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775752 921384 task_log.go:128] [ 11450: 11454] 7eccc3e233d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775756 921384 task_log.go:128] [ 11450: 11454] 7eccc3e233e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775762 921384 task_log.go:128] [ 11450: 11454] 7eccc3e233f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775787 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775793 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775797 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775802 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775807 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775815 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775822 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775830 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775835 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775841 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775847 921384 task_log.go:128] [ 11450: 11454] 7eccc3e234a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775852 921384 task_log.go:128] [ 11450: 11454] 7eccc3e234b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775858 921384 task_log.go:128] [ 11450: 11454] 7eccc3e234c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775881 921384 task_log.go:128] [ 11450: 11454] 7eccc3e234d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775887 921384 task_log.go:128] [ 11450: 11454] 7eccc3e234e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775893 921384 task_log.go:128] [ 11450: 11454] 7eccc3e234f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775899 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775904 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775910 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775916 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775922 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775928 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775935 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775943 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775949 921384 task_log.go:128] [ 11450: 11454] 7eccc3e23580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.775956 921384 task_log.go:149] [ 11450: 11454] Code: D0323 22:35:26.775963 921384 task_log.go:167] [ 11450: 11454] 5650aba83b80: 48 89 ee 48 89 c2 e8 a5 c2 00 00 48 89 ef 49 89 D0323 22:35:26.775971 921384 task_log.go:167] [ 11450: 11454] 5650aba83b90: c4 e8 7a 26 ff ff 49 39 c4 0f 85 b0 03 00 00 48 D0323 22:35:26.775975 921384 task_log.go:167] [ 11450: 11454] 5650aba83ba0: 8b 44 24 08 89 5c 24 1c c6 80 c8 00 00 00 01 80 D0323 22:35:26.775980 921384 task_log.go:167] [ 11450: 11454] 5650aba83bb0: 3d 07 3b ca 00 00 74 13 48 8b 44 24 08 48 8b 80 D0323 22:35:26.775985 921384 task_log.go:167] [ 11450: 11454] 5650aba83bc0: a8 00 00 00 48 c7 00 00 00 00 00 48 8b 5c 24 08 D0323 22:35:26.775990 921384 task_log.go:167] [ 11450: 11454] 5650aba83bd0: 48 c7 83 88 00 00 00 ff ff ff ff e8 a0 d1 00 00 D0323 22:35:26.775995 921384 task_log.go:167] [ 11450: 11454] 5650aba83be0: c7 00 0e 00 00 00 64 f0 83 04 25 b0 ff ff ff 01 D0323 22:35:26.776001 921384 task_log.go:167] [ 11450: 11454] 5650aba83bf0: 64 48 8b 04 25 00 00 00 00 48 8d b8 e8 fe ff ff D0323 22:35:26.776005 921384 task_log.go:71] [ 11450: 11454] Mappings: VMAs: 00065000-0006a000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d320000-1b2d360000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 5650aba52000-5650aba76000 r--p 00000000 00:08 8 /syz-executor 5650aba76000-5650abb28000 r-xp 00024000 00:08 8 /syz-executor 5650abb28000-5650abb7a000 r--p 000d6000 00:08 8 /syz-executor 5650abb7b000-5650abbd4000 r--p 00128000 00:08 8 /syz-executor 5650abbd4000-5650abbdd000 rw-p 00181000 00:08 8 /syz-executor 5650abbe2000-5650ac72e000 rw-p 00000000 00:00 0 5650ac72e000-5650ac750000 rw-p 00000000 00:00 0 [heap] 7eccc3200000-7eccc3400000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3400000-7eccc3600000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3600000-7eccc3800000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3800000-7eccc3a00000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3a00000-7eccc3e00000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7eccc3e03000-7eccc3e04000 ---p 00000000 00:00 0 7eccc3e04000-7eccc3e24000 rw-p 00000000 00:00 0 7eccc3e24000-7eccc3e25000 ---p 00000000 00:00 0 7eccc3e25000-7eccc3e45000 rw-p 00000000 00:00 0 7eccc3e45000-7eccc3e46000 ---p 00000000 00:00 0 7eccc3e46000-7eccc3e66000 rw-p 00000000 00:00 0 7eccc3e66000-7eccc3e67000 ---p 00000000 00:00 0 7eccc3e67000-7eccc3e87000 rw-p 00000000 00:00 0 7eccc3e87000-7eccc3e88000 r--p 00000000 00:00 0 [vvar] 7eccc3e88000-7eccc3e8a000 r-xp 00000000 00:00 0 7eeff6bf3000-7eeff73f3000 rw-p 00000000 00:00 0 [stack] PMAs: 00065000-00066000 r-xp 035f7000 *pgalloc.MemoryFile 00066000-0006a000 r-xp 00bfa000 *pgalloc.MemoryFile 20000000-20200000 rwxp 07400000 *pgalloc.MemoryFile 1b2d320000-1b2d360000 rw-s 09800000 *pgalloc.MemoryFile 5650aba52000-5650aba76000 r--p 05dc0000 *pgalloc.MemoryFile 5650aba76000-5650aba8f000 r-xs 00024000 *gofer.dentryPlatformFile 5650aba8f000-5650aba90000 r-xp 035fa000 *pgalloc.MemoryFile 5650aba90000-5650aba91000 r-xp 062a1000 *pgalloc.MemoryFile 5650aba91000-5650aba92000 r-xp 00bff000 *pgalloc.MemoryFile 5650aba92000-5650abadb000 r-xs 00040000 *gofer.dentryPlatformFile 5650abadb000-5650abadc000 r-xp 03fff000 *pgalloc.MemoryFile 5650abadc000-5650abadd000 r-xp 035f9000 *pgalloc.MemoryFile 5650abadd000-5650abade000 r-xp 043ff000 *pgalloc.MemoryFile 5650abade000-5650abadf000 r-xp 023f5000 *pgalloc.MemoryFile 5650abadf000-5650abae0000 r-xp 0605c000 *pgalloc.MemoryFile 5650abae0000-5650abb02000 r-xs 0008e000 *gofer.dentryPlatformFile 5650abb02000-5650abb03000 r-xp 062ac000 *pgalloc.MemoryFile 5650abb03000-5650abb04000 r-xp 035ff000 *pgalloc.MemoryFile 5650abb1b000-5650abb1c000 r-xp 035fb000 *pgalloc.MemoryFile 5650abb27000-5650abb28000 r-xp 005fc000 *pgalloc.MemoryFile 5650abb28000-5650abb7a000 r--p 06515000 *pgalloc.MemoryFile 5650abb7b000-5650abbdd000 rw-p 0725c000 *pgalloc.MemoryFile 5650abbe2000-5650abc00000 rw-p 066fc000 *pgalloc.MemoryFile 5650ac600000-5650ac72e000 rw-p 0712e000 *pgalloc.MemoryFile 5650ac72e000-5650ac72f000 rw-p 005ff000 *pgalloc.MemoryFile 5650ac72f000-5650ac750000 rw-p 06b18000 *pgalloc.MemoryFile 7eccc3800000-7eccc3a00000 rw-s 0ac00000 *pgalloc.MemoryFile 7eccc3a00000-7eccc3e00000 r--s 09400000 *pgalloc.MemoryFile 7eccc3e04000-7eccc3e24000 rw-p 06b9a000 *pgalloc.MemoryFile 7eccc3e25000-7eccc3e45000 rw-p 06ae8000 *pgalloc.MemoryFile 7eccc3e46000-7eccc3e66000 rw-p 06ac0000 *pgalloc.MemoryFile 7eccc3e67000-7eccc3e87000 rw-p 0684d000 *pgalloc.MemoryFile 7eccc3e87000-7eccc3e88000 r--s 00002000 *pgalloc.MemoryFile 7eccc3e88000-7eccc3e8a000 r-xs 00000000 *pgalloc.MemoryFile 7eeff7200000-7eeff73ef000 r--p 0a800000 *pgalloc.MemoryFile 7eeff73ef000-7eeff73f1000 r--p 023fe000 *pgalloc.MemoryFile 7eeff73f1000-7eeff73f3000 rw-p 06034000 *pgalloc.MemoryFile D0323 22:35:26.776295 921384 task_log.go:73] [ 11450: 11454] FDTable: fd:0 => name pipe:[5] fd:9 => name /dev/pts/ptmx fd:219 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:4 => name socket:[25874] fd:5 => name /dev/pts/ptmx fd:215 => name /sys/kernel/debug/kcov fd:216 => name /sys/kernel/debug/kcov fd:217 => name /sys/kernel/debug/kcov fd:218 => name /sys/kernel/debug/kcov fd:222 => name /sys/kernel/debug/kcov fd:226 => name /sys/kernel/debug/kcov fd:1 => name pipe:[5] fd:3 => name /dev/null fd:6 => name /dev/pts/293 fd:7 => name /dev/null fd:8 => name socket:[25875] fd:200 => name /dev/net/tun fd:220 => name /sys/kernel/debug/kcov fd:2 => name pipe:[5] fd:201 => name / fd:225 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov D0323 22:35:26.776348 921384 task_signals.go:470] [ 11450: 11454] Notified of signal 11 D0323 22:35:26.776359 921384 task_signals.go:220] [ 11450: 11454] Signal 11: delivering to handler D0323 22:35:26.776453 921384 task_exit.go:204] [ 11450: 11454] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.776507 921384 task_exit.go:204] [ 11450: 11454] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.776517 921384 task_exit.go:204] [ 11450: 11454] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.776575 921384 task_signals.go:204] [ 11450: 11451] Signal 11450, PID: 11451, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.776611 921384 task_exit.go:204] [ 11450: 11451] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.776626 921384 task_exit.go:204] [ 11450: 11451] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.776641 921384 task_exit.go:204] [ 11450: 11451] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.776581 921384 task_signals.go:204] [ 11450: 11450] Signal 11450, PID: 11450, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.776670 921384 task_exit.go:204] [ 11450: 11450] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.776678 921384 task_exit.go:204] [ 11450: 11450] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.777087 921384 task_signals.go:204] [ 11450: 11452] Signal 11450, PID: 11452, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.777128 921384 task_exit.go:204] [ 11450: 11452] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.777158 921384 task_exit.go:204] [ 11450: 11452] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.777178 921384 task_exit.go:204] [ 11450: 11452] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.777217 921384 task_signals.go:204] [ 11450: 11453] Signal 11450, PID: 11453, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.777240 921384 task_exit.go:204] [ 11450: 11453] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.788792 921384 task_exit.go:204] [ 11450: 11453] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.788832 921384 task_exit.go:204] [ 11450: 11453] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.788854 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.789177 921384 task_exit.go:204] [ 11450: 11450] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x401, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = socket$inet_icmp(0x2, 0x2, 0x1) fstat(r1, &(0x7f0000000100)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSIG(r3, 0x40045436, 0xc) D0323 22:35:26.790750 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.790866 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.800798 921384 usertrap_amd64.go:212] [ 11455: 11455] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.800825 921384 usertrap_amd64.go:122] [ 11455: 11455] Allocate a new trap: 0xc008f813e0 39 D0323 22:35:26.800928 921384 usertrap_amd64.go:225] [ 11455: 11455] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.801573 921384 usertrap_amd64.go:212] [ 11455: 11455] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.801600 921384 usertrap_amd64.go:122] [ 11455: 11455] Allocate a new trap: 0xc008f813e0 40 D0323 22:35:26.801618 921384 usertrap_amd64.go:225] [ 11455: 11455] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.802166 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.802312 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.805099 921384 usertrap_amd64.go:212] [ 11455: 11455] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.805121 921384 usertrap_amd64.go:122] [ 11455: 11455] Allocate a new trap: 0xc008f813e0 41 D0323 22:35:26.805131 921384 usertrap_amd64.go:225] [ 11455: 11455] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.811877 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.812080 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.815805 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.815959 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.817248 921384 usertrap_amd64.go:212] [ 11455: 11456] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.817281 921384 usertrap_amd64.go:122] [ 11455: 11456] Allocate a new trap: 0xc008f813e0 42 D0323 22:35:26.817299 921384 usertrap_amd64.go:225] [ 11455: 11456] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.817932 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.818047 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.821805 921384 usertrap_amd64.go:212] [ 11455: 11455] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.821840 921384 usertrap_amd64.go:122] [ 11455: 11455] Allocate a new trap: 0xc008f813e0 43 D0323 22:35:26.821852 921384 usertrap_amd64.go:225] [ 11455: 11455] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.822511 921384 task_exit.go:204] [ 11455: 11455] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.822558 921384 task_exit.go:204] [ 11455: 11455] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.822654 921384 task_signals.go:204] [ 11455: 11456] Signal 11455, PID: 11456, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.822682 921384 task_exit.go:204] [ 11455: 11456] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.824567 921384 task_exit.go:204] [ 11455: 11456] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.824604 921384 task_exit.go:204] [ 11455: 11456] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.824617 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.827581 921384 task_exit.go:204] [ 11455: 11455] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x401, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = socket$inet_icmp(0x2, 0x2, 0x1) fstat(r1, &(0x7f0000000100)) (async) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSIG(r3, 0x40045436, 0xc) D0323 22:35:26.841849 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.842024 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.852552 921384 usertrap_amd64.go:212] [ 11457: 11457] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.852582 921384 usertrap_amd64.go:122] [ 11457: 11457] Allocate a new trap: 0xc008183950 39 D0323 22:35:26.852643 921384 usertrap_amd64.go:225] [ 11457: 11457] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.853503 921384 usertrap_amd64.go:212] [ 11457: 11457] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.853528 921384 usertrap_amd64.go:122] [ 11457: 11457] Allocate a new trap: 0xc008183950 40 D0323 22:35:26.853539 921384 usertrap_amd64.go:225] [ 11457: 11457] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.853934 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.854914 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.865374 921384 usertrap_amd64.go:212] [ 11457: 11457] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.865410 921384 usertrap_amd64.go:122] [ 11457: 11457] Allocate a new trap: 0xc008183950 41 D0323 22:35:26.865424 921384 usertrap_amd64.go:225] [ 11457: 11457] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.871204 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.871902 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.877612 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.877795 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.878721 921384 usertrap_amd64.go:212] [ 11457: 11458] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.878768 921384 usertrap_amd64.go:122] [ 11457: 11458] Allocate a new trap: 0xc008183950 42 D0323 22:35:26.878782 921384 usertrap_amd64.go:225] [ 11457: 11458] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.879078 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.879177 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.880734 921384 usertrap_amd64.go:212] [ 11457: 11457] Found the pattern at ip 5650aba8ffa4:sysno 3 D0323 22:35:26.880760 921384 usertrap_amd64.go:122] [ 11457: 11457] Allocate a new trap: 0xc008183950 43 D0323 22:35:26.880778 921384 usertrap_amd64.go:225] [ 11457: 11457] Apply the binary patch addr 5650aba8ffa4 trap addr 65d70 ([184 3 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.881342 921384 task_exit.go:204] [ 11457: 11457] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.881384 921384 task_exit.go:204] [ 11457: 11457] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.881449 921384 task_signals.go:204] [ 11457: 11458] Signal 11457, PID: 11458, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.881473 921384 task_exit.go:204] [ 11457: 11458] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.881488 921384 task_signals.go:204] [ 11457: 11459] Signal 11457, PID: 11459, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.881502 921384 task_exit.go:204] [ 11457: 11458] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.881507 921384 task_exit.go:204] [ 11457: 11458] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.881527 921384 task_exit.go:204] [ 11457: 11459] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.885081 921384 task_exit.go:204] [ 11457: 11459] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.885107 921384 task_exit.go:204] [ 11457: 11459] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.885120 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.885329 921384 task_exit.go:204] [ 11457: 11457] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x401, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') r1 = socket$inet_icmp(0x2, 0x2, 0x1) fstat(r1, &(0x7f0000000100)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSIG(r3, 0x40045436, 0xc) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x401, 0x0) (async) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') (async) socket$inet_icmp(0x2, 0x2, 0x1) (async) fstat(r1, &(0x7f0000000100)) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) syz_open_pts(r2, 0x0) (async) ioctl$TIOCSIG(r3, 0x40045436, 0xc) (async) D0323 22:35:26.887501 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.887662 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.906808 921384 usertrap_amd64.go:212] [ 11460: 11460] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.906845 921384 usertrap_amd64.go:122] [ 11460: 11460] Allocate a new trap: 0xc004266060 39 D0323 22:35:26.906908 921384 usertrap_amd64.go:225] [ 11460: 11460] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.908008 921384 usertrap_amd64.go:212] [ 11460: 11460] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.908048 921384 usertrap_amd64.go:122] [ 11460: 11460] Allocate a new trap: 0xc004266060 40 D0323 22:35:26.908067 921384 usertrap_amd64.go:225] [ 11460: 11460] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.908413 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.908752 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.912556 921384 usertrap_amd64.go:212] [ 11460: 11460] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.912589 921384 usertrap_amd64.go:122] [ 11460: 11460] Allocate a new trap: 0xc004266060 41 D0323 22:35:26.912604 921384 usertrap_amd64.go:225] [ 11460: 11460] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.919299 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.919484 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.920362 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.920498 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.920831 921384 usertrap_amd64.go:212] [ 11460: 11461] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.920856 921384 usertrap_amd64.go:122] [ 11460: 11461] Allocate a new trap: 0xc004266060 42 D0323 22:35:26.920868 921384 usertrap_amd64.go:225] [ 11460: 11461] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.921203 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.921306 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.922478 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.922615 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.925555 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.925700 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.926747 921384 usertrap_amd64.go:212] [ 11460: 11460] Found the pattern at ip 5650abb02e1a:sysno 230 D0323 22:35:26.926776 921384 usertrap_amd64.go:122] [ 11460: 11460] Allocate a new trap: 0xc004266060 43 D0323 22:35:26.926788 921384 usertrap_amd64.go:225] [ 11460: 11460] Apply the binary patch addr 5650abb02e1a trap addr 65d70 ([184 230 0 0 0 15 5] -> [255 36 37 112 93 6 0]) D0323 22:35:26.939635 921384 task_run.go:312] [ 11460: 11464] Unhandled user fault: addr=0 ip=5650aba83bc4 access=r-- sig=11 err=bad address D0323 22:35:26.939735 921384 task_log.go:87] [ 11460: 11464] Registers: D0323 22:35:26.939776 921384 task_log.go:94] [ 11460: 11464] Cs = 0000000000000033 D0323 22:35:26.939785 921384 task_log.go:94] [ 11460: 11464] Ds = 0000000000000000 D0323 22:35:26.939791 921384 task_log.go:94] [ 11460: 11464] Eflags = 0000000000010202 D0323 22:35:26.939797 921384 task_log.go:94] [ 11460: 11464] Es = 0000000000000000 D0323 22:35:26.939804 921384 task_log.go:94] [ 11460: 11464] Fs = 0000000000000000 D0323 22:35:26.939810 921384 task_log.go:94] [ 11460: 11464] Fs_base = 00007eccc3e23700 D0323 22:35:26.939816 921384 task_log.go:94] [ 11460: 11464] Gs = 0000000000000000 D0323 22:35:26.939823 921384 task_log.go:94] [ 11460: 11464] Gs_base = 00007ffbf6d1f000 D0323 22:35:26.939829 921384 task_log.go:94] [ 11460: 11464] Orig_rax = ffffffffffffffff D0323 22:35:26.939836 921384 task_log.go:94] [ 11460: 11464] R10 = 00100b6ac3c5c1af D0323 22:35:26.939842 921384 task_log.go:94] [ 11460: 11464] R11 = 00000000861c4b36 D0323 22:35:26.939848 921384 task_log.go:94] [ 11460: 11464] R12 = 0000000000000000 D0323 22:35:26.939856 921384 task_log.go:94] [ 11460: 11464] R13 = 00007eeff73f235f D0323 22:35:26.939862 921384 task_log.go:94] [ 11460: 11464] R14 = 00007eccc3e23300 D0323 22:35:26.939868 921384 task_log.go:94] [ 11460: 11464] R15 = 0000000000022000 D0323 22:35:26.939874 921384 task_log.go:94] [ 11460: 11464] R8 = 000000003a15b535 D0323 22:35:26.939881 921384 task_log.go:94] [ 11460: 11464] R9 = 00000000000001ce D0323 22:35:26.939888 921384 task_log.go:94] [ 11460: 11464] Rax = 0000000000000000 D0323 22:35:26.939894 921384 task_log.go:94] [ 11460: 11464] Rbp = 00005650abb39b39 D0323 22:35:26.939901 921384 task_log.go:94] [ 11460: 11464] Rbx = 0000000000000002 D0323 22:35:26.939906 921384 task_log.go:94] [ 11460: 11464] Rcx = 00005650abb48852 D0323 22:35:26.939912 921384 task_log.go:94] [ 11460: 11464] Rdi = 00005650abb38941 D0323 22:35:26.939918 921384 task_log.go:94] [ 11460: 11464] Rdx = 000000000003810f D0323 22:35:26.939925 921384 task_log.go:94] [ 11460: 11464] Rip = 00005650aba83bc4 D0323 22:35:26.939931 921384 task_log.go:94] [ 11460: 11464] Rsi = 0000000000000000 D0323 22:35:26.939936 921384 task_log.go:94] [ 11460: 11464] Rsp = 00007eccc3e23190 D0323 22:35:26.939942 921384 task_log.go:94] [ 11460: 11464] Ss = 000000000000002b D0323 22:35:26.939948 921384 task_log.go:111] [ 11460: 11464] Stack: D0323 22:35:26.939956 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23190: 00 00 00 00 00 00 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:26.939967 921384 task_log.go:128] [ 11460: 11464] 7eccc3e231a0: 00 00 00 00 00 00 00 00 03 10 00 00 ff ff ff ff D0323 22:35:26.939974 921384 task_log.go:128] [ 11460: 11464] 7eccc3e231b0: 00 00 00 00 00 00 00 00 b0 b7 bc ab 50 56 00 00 D0323 22:35:26.939979 921384 task_log.go:128] [ 11460: 11464] 7eccc3e231c0: e6 00 00 00 00 00 00 00 35 b5 15 3a 00 00 00 00 D0323 22:35:26.939988 921384 task_log.go:128] [ 11460: 11464] 7eccc3e231d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.939996 921384 task_log.go:128] [ 11460: 11464] 7eccc3e231e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940002 921384 task_log.go:128] [ 11460: 11464] 7eccc3e231f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940009 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23200: f8 e1 bf ab 50 56 00 00 f0 e1 bf ab 50 56 00 00 D0323 22:35:26.940015 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23210: fc e1 bf ab 50 56 00 00 e4 7a a8 ab 50 56 00 00 D0323 22:35:26.940021 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940037 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23230: 5e 23 3f f7 ef 7e 00 00 87 cc a8 ab 50 56 00 00 D0323 22:35:26.940044 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23240: 00 00 00 00 00 00 00 00 00 37 e2 c3 cc 7e 00 00 D0323 22:35:26.940051 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23250: 00 37 e2 c3 cc 7e 00 00 30 be 31 66 7f 24 fb 39 D0323 22:35:26.940057 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23260: 5e 23 3f f7 ef 7e 00 00 5f 23 3f f7 ef 7e 00 00 D0323 22:35:26.940063 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23270: 00 33 e2 c3 cc 7e 00 00 00 20 02 00 00 00 00 00 D0323 22:35:26.940070 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23280: 30 be b1 02 bb a3 62 c4 30 be 6b fe 2e 73 5a 95 D0323 22:35:26.940089 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940097 921384 task_log.go:128] [ 11460: 11464] 7eccc3e232a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940105 921384 task_log.go:128] [ 11460: 11464] 7eccc3e232b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940113 921384 task_log.go:128] [ 11460: 11464] 7eccc3e232c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940121 921384 task_log.go:128] [ 11460: 11464] 7eccc3e232d0: 00 00 00 00 00 00 00 00 00 26 88 03 43 46 c5 16 D0323 22:35:26.940129 921384 task_log.go:128] [ 11460: 11464] 7eccc3e232e0: 00 37 e2 c3 cc 7e 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940137 921384 task_log.go:128] [ 11460: 11464] 7eccc3e232f0: 5e 23 3f f7 ef 7e 00 00 2f f5 ad ab 50 56 00 00 D0323 22:35:26.940145 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940162 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940179 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940189 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940197 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940205 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940213 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940282 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940363 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940392 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940435 921384 task_log.go:128] [ 11460: 11464] 7eccc3e233a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940452 921384 task_log.go:128] [ 11460: 11464] 7eccc3e233b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940467 921384 task_log.go:128] [ 11460: 11464] 7eccc3e233c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940482 921384 task_log.go:128] [ 11460: 11464] 7eccc3e233d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940497 921384 task_log.go:128] [ 11460: 11464] 7eccc3e233e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940512 921384 task_log.go:128] [ 11460: 11464] 7eccc3e233f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940543 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940663 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940700 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940763 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940794 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940842 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940878 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.940931 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941017 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941065 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941086 921384 task_log.go:128] [ 11460: 11464] 7eccc3e234a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941116 921384 task_log.go:128] [ 11460: 11464] 7eccc3e234b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941129 921384 task_log.go:128] [ 11460: 11464] 7eccc3e234c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941134 921384 task_log.go:128] [ 11460: 11464] 7eccc3e234d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941138 921384 task_log.go:128] [ 11460: 11464] 7eccc3e234e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941143 921384 task_log.go:128] [ 11460: 11464] 7eccc3e234f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941163 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941176 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941181 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941185 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941189 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941194 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941223 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941235 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941240 921384 task_log.go:128] [ 11460: 11464] 7eccc3e23580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 D0323 22:35:26.941244 921384 task_log.go:149] [ 11460: 11464] Code: D0323 22:35:26.941249 921384 task_log.go:167] [ 11460: 11464] 5650aba83b80: 48 89 ee 48 89 c2 e8 a5 c2 00 00 48 89 ef 49 89 D0323 22:35:26.941254 921384 task_log.go:167] [ 11460: 11464] 5650aba83b90: c4 e8 7a 26 ff ff 49 39 c4 0f 85 b0 03 00 00 48 D0323 22:35:26.941258 921384 task_log.go:167] [ 11460: 11464] 5650aba83ba0: 8b 44 24 08 89 5c 24 1c c6 80 c8 00 00 00 01 80 D0323 22:35:26.941262 921384 task_log.go:167] [ 11460: 11464] 5650aba83bb0: 3d 07 3b ca 00 00 74 13 48 8b 44 24 08 48 8b 80 D0323 22:35:26.941266 921384 task_log.go:167] [ 11460: 11464] 5650aba83bc0: a8 00 00 00 48 c7 00 00 00 00 00 48 8b 5c 24 08 D0323 22:35:26.941270 921384 task_log.go:167] [ 11460: 11464] 5650aba83bd0: 48 c7 83 88 00 00 00 ff ff ff ff e8 a0 d1 00 00 D0323 22:35:26.941275 921384 task_log.go:167] [ 11460: 11464] 5650aba83be0: c7 00 0e 00 00 00 64 f0 83 04 25 b0 ff ff ff 01 D0323 22:35:26.941279 921384 task_log.go:167] [ 11460: 11464] 5650aba83bf0: 64 48 8b 04 25 00 00 00 00 48 8d b8 e8 fe ff ff D0323 22:35:26.941285 921384 task_log.go:71] [ 11460: 11464] Mappings: VMAs: 00065000-0006a000 r-xp 00000000 00:00 0 [usertrap] 1ffff000-20000000 ---p 00000000 00:00 0 20000000-21000000 rwxp 00000000 00:00 0 21000000-21001000 ---p 00000000 00:00 0 1b2d320000-1b2d360000 rw-s 00000000 00:04 3 /memfd:syz-shared-mem (deleted) 5650aba52000-5650aba76000 r--p 00000000 00:08 8 /syz-executor 5650aba76000-5650abb28000 r-xp 00024000 00:08 8 /syz-executor 5650abb28000-5650abb7a000 r--p 000d6000 00:08 8 /syz-executor 5650abb7b000-5650abbd4000 r--p 00128000 00:08 8 /syz-executor 5650abbd4000-5650abbdd000 rw-p 00181000 00:08 8 /syz-executor 5650abbe2000-5650ac72e000 rw-p 00000000 00:00 0 5650ac72e000-5650ac750000 rw-p 00000000 00:00 0 [heap] 7eccc3200000-7eccc3400000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3400000-7eccc3600000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3600000-7eccc3800000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3800000-7eccc3a00000 rw-s 00000000 00:00 0 [kcov:23] 7eccc3a00000-7eccc3e00000 r--p 00000000 00:04 2 /memfd:syz-shared-mem (deleted) 7eccc3e03000-7eccc3e04000 ---p 00000000 00:00 0 7eccc3e04000-7eccc3e24000 rw-p 00000000 00:00 0 7eccc3e24000-7eccc3e25000 ---p 00000000 00:00 0 7eccc3e25000-7eccc3e45000 rw-p 00000000 00:00 0 7eccc3e45000-7eccc3e46000 ---p 00000000 00:00 0 7eccc3e46000-7eccc3e66000 rw-p 00000000 00:00 0 7eccc3e66000-7eccc3e67000 ---p 00000000 00:00 0 7eccc3e67000-7eccc3e87000 rw-p 00000000 00:00 0 7eccc3e87000-7eccc3e88000 r--p 00000000 00:00 0 [vvar] 7eccc3e88000-7eccc3e8a000 r-xp 00000000 00:00 0 7eeff6bf3000-7eeff73f3000 rw-p 00000000 00:00 0 [stack] PMAs: 00065000-00066000 r-xp 035f7000 *pgalloc.MemoryFile 00066000-0006a000 r-xp 00bfa000 *pgalloc.MemoryFile 20000000-20200000 rwxp 07400000 *pgalloc.MemoryFile 1b2d320000-1b2d360000 rw-s 09800000 *pgalloc.MemoryFile 5650aba52000-5650aba76000 r--p 05dc0000 *pgalloc.MemoryFile 5650aba76000-5650aba8f000 r-xs 00024000 *gofer.dentryPlatformFile 5650aba8f000-5650aba90000 r-xp 035fa000 *pgalloc.MemoryFile 5650aba90000-5650aba91000 r-xp 062a1000 *pgalloc.MemoryFile 5650aba91000-5650aba92000 r-xp 00bff000 *pgalloc.MemoryFile 5650aba92000-5650abadb000 r-xs 00040000 *gofer.dentryPlatformFile 5650abadb000-5650abadc000 r-xp 03fff000 *pgalloc.MemoryFile 5650abadc000-5650abadd000 r-xp 035f9000 *pgalloc.MemoryFile 5650abadd000-5650abade000 r-xp 043ff000 *pgalloc.MemoryFile 5650abade000-5650abadf000 r-xp 023f5000 *pgalloc.MemoryFile 5650abadf000-5650abae0000 r-xp 0605c000 *pgalloc.MemoryFile 5650abae0000-5650abb02000 r-xs 0008e000 *gofer.dentryPlatformFile 5650abb02000-5650abb03000 r-xp 062ac000 *pgalloc.MemoryFile 5650abb03000-5650abb04000 r-xp 035ff000 *pgalloc.MemoryFile 5650abb1b000-5650abb1c000 r-xp 035fb000 *pgalloc.MemoryFile 5650abb27000-5650abb28000 r-xp 005fc000 *pgalloc.MemoryFile 5650abb28000-5650abb7a000 r--p 06515000 *pgalloc.MemoryFile 5650abb7b000-5650abbdd000 rw-p 0725c000 *pgalloc.MemoryFile 5650abbe2000-5650abc00000 rw-p 066fc000 *pgalloc.MemoryFile 5650ac600000-5650ac72e000 rw-p 0712e000 *pgalloc.MemoryFile 5650ac72e000-5650ac72f000 rw-p 005ff000 *pgalloc.MemoryFile 5650ac72f000-5650ac750000 rw-p 06b18000 *pgalloc.MemoryFile 7eccc3400000-7eccc3600000 rw-s 0b000000 *pgalloc.MemoryFile 7eccc3600000-7eccc3800000 rw-s 0ae00000 *pgalloc.MemoryFile 7eccc3800000-7eccc3a00000 rw-s 0ac00000 *pgalloc.MemoryFile 7eccc3a00000-7eccc3e00000 r--s 09400000 *pgalloc.MemoryFile 7eccc3e04000-7eccc3e24000 rw-p 06b9a000 *pgalloc.MemoryFile 7eccc3e25000-7eccc3e45000 rw-p 06ae8000 *pgalloc.MemoryFile 7eccc3e46000-7eccc3e66000 rw-p 06ac0000 *pgalloc.MemoryFile 7eccc3e67000-7eccc3e87000 rw-p 0684d000 *pgalloc.MemoryFile 7eccc3e87000-7eccc3e88000 r--s 00002000 *pgalloc.MemoryFile 7eccc3e88000-7eccc3e8a000 r-xs 00000000 *pgalloc.MemoryFile 7eeff7200000-7eeff73ef000 r--p 0a800000 *pgalloc.MemoryFile 7eeff73ef000-7eeff73f1000 r--p 023fe000 *pgalloc.MemoryFile 7eeff73f1000-7eeff73f3000 rw-p 035fd000 *pgalloc.MemoryFile D0323 22:35:26.941564 921384 task_log.go:73] [ 11460: 11464] FDTable: fd:226 => name /sys/kernel/debug/kcov fd:7 => name /dev/null fd:8 => name socket:[25891] fd:216 => name /sys/kernel/debug/kcov fd:221 => name /sys/kernel/debug/kcov fd:222 => name /sys/kernel/debug/kcov fd:225 => name /sys/kernel/debug/kcov fd:0 => name pipe:[5] fd:1 => name pipe:[5] fd:201 => name / fd:217 => name /sys/kernel/debug/kcov fd:220 => name /sys/kernel/debug/kcov fd:227 => name /sys/kernel/debug/kcov fd:3 => name /dev/null fd:200 => name /dev/net/tun fd:215 => name /sys/kernel/debug/kcov fd:218 => name /sys/kernel/debug/kcov fd:9 => name /dev/pts/ptmx fd:219 => name /sys/kernel/debug/kcov fd:223 => name /sys/kernel/debug/kcov fd:224 => name /sys/kernel/debug/kcov fd:2 => name pipe:[5] fd:4 => name socket:[25890] fd:5 => name /dev/pts/ptmx fd:6 => name /dev/pts/297 D0323 22:35:26.941689 921384 task_signals.go:470] [ 11460: 11464] Notified of signal 11 D0323 22:35:26.941738 921384 task_signals.go:220] [ 11460: 11464] Signal 11: delivering to handler D0323 22:35:26.941950 921384 task_exit.go:204] [ 11460: 11464] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.941996 921384 task_signals.go:204] [ 11460: 11462] Signal 11460, PID: 11462, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.942011 921384 task_exit.go:204] [ 11460: 11464] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.942035 921384 task_exit.go:204] [ 11460: 11464] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.942120 921384 task_signals.go:204] [ 11460: 11461] Signal 11460, PID: 11461, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.942134 921384 task_signals.go:204] [ 11460: 11460] Signal 11460, PID: 11460, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.942154 921384 task_exit.go:204] [ 11460: 11461] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.942176 921384 task_signals.go:204] [ 11460: 11463] Signal 11460, PID: 11463, TID: 0, fault addr: 0x9: terminating thread group D0323 22:35:26.942194 921384 task_exit.go:204] [ 11460: 11460] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.942222 921384 task_exit.go:204] [ 11460: 11460] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.942249 921384 task_exit.go:204] [ 11460: 11462] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.942271 921384 task_exit.go:204] [ 11460: 11462] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.942292 921384 task_exit.go:204] [ 11460: 11462] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.942325 921384 task_exit.go:204] [ 11460: 11461] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.942348 921384 task_exit.go:204] [ 11460: 11461] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.942367 921384 task_exit.go:204] [ 11460: 11463] Transitioning from exit state TaskExitNone to TaskExitInitiated D0323 22:35:26.947747 921384 task_exit.go:204] [ 11460: 11463] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0323 22:35:26.947779 921384 task_exit.go:204] [ 11460: 11463] Transitioning from exit state TaskExitZombie to TaskExitDead D0323 22:35:26.947793 921384 task_signals.go:443] [ 24: 24] Discarding ignored signal 17 D0323 22:35:26.951619 921384 task_exit.go:204] [ 11460: 11460] Transitioning from exit state TaskExitZombie to TaskExitDead 22:35:26 executing program 0: inotify_init() inotify_init() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_pts(r1, 0x68040) syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCSBRK(r1, 0x5427) syz_open_pts(r0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) write$P9_RSTAT(r2, 0x0, 0x0) write$P9_RLINK(r2, &(0x7f0000000040)={0x7, 0x47, 0x1}, 0x7) D0323 22:35:26.954654 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.954818 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.966501 921384 usertrap_amd64.go:212] [ 11465: 11465] Found the pattern at ip 5650abb03490:sysno 109 D0323 22:35:26.966644 921384 usertrap_amd64.go:122] [ 11465: 11465] Allocate a new trap: 0xc008183d70 39 D0323 22:35:26.966797 921384 usertrap_amd64.go:225] [ 11465: 11465] Apply the binary patch addr 5650abb03490 trap addr 65c30 ([184 109 0 0 0 15 5] -> [255 36 37 48 92 6 0]) D0323 22:35:26.972919 921384 usertrap_amd64.go:212] [ 11465: 11465] Found the pattern at ip 5650abadda30:sysno 266 D0323 22:35:26.973004 921384 usertrap_amd64.go:122] [ 11465: 11465] Allocate a new trap: 0xc008183d70 40 D0323 22:35:26.973022 921384 usertrap_amd64.go:225] [ 11465: 11465] Apply the binary patch addr 5650abadda30 trap addr 65c80 ([184 10 1 0 0 15 5] -> [255 36 37 128 92 6 0]) D0323 22:35:26.974116 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, proc]} D0323 22:35:26.974571 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.976668 921384 usertrap_amd64.go:212] [ 11465: 11465] Found the pattern at ip 5650abadf51a:sysno 56 D0323 22:35:26.976698 921384 usertrap_amd64.go:122] [ 11465: 11465] Allocate a new trap: 0xc008183d70 41 D0323 22:35:26.976715 921384 usertrap_amd64.go:225] [ 11465: 11465] Apply the binary patch addr 5650abadf51a trap addr 65cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 92 6 0]) D0323 22:35:26.987384 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.987602 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.988158 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.988328 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.990030 921384 usertrap_amd64.go:212] [ 11465: 11466] Found the pattern at ip 5650aba9027d:sysno 257 D0323 22:35:26.990113 921384 usertrap_amd64.go:122] [ 11465: 11466] Allocate a new trap: 0xc008183d70 42 D0323 22:35:26.990169 921384 usertrap_amd64.go:225] [ 11465: 11466] Apply the binary patch addr 5650aba9027d trap addr 65d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 93 6 0]) D0323 22:35:26.990718 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.990825 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} D0323 22:35:26.998082 921384 client.go:400] send [channel 0xc0007c8000] WalkReq{DirFD: 1, Path: [, dev]} D0323 22:35:26.998194 921384 client.go:400] recv [channel 0xc0007c8000] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13513333, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-23 22:31:32.407876998 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-23 22:31:36.171871581 +0000 UTC, Mtime: 2023-03-23 22:31:36.171871581 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]} panic: interface conversion: *kernel.Kernel is not unimpl.Events: missing method EmitUnimplementedEvent goroutine 191899 [running]: panic({0x122e8a0, 0xc0021ebbc0}) GOROOT/src/runtime/panic.go:987 +0x3bb fp=0xc0012636a0 sp=0xc0012635e0 pc=0x436afb runtime.getitab(0x1235dc0, 0x13c17c0, 0x0) GOROOT/src/runtime/iface.go:92 +0x1e5 fp=0xc0012636e8 sp=0xc0012636a0 pc=0x40aae5 runtime.assertE2I(0x9aba99?, 0x11b6220?) GOROOT/src/runtime/iface.go:453 +0x25 fp=0xc001263710 sp=0xc0012636e8 pc=0x40bac5 gvisor.dev/gvisor/pkg/sentry/unimpl.EmitUnimplementedEvent({0x1637ff8, 0xc008c24a80}) pkg/sentry/unimpl/events.go:44 +0x66 fp=0xc001263750 sp=0xc001263710 pc=0x974f26 gvisor.dev/gvisor/pkg/sentry/fsimpl/devpts.maybeEmitUnimplementedEvent({0x1637ff8?, 0xc008c24a80?}, 0x4948720?) pkg/sentry/fsimpl/devpts/master.go:247 +0x105 fp=0xc001263770 sp=0xc001263750 pc=0xda2505 gvisor.dev/gvisor/pkg/sentry/fsimpl/devpts.(*masterFileDescription).Ioctl(0xc009ed1300, {0x1637ff8, 0xc008c24a80}, {0x16324d0, 0xc0026af000}, {{0x6}, {0x5427}, {0x0}, {0x0}, {0x0}, ...}) pkg/sentry/fsimpl/devpts/master.go:196 +0x5c7 fp=0xc001263818 sp=0xc001263770 pc=0xda2027 gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescription).Ioctl(...) pkg/sentry/vfs/file_description.go:712 gvisor.dev/gvisor/pkg/sentry/syscalls/linux.Ioctl(0xc008c24a80, 0x40000000?, {{0x6}, {0x5427}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/syscalls/linux/sys_file.go:286 +0x503 fp=0xc001263918 sp=0xc001263818 pc=0xb21443 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).executeSyscall(0xc008c24a80, 0x10, {{0x6}, {0x5427}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:142 +0x80b fp=0xc001263c58 sp=0xc001263918 pc=0x9c9fab gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallInvoke(0xc008c24a80, 0xc003d16120?, {{0x6}, {0x5427}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:322 +0x54 fp=0xc001263cb8 sp=0xc001263c58 pc=0x9cb594 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscallEnter(0xc001263e00?, 0xd05e25?, {{0x6}, {0x5427}, {0x0}, {0x0}, {0x0}, {0x0}}) pkg/sentry/kernel/task_syscall.go:282 +0x85 fp=0xc001263d18 sp=0xc001263cb8 pc=0x9cb185 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).doSyscall(0xc002db6000?) pkg/sentry/kernel/task_syscall.go:257 +0x3ac fp=0xc001263e10 sp=0xc001263d18 pc=0x9cae4c gvisor.dev/gvisor/pkg/sentry/kernel.(*runApp).execute(0xc007699f00?, 0xc008c24a80) pkg/sentry/kernel/task_run.go:269 +0x144a fp=0xc001263f48 sp=0xc001263e10 pc=0x9bc9ca gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc008c24a80, 0x2cca) pkg/sentry/kernel/task_run.go:98 +0x25c fp=0xc001263fc0 sp=0xc001263f48 pc=0x9bae7c gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:377 +0x2a fp=0xc001263fe0 sp=0xc001263fc0 pc=0x9c842a runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc001263fe8 sp=0xc001263fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:377 +0x105 goroutine 1 [semacquire, 3 minutes]: runtime.gopark(0xc00019a000?, 0xc0004f92f8?, 0x0?, 0xc0?, 0x3?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004f92c8 sp=0xc0004f92a8 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.semacquire1(0xc0001f0190, 0x68?, 0x1, 0x0, 0x88?) GOROOT/src/runtime/sema.go:160 +0x20f fp=0xc0004f9330 sp=0xc0004f92c8 pc=0x44b32f sync.runtime_Semacquire(0xc0004f9398?) GOROOT/src/runtime/sema.go:62 +0x27 fp=0xc0004f9368 sp=0xc0004f9330 pc=0x468d27 sync.(*WaitGroup).Wait(0x0?) GOROOT/src/sync/waitgroup.go:116 +0x4b fp=0xc0004f9390 sp=0xc0004f9368 pc=0x4799cb gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1112 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc000444000) runsc/boot/loader.go:1141 +0x38 fp=0xc0004f93a8 sp=0xc0004f9390 pc=0xead998 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc00039f0e0, {0xc000222100?, 0xc000273660?}, 0xc00051c060, {0xc000273660, 0x2, 0x1b?}) runsc/cmd/boot.go:443 +0x1625 fp=0xc0004f9898 sp=0xc0004f93a8 pc=0x10d1ce5 github.com/google/subcommands.(*Commander).Execute(0xc000224000, {0x162c358, 0xc000210000}, {0xc000273660, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x3a2 fp=0xc0004f9938 sp=0xc0004f9898 pc=0x513fe2 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main({0x1617034, 0x5}) runsc/cli/main.go:253 +0x69e5 fp=0xc0004f9f60 sp=0xc0004f9938 pc=0x1108745 main.main() runsc/main.go:23 +0x27 fp=0xc0004f9f80 sp=0xc0004f9f60 pc=0x1108d07 runtime.main() GOROOT/src/runtime/proc.go:250 +0x207 fp=0xc0004f9fe0 sp=0xc0004f9f80 pc=0x4398e7 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004f9fe8 sp=0xc0004f9fe0 pc=0x46d561 goroutine 2 [force gc (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012cfb0 sp=0xc00012cf90 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.forcegchelper() GOROOT/src/runtime/proc.go:305 +0xb0 fp=0xc00012cfe0 sp=0xc00012cfb0 pc=0x439b50 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012cfe8 sp=0xc00012cfe0 pc=0x46d561 created by runtime.init.6 GOROOT/src/runtime/proc.go:293 +0x25 goroutine 17 [GC sweep wait]: runtime.gopark(0x219a501?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000128780 sp=0xc000128760 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.bgsweep(0x0?) GOROOT/src/runtime/mgcsweep.go:319 +0xde fp=0xc0001287c8 sp=0xc000128780 pc=0x42435e runtime.gcenable.func1() GOROOT/src/runtime/mgc.go:178 +0x26 fp=0xc0001287e0 sp=0xc0001287c8 pc=0x419526 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001287e8 sp=0xc0001287e0 pc=0x46d561 created by runtime.gcenable GOROOT/src/runtime/mgc.go:178 +0x6b goroutine 18 [GC scavenge wait]: runtime.gopark(0x219ace0?, 0x1612f68?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000128f70 sp=0xc000128f50 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.(*scavengerState).park(0x219ace0) GOROOT/src/runtime/mgcscavenge.go:400 +0x53 fp=0xc000128fa0 sp=0xc000128f70 pc=0x422253 runtime.bgscavenge(0x0?) GOROOT/src/runtime/mgcscavenge.go:633 +0x65 fp=0xc000128fc8 sp=0xc000128fa0 pc=0x422845 runtime.gcenable.func2() GOROOT/src/runtime/mgc.go:179 +0x26 fp=0xc000128fe0 sp=0xc000128fc8 pc=0x4194c6 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000128fe8 sp=0xc000128fe0 pc=0x46d561 created by runtime.gcenable GOROOT/src/runtime/mgc.go:179 +0xaa goroutine 33 [finalizer wait, 3 minutes]: runtime.gopark(0x43a092?, 0x7f0af2f9d968?, 0x0?, 0x0?, 0xc00012c770?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012c628 sp=0xc00012c608 pc=0x439d16 runtime.runfinq() GOROOT/src/runtime/mfinal.go:193 +0x107 fp=0xc00012c7e0 sp=0xc00012c628 pc=0x4184e7 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012c7e8 sp=0xc00012c7e0 pc=0x46d561 created by runtime.createfing GOROOT/src/runtime/mfinal.go:163 +0x45 goroutine 34 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004ba750 sp=0xc0004ba730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004ba7e0 sp=0xc0004ba750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004ba7e8 sp=0xc0004ba7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 35 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004baf50 sp=0xc0004baf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bafe0 sp=0xc0004baf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bafe8 sp=0xc0004bafe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 3 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012d750 sp=0xc00012d730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012d7e0 sp=0xc00012d750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012d7e8 sp=0xc00012d7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 19 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000129750 sp=0xc000129730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001297e0 sp=0xc000129750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001297e8 sp=0xc0001297e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 4 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012df50 sp=0xc00012df30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012dfe0 sp=0xc00012df50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012dfe8 sp=0xc00012dfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 36 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bb750 sp=0xc0004bb730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bb7e0 sp=0xc0004bb750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bb7e8 sp=0xc0004bb7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 20 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000129f50 sp=0xc000129f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000129fe0 sp=0xc000129f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000129fe8 sp=0xc000129fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 5 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012e750 sp=0xc00012e730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012e7e0 sp=0xc00012e750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012e7e8 sp=0xc00012e7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 6 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012ef50 sp=0xc00012ef30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012efe0 sp=0xc00012ef50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012efe8 sp=0xc00012efe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 21 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012a750 sp=0xc00012a730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012a7e0 sp=0xc00012a750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012a7e8 sp=0xc00012a7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 37 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bbf50 sp=0xc0004bbf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bbfe0 sp=0xc0004bbf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bbfe8 sp=0xc0004bbfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 38 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bc750 sp=0xc0004bc730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bc7e0 sp=0xc0004bc750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bc7e8 sp=0xc0004bc7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 39 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bcf50 sp=0xc0004bcf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bcfe0 sp=0xc0004bcf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bcfe8 sp=0xc0004bcfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 40 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bd750 sp=0xc0004bd730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bd7e0 sp=0xc0004bd750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bd7e8 sp=0xc0004bd7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 41 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004bdf50 sp=0xc0004bdf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004bdfe0 sp=0xc0004bdf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004bdfe8 sp=0xc0004bdfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 42 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b6750 sp=0xc0004b6730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b67e0 sp=0xc0004b6750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b67e8 sp=0xc0004b67e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 43 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b6f50 sp=0xc0004b6f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b6fe0 sp=0xc0004b6f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b6fe8 sp=0xc0004b6fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 44 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b7750 sp=0xc0004b7730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b77e0 sp=0xc0004b7750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b77e8 sp=0xc0004b77e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 45 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b7f50 sp=0xc0004b7f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b7fe0 sp=0xc0004b7f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b7fe8 sp=0xc0004b7fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 46 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b8750 sp=0xc0004b8730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b87e0 sp=0xc0004b8750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b87e8 sp=0xc0004b87e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 7 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012f750 sp=0xc00012f730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012f7e0 sp=0xc00012f750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012f7e8 sp=0xc00012f7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 47 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b8f50 sp=0xc0004b8f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b8fe0 sp=0xc0004b8f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b8fe8 sp=0xc0004b8fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 48 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b9750 sp=0xc0004b9730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b97e0 sp=0xc0004b9750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b97e8 sp=0xc0004b97e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 8 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012ff50 sp=0xc00012ff30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012ffe0 sp=0xc00012ff50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012ffe8 sp=0xc00012ffe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 22 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012af50 sp=0xc00012af30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012afe0 sp=0xc00012af50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012afe8 sp=0xc00012afe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 49 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004b9f50 sp=0xc0004b9f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004b9fe0 sp=0xc0004b9f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004b9fe8 sp=0xc0004b9fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 50 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c4750 sp=0xc0004c4730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c47e0 sp=0xc0004c4750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c47e8 sp=0xc0004c47e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 51 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c4f50 sp=0xc0004c4f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c4fe0 sp=0xc0004c4f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c4fe8 sp=0xc0004c4fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 52 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c5750 sp=0xc0004c5730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c57e0 sp=0xc0004c5750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c57e8 sp=0xc0004c57e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 53 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c5f50 sp=0xc0004c5f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c5fe0 sp=0xc0004c5f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c5fe8 sp=0xc0004c5fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 54 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c6750 sp=0xc0004c6730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c67e0 sp=0xc0004c6750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c67e8 sp=0xc0004c67e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 55 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c6f50 sp=0xc0004c6f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c6fe0 sp=0xc0004c6f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c6fe8 sp=0xc0004c6fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 56 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c7750 sp=0xc0004c7730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c77e0 sp=0xc0004c7750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c77e8 sp=0xc0004c77e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 57 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c7f50 sp=0xc0004c7f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c7fe0 sp=0xc0004c7f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c7fe8 sp=0xc0004c7fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 58 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c0750 sp=0xc0004c0730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c07e0 sp=0xc0004c0750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c07e8 sp=0xc0004c07e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 59 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c0f50 sp=0xc0004c0f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c0fe0 sp=0xc0004c0f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c0fe8 sp=0xc0004c0fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 60 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c1750 sp=0xc0004c1730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c17e0 sp=0xc0004c1750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c17e8 sp=0xc0004c17e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 61 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c1f50 sp=0xc0004c1f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c1fe0 sp=0xc0004c1f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c1fe8 sp=0xc0004c1fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 62 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c2750 sp=0xc0004c2730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c27e0 sp=0xc0004c2750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c27e8 sp=0xc0004c27e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 63 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c2f50 sp=0xc0004c2f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c2fe0 sp=0xc0004c2f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c2fe8 sp=0xc0004c2fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 64 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c3750 sp=0xc0004c3730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c37e0 sp=0xc0004c3750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c37e8 sp=0xc0004c37e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 23 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012b750 sp=0xc00012b730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012b7e0 sp=0xc00012b750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012b7e8 sp=0xc00012b7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 24 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00012bf50 sp=0xc00012bf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00012bfe0 sp=0xc00012bf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00012bfe8 sp=0xc00012bfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 25 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a6750 sp=0xc0001a6730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a67e0 sp=0xc0001a6750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a67e8 sp=0xc0001a67e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 9 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a2750 sp=0xc0001a2730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a27e0 sp=0xc0001a2750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a27e8 sp=0xc0001a27e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 65 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004c3f50 sp=0xc0004c3f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004c3fe0 sp=0xc0004c3f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004c3fe8 sp=0xc0004c3fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 10 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a2f50 sp=0xc0001a2f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a2fe0 sp=0xc0001a2f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a2fe8 sp=0xc0001a2fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 81 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000506750 sp=0xc000506730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005067e0 sp=0xc000506750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005067e8 sp=0xc0005067e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 26 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a6f50 sp=0xc0001a6f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a6fe0 sp=0xc0001a6f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a6fe8 sp=0xc0001a6fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 82 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000506f50 sp=0xc000506f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000506fe0 sp=0xc000506f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000506fe8 sp=0xc000506fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 11 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a3750 sp=0xc0001a3730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a37e0 sp=0xc0001a3750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a37e8 sp=0xc0001a37e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 83 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000507750 sp=0xc000507730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005077e0 sp=0xc000507750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005077e8 sp=0xc0005077e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 66 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000502750 sp=0xc000502730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005027e0 sp=0xc000502750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005027e8 sp=0xc0005027e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 67 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000502f50 sp=0xc000502f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000502fe0 sp=0xc000502f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000502fe8 sp=0xc000502fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 12 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a3f50 sp=0xc0001a3f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a3fe0 sp=0xc0001a3f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a3fe8 sp=0xc0001a3fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 27 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a7750 sp=0xc0001a7730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a77e0 sp=0xc0001a7750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a77e8 sp=0xc0001a77e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 28 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a7f50 sp=0xc0001a7f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a7fe0 sp=0xc0001a7f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a7fe8 sp=0xc0001a7fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 13 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a4750 sp=0xc0001a4730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a47e0 sp=0xc0001a4750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a47e8 sp=0xc0001a47e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 68 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000503750 sp=0xc000503730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005037e0 sp=0xc000503750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005037e8 sp=0xc0005037e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 29 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a8750 sp=0xc0001a8730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a87e0 sp=0xc0001a8750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a87e8 sp=0xc0001a87e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 30 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a8f50 sp=0xc0001a8f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a8fe0 sp=0xc0001a8f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a8fe8 sp=0xc0001a8fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 31 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a9750 sp=0xc0001a9730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a97e0 sp=0xc0001a9750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a97e8 sp=0xc0001a97e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 32 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a9f50 sp=0xc0001a9f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a9fe0 sp=0xc0001a9f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a9fe8 sp=0xc0001a9fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 97 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b8750 sp=0xc0001b8730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b87e0 sp=0xc0001b8750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b87e8 sp=0xc0001b87e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 69 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000503f50 sp=0xc000503f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000503fe0 sp=0xc000503f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000503fe8 sp=0xc000503fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 98 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b8f50 sp=0xc0001b8f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b8fe0 sp=0xc0001b8f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b8fe8 sp=0xc0001b8fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 99 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b9750 sp=0xc0001b9730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b97e0 sp=0xc0001b9750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b97e8 sp=0xc0001b97e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 100 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b9f50 sp=0xc0001b9f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b9fe0 sp=0xc0001b9f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b9fe8 sp=0xc0001b9fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 101 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001ba750 sp=0xc0001ba730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001ba7e0 sp=0xc0001ba750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001ba7e8 sp=0xc0001ba7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 102 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001baf50 sp=0xc0001baf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bafe0 sp=0xc0001baf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bafe8 sp=0xc0001bafe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 103 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bb750 sp=0xc0001bb730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bb7e0 sp=0xc0001bb750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bb7e8 sp=0xc0001bb7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 70 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000504750 sp=0xc000504730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005047e0 sp=0xc000504750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005047e8 sp=0xc0005047e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 71 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000504f50 sp=0xc000504f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000504fe0 sp=0xc000504f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000504fe8 sp=0xc000504fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 14 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a4f50 sp=0xc0001a4f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a4fe0 sp=0xc0001a4f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a4fe8 sp=0xc0001a4fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 104 [GC worker (idle), 3 minutes]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bbf50 sp=0xc0001bbf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bbfe0 sp=0xc0001bbf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bbfe8 sp=0xc0001bbfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 15 [GC worker (idle), 1 minutes]: runtime.gopark(0x7216a8a60ebd6?, 0x1?, 0x9c?, 0xa6?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a5750 sp=0xc0001a5730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a57e0 sp=0xc0001a5750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a57e8 sp=0xc0001a57e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 105 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x50?, 0x9?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b4750 sp=0xc0001b4730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b47e0 sp=0xc0001b4750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b47e8 sp=0xc0001b47e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 72 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x19?, 0xdc?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000505750 sp=0xc000505730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005057e0 sp=0xc000505750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005057e8 sp=0xc0005057e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 73 [GC worker (idle)]: runtime.gopark(0x72182354e7601?, 0x1?, 0xde?, 0x1e?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000505f50 sp=0xc000505f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000505fe0 sp=0xc000505f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000505fe8 sp=0xc000505fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 74 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0xa6?, 0x5?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d0750 sp=0xc0004d0730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d07e0 sp=0xc0004d0750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d07e8 sp=0xc0004d07e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 75 [GC worker (idle), 1 minutes]: runtime.gopark(0x21ce6c0?, 0x1?, 0x91?, 0x83?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d0f50 sp=0xc0004d0f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d0fe0 sp=0xc0004d0f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d0fe8 sp=0xc0004d0fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 76 [GC worker (idle)]: runtime.gopark(0x72182354c6bb4?, 0x1?, 0x16?, 0x44?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d1750 sp=0xc0004d1730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d17e0 sp=0xc0004d1750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d17e8 sp=0xc0004d17e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 16 [GC worker (idle)]: runtime.gopark(0x72182354ebcc0?, 0x1?, 0x3e?, 0xd4?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a5f50 sp=0xc0001a5f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a5fe0 sp=0xc0001a5f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a5fe8 sp=0xc0001a5fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 113 [GC worker (idle), 1 minutes]: runtime.gopark(0x21ce6c0?, 0x1?, 0xea?, 0x43?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004cc750 sp=0xc0004cc730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004cc7e0 sp=0xc0004cc750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004cc7e8 sp=0xc0004cc7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 114 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x4f?, 0xcc?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004ccf50 sp=0xc0004ccf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004ccfe0 sp=0xc0004ccf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004ccfe8 sp=0xc0004ccfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 77 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0xe1?, 0xfd?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d1f50 sp=0xc0004d1f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d1fe0 sp=0xc0004d1f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d1fe8 sp=0xc0004d1fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 115 [GC worker (idle)]: runtime.gopark(0x72182354bfe35?, 0x1?, 0x62?, 0xc2?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004cd750 sp=0xc0004cd730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004cd7e0 sp=0xc0004cd750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004cd7e8 sp=0xc0004cd7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 106 [GC worker (idle)]: runtime.gopark(0x72182354c70f9?, 0x1?, 0x68?, 0xa1?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b4f50 sp=0xc0001b4f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b4fe0 sp=0xc0001b4f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b4fe8 sp=0xc0001b4fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 116 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0xd8?, 0x79?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004cdf50 sp=0xc0004cdf30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004cdfe0 sp=0xc0004cdf50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004cdfe8 sp=0xc0004cdfe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 107 [GC worker (idle), 2 minutes]: runtime.gopark(0x21ce6c0?, 0x1?, 0xa8?, 0xfb?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b5750 sp=0xc0001b5730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b57e0 sp=0xc0001b5750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b57e8 sp=0xc0001b57e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 78 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x1a?, 0xc3?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d2750 sp=0xc0004d2730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d27e0 sp=0xc0004d2750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d27e8 sp=0xc0004d27e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 79 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0xe9?, 0x2f?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d2f50 sp=0xc0004d2f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d2fe0 sp=0xc0004d2f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d2fe8 sp=0xc0004d2fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 80 [GC worker (idle)]: runtime.gopark(0x21ce6c0?, 0x1?, 0x1c?, 0xc0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004d3750 sp=0xc0004d3730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004d37e0 sp=0xc0004d3750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004d37e8 sp=0xc0004d37e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 84 [GC worker (idle)]: runtime.gopark(0x72182354c1ff5?, 0x1?, 0xc2?, 0xf9?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000507f50 sp=0xc000507f30 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000507fe0 sp=0xc000507f50 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000507fe8 sp=0xc000507fe0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 85 [GC worker (idle)]: runtime.gopark(0x72182354e693c?, 0x1?, 0x1b?, 0xbf?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000508750 sp=0xc000508730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0005087e0 sp=0xc000508750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0005087e8 sp=0xc0005087e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 117 [GC worker (idle), 1 minutes]: runtime.gopark(0x21ce6c0?, 0x1?, 0x4b?, 0x1b?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0004ce750 sp=0xc0004ce730 pc=0x439d16 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0004ce7e0 sp=0xc0004ce750 pc=0x41b291 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0004ce7e8 sp=0xc0004ce7e0 pc=0x46d561 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 118 [sync.Cond.Wait]: runtime.gopark(0x0?, 0xc0004a1c20?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000508d88 sp=0xc000508d68 pc=0x439d16 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 sync.runtime_notifyListWait(0xc0004a2230, 0x2c33) GOROOT/src/runtime/sema.go:527 +0x14c fp=0xc000508dd0 sp=0xc000508d88 pc=0x4690ec sync.(*Cond).Wait(0xc0004a1c00?) GOROOT/src/sync/cond.go:70 +0x8c fp=0xc000508e08 sp=0xc000508dd0 pc=0x47606c gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).findReclaimable(0xc0004a1c00) pkg/sentry/pgalloc/pgalloc.go:1276 +0x13e fp=0xc000508e78 sp=0xc000508e08 pc=0x7b64de gvisor.dev/gvisor/pkg/sentry/pgalloc.(*MemoryFile).runReclaim(0xc0004a1c00) pkg/sentry/pgalloc/pgalloc.go:1185 +0xa5 fp=0xc000508fc8 sp=0xc000508e78 pc=0x7b5a45 gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile.func2() pkg/sentry/pgalloc/pgalloc.go:362 +0x26 fp=0xc000508fe0 sp=0xc000508fc8 pc=0x7b0666 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000508fe8 sp=0xc000508fe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/sentry/pgalloc.NewMemoryFile pkg/sentry/pgalloc/pgalloc.go:362 +0x2f6 goroutine 129 [chan receive, 3 minutes]: runtime.gopark(0xc00051c240?, 0xc0001647f8?, 0x58?, 0x48?, 0x120ff00?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00058cee0 sp=0xc00058cec0 pc=0x439d16 runtime.chanrecv(0xc000201bc0, 0xc00058cfc0, 0x1) GOROOT/src/runtime/chan.go:583 +0x49d fp=0xc00058cf70 sp=0xc00058cee0 pc=0x40701d runtime.chanrecv2(0xc0001941c0?, 0x124f8c0?) GOROOT/src/runtime/chan.go:447 +0x18 fp=0xc00058cf98 sp=0xc00058cf70 pc=0x406b58 gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess.func1() pkg/sentry/platform/systrap/subprocess.go:303 +0x57 fp=0xc00058cfe0 sp=0xc00058cf98 pc=0xcfc9f7 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00058cfe8 sp=0xc00058cfe0 pc=0x46d561 created by gvisor.dev/gvisor/pkg/sentry/platform/systrap.newSubprocess pkg/sentry/platform/systrap/subprocess.go:300 +0x2c5 VM DIAGNOSIS: I0323 22:35:27.075707 953998 main.go:222] *************************** I0323 22:35:27.075780 953998 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-0] I0323 22:35:27.075813 953998 main.go:224] Version 0.0.0 I0323 22:35:27.075829 953998 main.go:225] GOOS: linux I0323 22:35:27.075845 953998 main.go:226] GOARCH: amd64 I0323 22:35:27.075880 953998 main.go:227] PID: 953998 I0323 22:35:27.075900 953998 main.go:228] UID: 0, GID: 0 I0323 22:35:27.075920 953998 main.go:229] Configuration: I0323 22:35:27.076176 953998 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root I0323 22:35:27.076212 953998 main.go:231] Platform: systrap I0323 22:35:27.076238 953998 main.go:232] FileAccess: shared I0323 22:35:27.076268 953998 main.go:233] Directfs: false I0323 22:35:27.076285 953998 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0323 22:35:27.076313 953998 main.go:236] Network: sandbox, logging: false I0323 22:35:27.076335 953998 main.go:237] Strace: false, max size: 1024, syscalls: I0323 22:35:27.076352 953998 main.go:238] IOURING: false I0323 22:35:27.076368 953998 main.go:239] Debug: true I0323 22:35:27.076384 953998 main.go:240] Systemd: false I0323 22:35:27.076400 953998 main.go:241] *************************** D0323 22:35:27.076748 953998 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0323 22:35:27.078758 953998 util.go:51] Found sandbox ["ci-gvisor-systrap-1-cover-0" '\U000e0f28'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-cover-0" '\U000e0f28'], PID: %!d(MISSING) I0323 22:35:27.078823 953998 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0323 22:35:27.078829 953998 sandbox.go:1223] Stacks sandbox "ci-gvisor-systrap-1-cover-0" D0323 22:35:27.078837 953998 sandbox.go:571] Connecting to sandbox "ci-gvisor-systrap-1-cover-0" W0323 22:35:27.078904 953998 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: connecting to control server at PID 921384: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: connecting to control server at PID 921384: connection refused W0323 22:35:27.078956 953998 main.go:267] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-cover/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-cover-0"]: exit status 128 I0323 22:35:27.075707 953998 main.go:222] *************************** I0323 22:35:27.075780 953998 main.go:223] Args: [/syzkaller/managers/ci-gvisor-systrap-1-cover/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic debug -stacks --ps ci-gvisor-systrap-1-cover-0] I0323 22:35:27.075813 953998 main.go:224] Version 0.0.0 I0323 22:35:27.075829 953998 main.go:225] GOOS: linux I0323 22:35:27.075845 953998 main.go:226] GOARCH: amd64 I0323 22:35:27.075880 953998 main.go:227] PID: 953998 I0323 22:35:27.075900 953998 main.go:228] UID: 0, GID: 0 I0323 22:35:27.075920 953998 main.go:229] Configuration: I0323 22:35:27.076176 953998 main.go:230] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root I0323 22:35:27.076212 953998 main.go:231] Platform: systrap I0323 22:35:27.076238 953998 main.go:232] FileAccess: shared I0323 22:35:27.076268 953998 main.go:233] Directfs: false I0323 22:35:27.076285 953998 main.go:235] Overlay: Root=false, SubMounts=false, Medium="" I0323 22:35:27.076313 953998 main.go:236] Network: sandbox, logging: false I0323 22:35:27.076335 953998 main.go:237] Strace: false, max size: 1024, syscalls: I0323 22:35:27.076352 953998 main.go:238] IOURING: false I0323 22:35:27.076368 953998 main.go:239] Debug: true I0323 22:35:27.076384 953998 main.go:240] Systemd: false I0323 22:35:27.076400 953998 main.go:241] *************************** D0323 22:35:27.076748 953998 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-cover/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-cover-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} I0323 22:35:27.078758 953998 util.go:51] Found sandbox ["ci-gvisor-systrap-1-cover-0" '\U000e0f28'], PID: %!d(MISSING) Found sandbox ["ci-gvisor-systrap-1-cover-0" '\U000e0f28'], PID: %!d(MISSING) I0323 22:35:27.078823 953998 util.go:51] Retrieving sandbox stacks%!(EXTRA []interface {}=[]) Retrieving sandbox stacks %!(EXTRA []interface {}=[])D0323 22:35:27.078829 953998 sandbox.go:1223] Stacks sandbox "ci-gvisor-systrap-1-cover-0" D0323 22:35:27.078837 953998 sandbox.go:571] Connecting to sandbox "ci-gvisor-systrap-1-cover-0" W0323 22:35:27.078904 953998 util.go:64] FATAL ERROR: retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: connecting to control server at PID 921384: connection refused retrieving stacks: getting sandbox "ci-gvisor-systrap-1-cover-0" stacks: connecting to control server at PID 921384: connection refused W0323 22:35:27.078956 953998 main.go:267] Failure to execute command, err: 1 [1948532.138593] exe[32811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948532.142608] exe[35977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948532.286103] exe[133724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948532.332558] exe[131894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948532.491509] exe[764257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948533.040702] exe[137145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948533.070120] exe[785952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948536.634402] warn_bad_vsyscall: 88 callbacks suppressed [1948536.634407] exe[32706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948537.225176] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.246862] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.270424] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.291978] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.313480] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.337860] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.362059] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.383425] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948537.407294] exe[138850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948541.903173] warn_bad_vsyscall: 78 callbacks suppressed [1948541.903177] exe[763282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948541.946263] exe[762928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948542.042213] exe[764025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948542.086153] exe[764052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948542.803137] exe[72805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948542.926192] exe[764072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948543.089147] exe[763203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948543.093094] exe[764546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948543.214800] exe[953321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948543.449075] exe[763690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948546.904150] warn_bad_vsyscall: 16 callbacks suppressed [1948546.904153] exe[763308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948547.034708] exe[72786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.167148] exe[800857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.225212] exe[764169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.337559] exe[763761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.381230] exe[763693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.514135] exe[32781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.675075] exe[763028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.797622] exe[764103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948547.830069] exe[764256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948552.060708] warn_bad_vsyscall: 10 callbacks suppressed [1948552.060711] exe[131894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.177036] exe[764347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.219716] exe[764257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.293925] exe[764257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.331974] exe[764347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.356195] exe[131521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.384909] exe[764347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.428865] exe[131521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.454386] exe[764257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948552.499166] exe[805538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948557.277425] warn_bad_vsyscall: 104 callbacks suppressed [1948557.277428] exe[766240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948557.498990] exe[763097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948558.230985] exe[33829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948558.453766] exe[764769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f4a8e8 ax:ffffffffff600000 si:7f1b99f4ae08 di:ffffffffff600000 [1948559.158050] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.179658] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.203205] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.226202] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.247800] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948559.274153] exe[862679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f298e8 ax:ffffffffff600000 si:7f1b99f29e08 di:ffffffffff600000 [1948562.296397] warn_bad_vsyscall: 199 callbacks suppressed [1948562.296401] exe[32703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948563.053386] exe[758823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1948563.184436] exe[758194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed11846506 cs:33 sp:7f1b99f6b8e8 ax:ffffffffff600000 si:7f1b99f6be08 di:ffffffffff600000 [1949480.149081] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949480.193854] exe[140589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949480.240316] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.477892] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.538386] exe[222783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.595577] exe[151054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.653698] exe[142922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.708233] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.765781] exe[151054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949482.814793] exe[140593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1949507.117119] warn_bad_vsyscall: 6 callbacks suppressed [1949507.117122] exe[251801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558817ee0506 cs:33 sp:7fdddecb28e8 ax:ffffffffff600000 si:7fdddecb2e08 di:ffffffffff600000 [1949507.204165] exe[2408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558817ee0506 cs:33 sp:7fdddecb28e8 ax:ffffffffff600000 si:7fdddecb2e08 di:ffffffffff600000 [1949507.295659] exe[810377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558817ee0506 cs:33 sp:7fdddecb28e8 ax:ffffffffff600000 si:7fdddecb2e08 di:ffffffffff600000 [1949507.324991] exe[92622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558817ee0506 cs:33 sp:7fdddec708e8 ax:ffffffffff600000 si:7fdddec70e08 di:ffffffffff600000 [1949507.676939] exe[981612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949507.762485] exe[247711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949507.850984] exe[135936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949507.934383] exe[992497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949508.016910] exe[66606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949508.081666] exe[251484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.178589] warn_bad_vsyscall: 98 callbacks suppressed [1949512.178592] exe[73140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.273115] exe[195508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.362936] exe[791076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.448254] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.469360] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.491520] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.513531] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.535027] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.559119] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949512.581626] exe[790548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949517.849078] warn_bad_vsyscall: 187 callbacks suppressed [1949517.849081] exe[860216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949517.852497] exe[814285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.725264] exe[843343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949518.793948] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.817826] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.839103] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.862183] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.883676] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.905815] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949518.928967] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949522.863069] warn_bad_vsyscall: 151 callbacks suppressed [1949522.863072] exe[68505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949522.903427] exe[998903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949522.989833] exe[775423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949523.076351] exe[778589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949523.156878] exe[999082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.247661] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.268877] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.294577] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.315449] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949523.339794] exe[248937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d0f8e8 ax:ffffffffff600000 si:7f9545d0fe08 di:ffffffffff600000 [1949527.929068] warn_bad_vsyscall: 178 callbacks suppressed [1949527.929071] exe[279338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.008402] exe[276795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.094441] exe[69284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.153763] exe[790569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.238000] exe[797659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.323492] exe[814259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.348324] exe[790808] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949528.419838] exe[92818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d308e8 ax:ffffffffff600000 si:7f9545d30e08 di:ffffffffff600000 [1949528.481964] exe[775435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949528.552540] exe[816204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1327ec506 cs:33 sp:7f9545d518e8 ax:ffffffffff600000 si:7f9545d51e08 di:ffffffffff600000 [1949841.163107] warn_bad_vsyscall: 97 callbacks suppressed [1949841.163110] exe[140576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1949841.226340] exe[151054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1949841.227161] exe[141075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d70f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1949841.297772] exe[140580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d70f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950100.781164] exe[379678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d52efa506 cs:33 sp:7f809c1d9f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950104.192181] exe[81314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564477783506 cs:33 sp:7feda3d91f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950313.067187] exe[94384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55735770a506 cs:33 sp:7f3c5b6ad8e8 ax:ffffffffff600000 si:7f3c5b6ade08 di:ffffffffff600000 [1950313.186456] exe[101358] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55735770a506 cs:33 sp:7f3c5b6ad8e8 ax:ffffffffff600000 si:7f3c5b6ade08 di:ffffffffff600000 [1950313.936596] exe[96832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55735770a506 cs:33 sp:7f3c5b6ad8e8 ax:ffffffffff600000 si:7f3c5b6ade08 di:ffffffffff600000 [1950473.185427] exe[439203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a133e55506 cs:33 sp:7f2db16a9f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950506.179666] exe[434266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559318b23506 cs:33 sp:7f7837a6ef88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1950590.041605] exe[414098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950590.096174] exe[356241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950590.156044] exe[355998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950593.753277] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950593.840920] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950593.916634] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950593.993999] exe[357163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950594.070051] exe[361151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950594.146187] exe[357163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950594.207229] exe[357163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.077331] warn_bad_vsyscall: 16 callbacks suppressed [1950595.077334] exe[357163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.140426] exe[413966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.192314] exe[413966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.247691] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.303582] exe[361151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.359061] exe[436449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.415942] exe[355994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.495664] exe[429868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.556559] exe[429868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950595.613536] exe[413966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe203a5378 cs:33 sp:7f1dbc380f90 ax:7f1dbc381020 si:ffffffffff600000 di:55fe2046f2b3 [1950698.717149] warn_bad_vsyscall: 9 callbacks suppressed [1950698.717152] exe[103486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55605e668378 cs:33 sp:7fee705d2f90 ax:7fee705d3020 si:ffffffffff600000 di:55605e7322b3 [1950698.835083] exe[98752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55605e668378 cs:33 sp:7fee705d2f90 ax:7fee705d3020 si:ffffffffff600000 di:55605e7322b3 [1950698.872562] exe[98079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55605e668378 cs:33 sp:7fee70590f90 ax:7fee70591020 si:ffffffffff600000 di:55605e7322b3 [1950698.990928] exe[135164] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55605e668378 cs:33 sp:7fee705d2f90 ax:7fee705d3020 si:ffffffffff600000 di:55605e7322b3 [1951369.114341] exe[573826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774036f506 cs:33 sp:7ecd9a9a0f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953255.660059] exe[842809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fd73f6506 cs:33 sp:7f33963cef88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953290.027075] exe[551001] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564532f2506 cs:33 sp:7f539ae898e8 ax:ffffffffff600000 si:7f539ae89e08 di:ffffffffff600000 [1953290.132912] exe[376219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564532f2506 cs:33 sp:7f539ae898e8 ax:ffffffffff600000 si:7f539ae89e08 di:ffffffffff600000 [1953290.413039] exe[506439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5564532f2506 cs:33 sp:7f539ae268e8 ax:ffffffffff600000 si:7f539ae26e08 di:ffffffffff600000 [1953423.477674] exe[881006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563941c68506 cs:33 sp:7fed6c309f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953595.380027] exe[840174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577e38d4506 cs:33 sp:7ff3863688e8 ax:ffffffffff600000 si:7ff386368e08 di:ffffffffff600000 [1953595.488594] exe[671854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577e38d4506 cs:33 sp:7ff3863688e8 ax:ffffffffff600000 si:7ff386368e08 di:ffffffffff600000 [1953595.523284] exe[671854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577e38d4506 cs:33 sp:7ff3863688e8 ax:ffffffffff600000 si:7ff386368e08 di:ffffffffff600000 [1953595.618178] exe[649589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5577e38d4506 cs:33 sp:7ff3863688e8 ax:ffffffffff600000 si:7ff386368e08 di:ffffffffff600000 [1953759.736543] exe[933642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b09980506 cs:33 sp:7f5ae896ff88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953787.183051] exe[939684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bef67fd506 cs:33 sp:7f7f5a46bf88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1953842.288907] exe[892712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d7a91d378 cs:33 sp:7f6a55ffdf90 ax:7f6a55ffe020 si:ffffffffff600000 di:561d7a9e72b3 [1954241.233456] exe[634199] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582d2301378 cs:33 sp:7fb15d040f90 ax:7fb15d041020 si:ffffffffff600000 di:5582d23cb2b3 [1954241.302606] exe[632676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582d2301378 cs:33 sp:7fb15d01ff90 ax:7fb15d020020 si:ffffffffff600000 di:5582d23cb2b3 [1954242.097890] exe[632526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582d2301378 cs:33 sp:7fb15d040f90 ax:7fb15d041020 si:ffffffffff600000 di:5582d23cb2b3 [1955338.793838] exe[173189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3cef3c506 cs:33 sp:7fc23fca88e8 ax:ffffffffff600000 si:7fc23fca8e08 di:ffffffffff600000 [1955338.848662] exe[890205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3cef3c506 cs:33 sp:7fc23fca88e8 ax:ffffffffff600000 si:7fc23fca8e08 di:ffffffffff600000 [1955338.902381] exe[890205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c3cef3c506 cs:33 sp:7fc23fca88e8 ax:ffffffffff600000 si:7fc23fca8e08 di:ffffffffff600000 [1955345.604767] exe[825200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.677231] exe[890205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.737971] exe[1788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.795191] exe[890207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.857749] exe[179708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.913373] exe[176216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955345.988978] exe[890192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955346.033204] exe[830209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55abb95ba506 cs:33 sp:7f92979a58e8 ax:ffffffffff600000 si:7f92979a5e08 di:ffffffffff600000 [1955346.254275] exe[887839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955346.355586] exe[823633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8b98e8 ax:ffffffffff600000 si:7fe68d8b9e08 di:ffffffffff600000 [1955351.334755] warn_bad_vsyscall: 274 callbacks suppressed [1955351.334758] exe[826217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.436035] exe[824779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.516769] exe[824779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.610525] exe[823836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.668063] exe[902263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.734264] exe[823474] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955351.734270] exe[159327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.823556] exe[823657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.878708] exe[902195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955351.929034] exe[1788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955356.339621] warn_bad_vsyscall: 243 callbacks suppressed [1955356.339625] exe[824393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.366697] exe[159319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.388984] exe[159319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.411729] exe[159319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.438475] exe[823623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.461534] exe[823623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.484957] exe[824393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.506306] exe[824393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955356.589222] exe[159317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955356.656709] exe[890205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.008328] warn_bad_vsyscall: 130 callbacks suppressed [1955362.008332] exe[890188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955362.090284] exe[1791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.158543] exe[170732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.191472] exe[890192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8b98e8 ax:ffffffffff600000 si:7fe68d8b9e08 di:ffffffffff600000 [1955362.260679] exe[159226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.325085] exe[887836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.398677] exe[179708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.477502] exe[825209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955362.482263] exe[902263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8da8e8 ax:ffffffffff600000 si:7fe68d8dae08 di:ffffffffff600000 [1955362.564131] exe[823815] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955367.231978] warn_bad_vsyscall: 78 callbacks suppressed [1955367.231982] exe[827898] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8b98e8 ax:ffffffffff600000 si:7fe68d8b9e08 di:ffffffffff600000 [1955367.302070] exe[823850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.068537] exe[823577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.149607] exe[173189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.175675] exe[171731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.234655] exe[887839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.311036] exe[823553] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.396670] exe[830209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.451033] exe[159226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955368.504933] exe[159226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be80a3506 cs:33 sp:7fe68d8fb8e8 ax:ffffffffff600000 si:7fe68d8fbe08 di:ffffffffff600000 [1955997.078557] warn_bad_vsyscall: 87 callbacks suppressed [1955997.078561] exe[143046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1955997.216049] exe[143046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1955997.345977] exe[142970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956012.907312] exe[142997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.049821] exe[143014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.167390] exe[143014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.299034] exe[142997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.430220] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.560090] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.682177] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.796456] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956013.918387] exe[221977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956014.040177] exe[221977] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:20001140 di:ffffffffff600000 [1956017.929707] warn_bad_vsyscall: 44 callbacks suppressed [1956017.929710] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.060172] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.195382] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d760f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.314215] exe[142997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.430455] exe[143014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.431046] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.573622] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.673127] exe[143005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.789735] exe[143005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956018.895674] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.399503] warn_bad_vsyscall: 199 callbacks suppressed [1956023.399505] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.648903] exe[144656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.743203] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.870309] exe[161634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.966517] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956023.996740] exe[221455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956024.071163] exe[82501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956024.220925] exe[184643] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956024.277802] exe[161634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956024.379327] exe[144604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.451227] warn_bad_vsyscall: 77 callbacks suppressed [1956028.451231] exe[161634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.550203] exe[82501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.644290] exe[82501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.739275] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.846308] exe[144604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956028.940363] exe[161634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956029.019076] exe[144656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956029.116295] exe[142954] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956029.119339] exe[144604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956029.234076] exe[119799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.524360] warn_bad_vsyscall: 133 callbacks suppressed [1956033.524363] exe[185125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.601629] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.718430] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.825594] exe[145181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956033.928392] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.024148] exe[229232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.121267] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.223561] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.327940] exe[143109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d780f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956034.441324] exe[120287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.586230] warn_bad_vsyscall: 87 callbacks suppressed [1956038.586234] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.696359] exe[145182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.791117] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.793212] exe[225880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.894759] exe[269636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956038.995917] exe[145182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956039.019773] exe[145182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956039.135229] exe[225880] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956039.229591] exe[145180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956039.347305] exe[145180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.636936] warn_bad_vsyscall: 51 callbacks suppressed [1956043.636939] exe[145181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.672560] exe[269636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d760f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.770990] exe[185925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.774722] exe[269636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.875189] exe[185925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956043.947756] exe[143114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956044.036950] exe[185925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956044.145302] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956044.241583] exe[144627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d7a2f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956044.245037] exe[143114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ae7867506 cs:33 sp:7f3b9d781f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1956057.329758] warn_bad_vsyscall: 20 callbacks suppressed [1956057.329761] exe[294237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d3323d506 cs:33 sp:7fdd2ee988e8 ax:ffffffffff600000 si:7fdd2ee98e08 di:ffffffffff600000 [1956057.406059] exe[159219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d3323d506 cs:33 sp:7fdd2ee568e8 ax:ffffffffff600000 si:7fdd2ee56e08 di:ffffffffff600000 [1956057.466304] exe[827279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d3323d506 cs:33 sp:7fdd2ee988e8 ax:ffffffffff600000 si:7fdd2ee98e08 di:ffffffffff600000 [1956057.467139] exe[1791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563d3323d506 cs:33 sp:7fdd2ee778e8 ax:ffffffffff600000 si:7fdd2ee77e08 di:ffffffffff600000 [1958277.053943] exe[666336] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1958277.098030] exe[667447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1958277.156946] exe[663688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1958277.184733] exe[666312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1958285.673798] exe[667457] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce7826d506 cs:33 sp:7fe19e0a48e8 ax:ffffffffff600000 si:7fe19e0a4e08 di:ffffffffff600000 [1958285.715159] exe[690733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce7826d506 cs:33 sp:7fe19e0a48e8 ax:ffffffffff600000 si:7fe19e0a4e08 di:ffffffffff600000 [1958285.757497] exe[690113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce7826d506 cs:33 sp:7fe19e0a48e8 ax:ffffffffff600000 si:7fe19e0a4e08 di:ffffffffff600000 [1958285.799322] exe[663685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ce7826d506 cs:33 sp:7fe19e0a48e8 ax:ffffffffff600000 si:7fe19e0a4e08 di:ffffffffff600000 [1958628.782468] exe[639063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d9f77f506 cs:33 sp:7f93b8932f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1958628.856839] exe[646724] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d9f77f506 cs:33 sp:7f93b8932f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1958628.932011] exe[639280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d9f77f506 cs:33 sp:7f93b8932f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1958628.973333] exe[639377] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561d9f77f506 cs:33 sp:7f93b8911f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1960026.400913] exe[667443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1960026.472846] exe[703076] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1960026.536697] exe[702604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6a3d0c506 cs:33 sp:7f4c5bb0f8e8 ax:ffffffffff600000 si:7f4c5bb0fe08 di:ffffffffff600000 [1962637.996494] exe[278373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3dff506 cs:33 sp:7fb93d78a8e8 ax:ffffffffff600000 si:7fb93d78ae08 di:ffffffffff600000 [1962638.041234] exe[278886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3dff506 cs:33 sp:7fb93d78a8e8 ax:ffffffffff600000 si:7fb93d78ae08 di:ffffffffff600000 [1962638.098274] exe[274834] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3dff506 cs:33 sp:7fb93d7698e8 ax:ffffffffff600000 si:7fb93d769e08 di:ffffffffff600000 [1962638.319903] exe[275174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.373756] exe[275174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.444269] exe[278886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.499630] exe[278961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.556330] exe[274510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.613640] exe[274635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1962638.676582] exe[274718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558a6164b506 cs:33 sp:7f9b1fdb28e8 ax:ffffffffff600000 si:7f9b1fdb2e08 di:ffffffffff600000 [1963016.387357] warn_bad_vsyscall: 2 callbacks suppressed [1963016.387360] exe[176098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963018.765167] exe[222736] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963018.824369] exe[277253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963018.899016] exe[176169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963018.975677] exe[277253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.052029] exe[176169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.117218] exe[176099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.177552] exe[176099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.244531] exe[292138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963019.306613] exe[176162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963042.915010] warn_bad_vsyscall: 16 callbacks suppressed [1963042.915014] exe[190870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0c117506 cs:33 sp:7fa5d4c35f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [1963042.979411] exe[202588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0c117506 cs:33 sp:7fa5d4c35f88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [1963043.032481] exe[206127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d0c117506 cs:33 sp:7fa5d47fef88 ax:ffffffffff600000 si:20000140 di:ffffffffff600000 [1963062.914232] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963062.989838] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.060177] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.085280] exe[224861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.149169] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.234855] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.260124] exe[191517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.324348] exe[224861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.347373] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963063.436262] exe[191456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963067.932160] warn_bad_vsyscall: 184 callbacks suppressed [1963067.932164] exe[228782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963067.992851] exe[224248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.044634] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6e89f90 ax:7f24f6e8a020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.094411] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.114609] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.136811] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.157197] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.178221] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.199849] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963068.221050] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6eaaf90 ax:7f24f6eab020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.016197] warn_bad_vsyscall: 328 callbacks suppressed [1963073.016200] exe[228782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.086469] exe[264767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.143804] exe[264767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.200291] exe[264767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.258031] exe[228782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.323628] exe[198288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.346270] exe[264767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.394650] exe[198288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.481398] exe[193663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1963073.557167] exe[191466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562fbad43378 cs:33 sp:7f24f6ecbf90 ax:7f24f6ecc020 si:ffffffffff600000 di:562fbae0d2b3 [1964258.625647] warn_bad_vsyscall: 131 callbacks suppressed [1964258.625649] exe[490243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f943dc506 cs:33 sp:7f70a912f8e8 ax:ffffffffff600000 si:7f70a912fe08 di:ffffffffff600000 [1964426.646434] exe[158113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631bc465378 cs:33 sp:7f3aefdb7f90 ax:7f3aefdb8020 si:ffffffffff600000 di:5631bc52f2b3 [1964426.720076] exe[158250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631bc465378 cs:33 sp:7f3aefdb7f90 ax:7f3aefdb8020 si:ffffffffff600000 di:5631bc52f2b3 [1964426.827351] exe[158295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631bc465378 cs:33 sp:7f3aefdb7f90 ax:7f3aefdb8020 si:ffffffffff600000 di:5631bc52f2b3 [1964642.963352] exe[274456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3db0378 cs:33 sp:7fb93d78af90 ax:7fb93d78b020 si:ffffffffff600000 di:5653f3e7a2b3 [1964643.036709] exe[274623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3db0378 cs:33 sp:7fb93d78af90 ax:7fb93d78b020 si:ffffffffff600000 di:5653f3e7a2b3 [1964643.158374] exe[280122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5653f3db0378 cs:33 sp:7fb93d78af90 ax:7fb93d78b020 si:ffffffffff600000 di:5653f3e7a2b3 [1964737.985174] exe[278993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.038299] exe[274749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fb18e8 ax:ffffffffff600000 si:7f7f48fb1e08 di:ffffffffff600000 [1964738.088122] exe[278999] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fb18e8 ax:ffffffffff600000 si:7f7f48fb1e08 di:ffffffffff600000 [1964738.139143] exe[598755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.196542] exe[280121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.252417] exe[274685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.304082] exe[274633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.382169] exe[275156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964738.382889] exe[274613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fb18e8 ax:ffffffffff600000 si:7f7f48fb1e08 di:ffffffffff600000 [1964738.453084] exe[274562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.000805] warn_bad_vsyscall: 137 callbacks suppressed [1964743.000808] exe[276572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.087819] exe[276572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.116806] exe[276572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48f908e8 ax:ffffffffff600000 si:7f7f48f90e08 di:ffffffffff600000 [1964743.190119] exe[280121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.251097] exe[280224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.311374] exe[280224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.342352] exe[307384] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.397205] exe[278390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.475620] exe[284146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964743.551475] exe[285840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.087291] warn_bad_vsyscall: 218 callbacks suppressed [1964748.087294] exe[597720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48f6f8e8 ax:ffffffffff600000 si:7f7f48f6fe08 di:ffffffffff600000 [1964748.219389] exe[274822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.295369] exe[276442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.394745] exe[274439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.396243] exe[274455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fb18e8 ax:ffffffffff600000 si:7f7f48fb1e08 di:ffffffffff600000 [1964748.518045] exe[274456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.605445] exe[274515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.703152] exe[274618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.820349] exe[278373] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964748.949910] exe[274485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.093314] warn_bad_vsyscall: 164 callbacks suppressed [1964753.093318] exe[274485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.159969] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.184576] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.206307] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.228090] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.248764] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.270766] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.293900] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.315606] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1964753.337957] exe[274708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d794297506 cs:33 sp:7f7f48fd28e8 ax:ffffffffff600000 si:7f7f48fd2e08 di:ffffffffff600000 [1965105.790533] warn_bad_vsyscall: 46 callbacks suppressed [1965105.790538] exe[651312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56013a961506 cs:33 sp:7fdc826a38e8 ax:ffffffffff600000 si:7fdc826a3e08 di:ffffffffff600000 [1965353.187589] exe[710755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f105ca6506 cs:33 sp:7f9c037d78e8 ax:ffffffffff600000 si:7f9c037d7e08 di:ffffffffff600000 [1965617.256369] exe[702122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d704e18506 cs:33 sp:7fbb378c68e8 ax:ffffffffff600000 si:7fbb378c6e08 di:ffffffffff600000 [1965740.904476] exe[741714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628dcad5506 cs:33 sp:7fc116f098e8 ax:ffffffffff600000 si:7fc116f09e08 di:ffffffffff600000 [1965753.285603] exe[768704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf8b63f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1965754.703088] exe[789017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ac7491101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1965863.468027] exe[810450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55847f021101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1965934.007376] exe[822371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639df523506 cs:33 sp:7fa5891028e8 ax:ffffffffff600000 si:7fa589102e08 di:ffffffffff600000 [1965969.339871] exe[829165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c3f90e101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1965996.083892] exe[833727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6e32ee101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1966050.101288] exe[812092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563e74ba6506 cs:33 sp:7f6a339438e8 ax:ffffffffff600000 si:7f6a33943e08 di:ffffffffff600000 [1966061.823883] exe[716221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966061.868344] exe[716072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966061.890772] exe[716051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966061.933013] exe[716222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966067.025568] exe[716308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.071188] exe[718592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.130574] exe[716315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.190424] exe[719103] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.269302] exe[716107] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.328453] exe[736274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.414931] exe[718592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.462345] exe[801122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.510713] exe[801130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966067.572011] exe[716329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966072.484480] warn_bad_vsyscall: 206 callbacks suppressed [1966072.484484] exe[716333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966072.543674] exe[809308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.326624] exe[716333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966073.379105] exe[809192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.451185] exe[800943] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.451224] exe[717013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966073.515593] exe[716348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.540169] exe[716072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d0fe8e8 ax:ffffffffff600000 si:7f891d0fee08 di:ffffffffff600000 [1966073.585297] exe[717013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966073.639646] exe[747012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966077.636273] warn_bad_vsyscall: 82 callbacks suppressed [1966077.636276] exe[716280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966077.667405] exe[716280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d0bc8e8 ax:ffffffffff600000 si:7f891d0bce08 di:ffffffffff600000 [1966078.538496] exe[716227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d11f8e8 ax:ffffffffff600000 si:7f891d11fe08 di:ffffffffff600000 [1966078.565490] exe[801122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d0dd8e8 ax:ffffffffff600000 si:7f891d0dde08 di:ffffffffff600000 [1966079.366552] exe[716363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.454698] exe[763505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.486419] exe[800970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.560694] exe[800980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.583675] exe[716241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966079.604383] exe[716241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.655633] warn_bad_vsyscall: 172 callbacks suppressed [1966082.655636] exe[800973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.755292] exe[747012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.831377] exe[719118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.901205] exe[718573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966082.969962] exe[719118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.020059] exe[800950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.098468] exe[716141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.133168] exe[737533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.202950] exe[716280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966083.359306] exe[716158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1966140.416970] warn_bad_vsyscall: 98 callbacks suppressed [1966140.416973] exe[717084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c0a731506 cs:33 sp:7f4e2f9cf8e8 ax:ffffffffff600000 si:7f4e2f9cfe08 di:ffffffffff600000 [1966140.496734] exe[800954] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c0a731506 cs:33 sp:7f4e2f98d8e8 ax:ffffffffff600000 si:7f4e2f98de08 di:ffffffffff600000 [1966140.574303] exe[717018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563c0a731506 cs:33 sp:7f4e2f98d8e8 ax:ffffffffff600000 si:7f4e2f98de08 di:ffffffffff600000 [1966193.811850] exe[812774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564430f99506 cs:33 sp:7faa9805b8e8 ax:ffffffffff600000 si:7faa9805be08 di:ffffffffff600000 [1966636.503438] exe[929950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f6e32dd506 cs:33 sp:7eeb129a98e8 ax:ffffffffff600000 si:7eeb129a9e08 di:ffffffffff600000 [1967149.850912] exe[910870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967149.903380] exe[910839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967149.954404] exe[910870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967154.955076] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.019923] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.088538] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.153199] exe[910858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.210940] exe[910858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.268171] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.323978] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.390941] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.440747] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967155.497698] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1967224.854317] warn_bad_vsyscall: 5 callbacks suppressed [1967224.854321] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967224.902492] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967224.948562] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967224.997480] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.036351] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.077508] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.126299] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.179373] exe[910875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.202944] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967225.241190] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967229.904253] warn_bad_vsyscall: 268 callbacks suppressed [1967229.904256] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967229.979039] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.000423] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.056427] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.117185] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.169550] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.190853] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.211580] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.232383] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967230.261019] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967234.984969] warn_bad_vsyscall: 113 callbacks suppressed [1967234.984973] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.061879] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.123383] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.210275] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.341580] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.450767] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.531649] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.641006] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.661454] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967235.686931] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967239.997989] warn_bad_vsyscall: 185 callbacks suppressed [1967239.997992] exe[955101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.032945] exe[910874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.116445] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.198832] exe[955101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.323165] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.345851] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.366973] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.387582] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.408898] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967240.436409] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.019117] warn_bad_vsyscall: 121 callbacks suppressed [1967245.019120] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.053196] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.128731] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.174839] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.309993] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.483382] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.618823] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.750459] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967245.884299] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967246.028937] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967250.772128] warn_bad_vsyscall: 5 callbacks suppressed [1967250.772131] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967250.905582] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.018214] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.148226] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.252114] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.363881] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.489954] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.619651] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.709365] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967251.786671] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967255.804811] warn_bad_vsyscall: 108 callbacks suppressed [1967255.804814] exe[937722] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967255.806771] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.298771] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.489900] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.575347] exe[910874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.664498] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.736881] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.756946] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.777471] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967256.799982] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967260.838242] warn_bad_vsyscall: 271 callbacks suppressed [1967260.838245] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967260.933637] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.043580] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.167645] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.231352] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.232078] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.326989] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.402035] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.469789] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967261.553293] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967265.876190] warn_bad_vsyscall: 126 callbacks suppressed [1967265.876194] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967265.952712] exe[937706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.079195] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.184317] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.304298] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.402523] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.554878] exe[913407] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.680347] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.767802] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967266.841712] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967270.917192] warn_bad_vsyscall: 213 callbacks suppressed [1967270.917196] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967270.947369] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.046191] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.167265] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.188856] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.213929] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.235947] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.259281] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.282365] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967271.307227] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967275.997059] warn_bad_vsyscall: 208 callbacks suppressed [1967275.997062] exe[955100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.047585] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.175352] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.246021] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.279748] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfa4f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.449218] exe[910849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.529335] exe[910840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.622742] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.723030] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967276.801793] exe[910862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.009879] warn_bad_vsyscall: 146 callbacks suppressed [1967281.009882] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.075016] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.177037] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.312859] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.394780] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.479114] exe[937713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.567166] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.655674] exe[910864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.725837] exe[910874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfe6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967281.772178] exe[938315] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e89c4f3506 cs:33 sp:7f759dfc5f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1967782.189483] warn_bad_vsyscall: 55 callbacks suppressed [1967782.189486] exe[801022] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1967782.284040] exe[716307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1967782.390743] exe[717063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d1408e8 ax:ffffffffff600000 si:7f891d140e08 di:ffffffffff600000 [1967782.427040] exe[716095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a904827506 cs:33 sp:7f891d0fe8e8 ax:ffffffffff600000 si:7f891d0fee08 di:ffffffffff600000 [1968652.631074] exe[219816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbbce8c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1969075.178479] exe[296430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ab9fd101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1969421.318988] exe[339258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c7b4a0101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1969563.532233] exe[374574] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5613799d1101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1969615.103609] exe[376258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609fbc84506 cs:33 sp:7f23952ec8e8 ax:ffffffffff600000 si:7f23952ece08 di:ffffffffff600000 [1970144.072542] exe[439400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4e58e8 ax:ffffffffff600000 si:7f5b2f4e5e08 di:ffffffffff600000 [1970144.169102] exe[236930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4e58e8 ax:ffffffffff600000 si:7f5b2f4e5e08 di:ffffffffff600000 [1970144.196732] exe[310632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4408e8 ax:ffffffffff600000 si:7f5b2f440e08 di:ffffffffff600000 [1970144.282802] exe[420718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4e58e8 ax:ffffffffff600000 si:7f5b2f4e5e08 di:ffffffffff600000 [1970150.536381] exe[310852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970150.635293] exe[420893] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970150.764940] exe[439351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970150.878926] exe[420744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970150.987747] exe[421609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.061262] exe[439351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.135780] exe[421937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.274864] exe[340516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.364744] exe[424288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970151.474367] exe[439541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdb55b3506 cs:33 sp:7fc5ba1ae8e8 ax:ffffffffff600000 si:7fc5ba1aee08 di:ffffffffff600000 [1970175.670778] warn_bad_vsyscall: 5 callbacks suppressed [1970175.670782] exe[420790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970175.735565] exe[420718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.531297] exe[439540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.553599] exe[439639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.636519] exe[439521] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.689236] exe[440148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.723247] exe[439351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.805201] exe[421937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970176.836239] exe[421615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970177.577190] exe[440148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970181.035929] warn_bad_vsyscall: 9 callbacks suppressed [1970181.035932] exe[440593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970181.115775] exe[440224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970181.920983] exe[440275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.000040] exe[420718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.044514] exe[440138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.166638] exe[439400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.255072] exe[439354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.330397] exe[440131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.403298] exe[310632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970182.445752] exe[310632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970186.308899] warn_bad_vsyscall: 146 callbacks suppressed [1970186.308903] exe[241577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970186.373055] exe[242017] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970186.373671] exe[420872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970187.225830] exe[421615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.293065] exe[420872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.362475] exe[424288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.554048] exe[264656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.613725] exe[439542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.671998] exe[420902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970187.752249] exe[439855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970192.073037] warn_bad_vsyscall: 60 callbacks suppressed [1970192.073040] exe[241981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970192.148306] exe[443636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970192.950509] exe[420940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970192.987185] exe[426987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970193.050559] exe[420889] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970193.864519] exe[439507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970193.947974] exe[440658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970194.054499] exe[420901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970194.120212] exe[420940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970194.244694] exe[380868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970197.181676] warn_bad_vsyscall: 7 callbacks suppressed [1970197.181679] exe[439641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970197.270191] exe[380868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970197.351333] exe[421651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970197.351663] exe[426987] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970197.442662] exe[234260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970198.281795] exe[400701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970198.339623] exe[380337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970198.366728] exe[395516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970199.122823] exe[440658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970199.215420] exe[424288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970202.757363] warn_bad_vsyscall: 61 callbacks suppressed [1970202.757366] exe[432773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970202.842019] exe[380538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970202.842119] exe[236540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970203.649962] exe[380314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970203.709297] exe[236540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970203.791406] exe[376094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970203.857458] exe[441330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970203.878388] exe[441330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970203.901058] exe[441330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970203.922781] exe[441330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325ffe8e8 ax:ffffffffff600000 si:7fa325ffee08 di:ffffffffff600000 [1970207.770577] warn_bad_vsyscall: 156 callbacks suppressed [1970207.770580] exe[440145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970207.771559] exe[439507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970207.846155] exe[380861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970207.896436] exe[424288] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970207.965854] exe[383666] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970207.992458] exe[380374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970208.066988] exe[380348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970208.275643] exe[241249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970208.337793] exe[439531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970208.393939] exe[439463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970213.050621] warn_bad_vsyscall: 99 callbacks suppressed [1970213.050625] exe[420901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970213.123063] exe[440281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970213.955953] exe[420868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970214.025624] exe[439502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa325fdd8e8 ax:ffffffffff600000 si:7fa325fdde08 di:ffffffffff600000 [1970214.815800] exe[241577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970214.896434] exe[440275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970214.968528] exe[420902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970215.036104] exe[253198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970215.056485] exe[429453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970215.077730] exe[443636] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970218.725043] warn_bad_vsyscall: 76 callbacks suppressed [1970218.725047] exe[440141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32642b8e8 ax:ffffffffff600000 si:7fa32642be08 di:ffffffffff600000 [1970218.804173] exe[439855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.563854] exe[439339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.648096] exe[440224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.711827] exe[421623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.785028] exe[420901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.852516] exe[340507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970219.928395] exe[440129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970220.025862] exe[439337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970220.833095] exe[439337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637301c4506 cs:33 sp:7fa32644c8e8 ax:ffffffffff600000 si:7fa32644ce08 di:ffffffffff600000 [1970249.090626] warn_bad_vsyscall: 18 callbacks suppressed [1970249.090629] exe[410587] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582aa232378 cs:33 sp:7f3cca621f90 ax:7f3cca622020 si:ffffffffff600000 di:5582aa2fc2b3 [1970293.747603] exe[450753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635dbdd2378 cs:33 sp:7f44b49dbf90 ax:7f44b49dc020 si:ffffffffff600000 di:5635dbe9c2b3 [1970293.922588] exe[361253] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561379971378 cs:33 sp:7faf2ae92f90 ax:7faf2ae93020 si:ffffffffff600000 di:561379a3b2b3 [1970297.348217] exe[455489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0dd21e378 cs:33 sp:7ed78c1def90 ax:7ed78c1df020 si:ffffffffff600000 di:55e0dd2e82b3 [1970534.559113] exe[477251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ba4b39506 cs:33 sp:7f4e6f3978e8 ax:ffffffffff600000 si:7f4e6f397e08 di:ffffffffff600000 [1970655.300628] exe[340605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4e58e8 ax:ffffffffff600000 si:7f5b2f4e5e08 di:ffffffffff600000 [1970655.377818] exe[342572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.400455] exe[342572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.421938] exe[340469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.445607] exe[340469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.468270] exe[340469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.490984] exe[342588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.515221] exe[342588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.539996] exe[342588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970655.561534] exe[342588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbb06e3506 cs:33 sp:7f5b2f4c48e8 ax:ffffffffff600000 si:7f5b2f4c4e08 di:ffffffffff600000 [1970824.330318] warn_bad_vsyscall: 57 callbacks suppressed [1970824.330321] exe[531772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563847b28378 cs:33 sp:7f3b061c5f90 ax:7f3b061c6020 si:ffffffffff600000 di:563847bf22b3 [1971736.970753] exe[411953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e4ab06506 cs:33 sp:7fdbf50ee8e8 ax:ffffffffff600000 si:7fdbf50eee08 di:ffffffffff600000 [1971737.137433] exe[592175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e4ab06506 cs:33 sp:7fdbf50ee8e8 ax:ffffffffff600000 si:7fdbf50eee08 di:ffffffffff600000 [1971737.168110] exe[357334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e4ab06506 cs:33 sp:7fdbf50cd8e8 ax:ffffffffff600000 si:7fdbf50cde08 di:ffffffffff600000 [1971737.475498] exe[531343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e4ab06506 cs:33 sp:7fdbf50cd8e8 ax:ffffffffff600000 si:7fdbf50cde08 di:ffffffffff600000 [1972243.447820] exe[573417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aac461506 cs:33 sp:7f4a2f6978e8 ax:ffffffffff600000 si:7f4a2f697e08 di:ffffffffff600000 [1972243.515933] exe[573450] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aac461506 cs:33 sp:7f4a2f6978e8 ax:ffffffffff600000 si:7f4a2f697e08 di:ffffffffff600000 [1972243.591264] exe[548272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aac461506 cs:33 sp:7f4a2f6978e8 ax:ffffffffff600000 si:7f4a2f697e08 di:ffffffffff600000 [1972243.719638] exe[653543] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aac461506 cs:33 sp:7f4a2f6978e8 ax:ffffffffff600000 si:7f4a2f697e08 di:ffffffffff600000 [1972448.671193] exe[787132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c69b9b4506 cs:33 sp:7ede0b0768e8 ax:ffffffffff600000 si:7ede0b076e08 di:ffffffffff600000 [1972448.734755] exe[787151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c69b9b4506 cs:33 sp:7ede0b0768e8 ax:ffffffffff600000 si:7ede0b076e08 di:ffffffffff600000 [1972448.812304] exe[787169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c69b9b4506 cs:33 sp:7ede0b0768e8 ax:ffffffffff600000 si:7ede0b076e08 di:ffffffffff600000 [1972448.904456] exe[787195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c69b9b4506 cs:33 sp:7ede0b0768e8 ax:ffffffffff600000 si:7ede0b076e08 di:ffffffffff600000 [1972479.451551] exe[797900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615578a4506 cs:33 sp:7ee79343b8e8 ax:ffffffffff600000 si:7ee79343be08 di:ffffffffff600000 [1972479.549874] exe[797932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615578a4506 cs:33 sp:7ee79343b8e8 ax:ffffffffff600000 si:7ee79343be08 di:ffffffffff600000 [1972479.650143] exe[797975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615578a4506 cs:33 sp:7ee79343b8e8 ax:ffffffffff600000 si:7ee79343be08 di:ffffffffff600000 [1972479.743945] exe[798021] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5615578a4506 cs:33 sp:7ee79343b8e8 ax:ffffffffff600000 si:7ee79343be08 di:ffffffffff600000 [1972858.424047] exe[861880] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972858.896523] exe[921495] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972859.327121] exe[827092] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972859.730586] exe[862147] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972860.218672] exe[862147] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972860.667320] exe[862147] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1972861.088378] exe[820897] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1973546.813149] exe[63281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c85d8ab506 cs:33 sp:7f4f437f48e8 ax:ffffffffff600000 si:7f4f437f4e08 di:ffffffffff600000 [1973546.948464] exe[573324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c85d8ab506 cs:33 sp:7f4f437f48e8 ax:ffffffffff600000 si:7f4f437f4e08 di:ffffffffff600000 [1973547.045579] exe[105367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c85d8ab506 cs:33 sp:7f4f437f48e8 ax:ffffffffff600000 si:7f4f437f4e08 di:ffffffffff600000 [1973547.134944] exe[63281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c85d8ab506 cs:33 sp:7f4f437f48e8 ax:ffffffffff600000 si:7f4f437f4e08 di:ffffffffff600000 [1973791.894798] exe[94237] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1973792.204298] exe[94050] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1973792.516268] exe[99370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1973792.827928] exe[99370] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1973824.134695] exe[153162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7c420506 cs:33 sp:7fb4c13b58e8 ax:ffffffffff600000 si:7fb4c13b5e08 di:ffffffffff600000 [1973824.204637] exe[69483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7c420506 cs:33 sp:7fb4c13b58e8 ax:ffffffffff600000 si:7fb4c13b5e08 di:ffffffffff600000 [1973824.293794] exe[91177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7c420506 cs:33 sp:7fb4c13b58e8 ax:ffffffffff600000 si:7fb4c13b5e08 di:ffffffffff600000 [1973824.461911] exe[91713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ba7c420506 cs:33 sp:7fb4c13b58e8 ax:ffffffffff600000 si:7fb4c13b5e08 di:ffffffffff600000 [1973920.067173] exe[172583] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973920.335542] exe[172578] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973920.647020] exe[172494] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973920.950110] exe[174529] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973921.272482] exe[179109] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973921.558511] exe[175627] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1973921.885911] exe[178063] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1974040.144490] exe[181516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609944cf506 cs:33 sp:7f4010cc58e8 ax:ffffffffff600000 si:7f4010cc5e08 di:ffffffffff600000 [1974040.260787] exe[932366] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609944cf506 cs:33 sp:7f4010cc58e8 ax:ffffffffff600000 si:7f4010cc5e08 di:ffffffffff600000 [1974040.355617] exe[182847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609944cf506 cs:33 sp:7f4010cc58e8 ax:ffffffffff600000 si:7f4010cc5e08 di:ffffffffff600000 [1974040.441083] exe[881638] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609944cf506 cs:33 sp:7f4010cc58e8 ax:ffffffffff600000 si:7f4010cc5e08 di:ffffffffff600000 [1974646.975585] exe[287966] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1974647.263632] exe[290684] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1974647.517902] exe[278829] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1974647.752293] exe[287966] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1974750.948905] exe[923526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f24029506 cs:33 sp:7f9b9710e8e8 ax:ffffffffff600000 si:7f9b9710ee08 di:ffffffffff600000 [1974810.429517] exe[272123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562cc50da506 cs:33 sp:7fd29207e8e8 ax:ffffffffff600000 si:7fd29207ee08 di:ffffffffff600000 [1974864.922388] exe[292771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dbf222e506 cs:33 sp:7f4fe19378e8 ax:ffffffffff600000 si:7f4fe1937e08 di:ffffffffff600000 [1974985.237943] exe[161767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1974985.325876] exe[179641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1974985.405020] exe[213527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1974985.474265] exe[60881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1975334.647112] exe[363004] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975335.063318] exe[354566] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975335.489901] exe[354639] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975336.118347] exe[362944] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975620.168264] exe[61277] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3a4604506 cs:33 sp:7f420f9fc8e8 ax:ffffffffff600000 si:7f420f9fce08 di:ffffffffff600000 [1975620.264019] exe[386013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3a4604506 cs:33 sp:7f420f9fc8e8 ax:ffffffffff600000 si:7f420f9fce08 di:ffffffffff600000 [1975620.354489] exe[386013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1975620.362381] exe[68150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3a4604506 cs:33 sp:7f420f9fc8e8 ax:ffffffffff600000 si:7f420f9fce08 di:ffffffffff600000 [1975620.397024] exe[187633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56371aec0506 cs:33 sp:7f98773348e8 ax:ffffffffff600000 si:7f9877334e08 di:ffffffffff600000 [1975620.455858] exe[68150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1975620.461668] exe[169572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e3a4604506 cs:33 sp:7f420f9fc8e8 ax:ffffffffff600000 si:7f420f9fce08 di:ffffffffff600000 [1975620.481231] exe[188861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5620630cd506 cs:33 sp:7f024cd148e8 ax:ffffffffff600000 si:7f024cd14e08 di:ffffffffff600000 [1975620.484853] exe[386051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56371aec0506 cs:33 sp:7f98773348e8 ax:ffffffffff600000 si:7f9877334e08 di:ffffffffff600000 [1975620.572507] exe[937630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b5633e506 cs:33 sp:7f0244bb08e8 ax:ffffffffff600000 si:7f0244bb0e08 di:ffffffffff600000 [1975798.291242] warn_bad_vsyscall: 3 callbacks suppressed [1975798.291246] exe[753786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564405277506 cs:33 sp:7f9d6e7d28e8 ax:ffffffffff600000 si:7f9d6e7d2e08 di:ffffffffff600000 [1975857.357407] exe[311506] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975857.649477] exe[311506] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975857.960154] exe[311506] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975858.239235] exe[311506] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1975999.899272] exe[315263] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:94001000 [1976237.821298] exe[453195] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1976315.748501] exe[380206] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1976564.849204] exe[494404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564b23b5c506 cs:33 sp:7fcb776478e8 ax:ffffffffff600000 si:7fcb77647e08 di:ffffffffff600000 [1976617.634459] exe[492537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e81e92e506 cs:33 sp:7ff403bfe8e8 ax:ffffffffff600000 si:7ff403bfee08 di:ffffffffff600000 [1976652.099977] exe[532323] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:42061000 [1976944.019857] exe[550618] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:8800000 [1976950.131134] exe[475547] vsyscall attempted with vsyscall=none ip:ffffffffff600000 cs:33 sp:20000008 ax:0 si:20000000 di:0 [1979309.502084] exe[864229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6435c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979327.393341] exe[862526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ac6435c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1979334.509177] exe[860502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55961dd1d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979334.896711] exe[859712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202aecc101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1979384.255084] exe[870568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a690120101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1979385.187131] exe[870644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a690120101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979499.640905] exe[882514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619e202f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979500.150943] exe[882559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619e202f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1979959.597735] exe[930179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632fd04d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1979960.363007] exe[927928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632fd04d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980043.708849] exe[842990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56202aecc101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980050.470402] exe[943441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559195627101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980098.895553] exe[947191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5619e202f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980119.411698] exe[952939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b52cb13101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980152.435814] exe[957691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f16406101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980153.035937] exe[955975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d77ce5101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980207.569739] exe[969455] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf0d406101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980236.364656] exe[975829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565385931101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980236.526206] exe[971720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d45bb5e101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980333.748536] exe[994186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bf0061b101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980334.920646] exe[993890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5649d18fa101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980347.750148] exe[996981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ccc3d1101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980461.698289] exe[5618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557376295101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980461.853450] exe[5535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557376295101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980523.629348] exe[28369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b488c4b101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980536.116393] exe[33866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f1d6e1e101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980638.039889] exe[52087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55713e32e101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980638.361299] exe[52139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c739fd8101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1980690.954002] exe[13122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645dbd44378 cs:33 sp:7fcabb6eef90 ax:7fcabb6ef020 si:ffffffffff600000 di:5645dbe0e2b3 [1980691.016565] exe[13850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645dbd44378 cs:33 sp:7fcabb6eef90 ax:7fcabb6ef020 si:ffffffffff600000 di:5645dbe0e2b3 [1980691.074293] exe[11499] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645dbd44378 cs:33 sp:7fcabb6eef90 ax:7fcabb6ef020 si:ffffffffff600000 di:5645dbe0e2b3 [1980691.101750] exe[13832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645dbd44378 cs:33 sp:7fcabb6acf90 ax:7fcabb6ad020 si:ffffffffff600000 di:5645dbe0e2b3 [1980720.161447] exe[66688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e28151101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1980916.174797] exe[77148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699558d101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1981357.976157] exe[140335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563694f8101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1981357.977768] exe[141828] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560872d82101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1981403.322306] exe[162210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555673ef9101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982225.684853] exe[279856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e53514c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1982226.174739] exe[263048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e53514c101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982456.874716] exe[330533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567557eb101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982732.941377] exe[353099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559950b42101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982746.332425] exe[369850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556fb231f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1982746.470252] exe[371567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567557eb101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1982814.422798] exe[379135] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556598ee101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2281200 [1982815.216323] exe[380269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556598ee101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1986706.354856] exe[475596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986706.425378] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986706.504740] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986706.535227] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.380472] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.465996] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.542571] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.646530] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.729602] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.799223] exe[475596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.901646] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986729.978439] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986730.028504] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986730.109615] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.422238] warn_bad_vsyscall: 119 callbacks suppressed [1986734.422241] exe[471542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.452189] exe[595363] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986734.532174] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.660162] exe[475596] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75dd8e8 ax:ffffffffff600000 si:7fc1f75dde08 di:ffffffffff600000 [1986734.709248] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.742802] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.791337] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.886828] exe[471542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986734.888029] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986734.993417] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.443700] warn_bad_vsyscall: 171 callbacks suppressed [1986739.443703] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.535814] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.603207] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.672150] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.696425] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.813368] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986739.962711] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986740.097357] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986740.195826] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986740.288299] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.471074] warn_bad_vsyscall: 154 callbacks suppressed [1986744.471077] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986744.549031] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.652110] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.739379] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.765932] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986744.844917] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.923996] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986744.992818] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986745.057071] exe[471868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986745.112222] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.491366] warn_bad_vsyscall: 110 callbacks suppressed [1986749.491369] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.645527] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.705870] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.758958] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.812898] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.914360] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986749.972467] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986750.231874] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986750.327593] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986750.411243] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.576860] warn_bad_vsyscall: 64 callbacks suppressed [1986754.576864] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.639265] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.664219] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.735484] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986754.827578] exe[475677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.915484] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986754.974396] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986755.001971] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986755.072868] exe[592674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986755.152312] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986759.585394] warn_bad_vsyscall: 166 callbacks suppressed [1986759.585396] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.641784] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.662907] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.684410] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.705504] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.725870] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.748380] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.770435] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.792261] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986759.815330] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986764.610807] warn_bad_vsyscall: 202 callbacks suppressed [1986764.610810] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.665405] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.733012] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.793246] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.881225] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986764.987212] exe[475504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986765.043551] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986765.120213] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986765.198109] exe[471619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986765.277226] exe[473182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.673138] warn_bad_vsyscall: 182 callbacks suppressed [1986769.673141] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.763251] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.858360] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.881696] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.903673] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.923974] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.950971] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.974095] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986769.997534] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986770.020533] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.724945] warn_bad_vsyscall: 496 callbacks suppressed [1986774.724949] exe[471868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.805431] exe[595210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.832840] exe[595210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.887429] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.937334] exe[471540] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986774.989529] exe[485960] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986775.052978] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986775.054777] exe[595367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f75fe8e8 ax:ffffffffff600000 si:7fc1f75fee08 di:ffffffffff600000 [1986775.124768] exe[471544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1986775.205593] exe[479958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558cd13ed506 cs:33 sp:7fc1f82318e8 ax:ffffffffff600000 si:7fc1f8231e08 di:ffffffffff600000 [1987209.263141] warn_bad_vsyscall: 70 callbacks suppressed [1987209.263144] exe[852502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ece7c30506 cs:33 sp:7f792ebbcf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1987209.353222] exe[765781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ece7c30506 cs:33 sp:7f792ebbcf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1987209.388737] exe[765934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ece7c30506 cs:33 sp:7f792ebbcf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1987209.549930] exe[776840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ece7c30506 cs:33 sp:7f792eb9bf88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1987675.543277] exe[869542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624fa650506 cs:33 sp:7f81744bc8e8 ax:ffffffffff600000 si:7f81744bce08 di:ffffffffff600000 [1987675.606876] exe[864938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624fa650506 cs:33 sp:7f817449b8e8 ax:ffffffffff600000 si:7f817449be08 di:ffffffffff600000 [1987675.661550] exe[831434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624fa650506 cs:33 sp:7f817449b8e8 ax:ffffffffff600000 si:7f817449be08 di:ffffffffff600000 [1987936.108935] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987936.320472] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987936.507272] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987949.348902] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987949.693223] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987950.005140] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987950.379212] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987950.715736] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987951.073329] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987951.384869] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987951.661972] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987952.084179] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987952.351337] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000240 di:ffffffffff600000 [1987954.464992] warn_bad_vsyscall: 12 callbacks suppressed [1987954.464995] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987954.508447] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987954.671415] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987954.816104] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.114796] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.251103] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.420933] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.756999] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.815666] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987955.955257] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987959.474677] warn_bad_vsyscall: 22 callbacks suppressed [1987959.474680] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987959.608495] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987959.768203] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.021274] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.184917] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.347105] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.560261] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.677501] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.820346] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987960.963569] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987964.592720] warn_bad_vsyscall: 28 callbacks suppressed [1987964.592723] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987964.718043] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987964.897061] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.188743] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.346012] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.563248] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.820711] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987965.935700] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987966.084427] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987966.315772] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.672640] warn_bad_vsyscall: 23 callbacks suppressed [1987969.672643] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.759271] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.880978] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.916283] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.952011] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987969.985367] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987970.018977] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987970.058018] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987970.089766] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987970.124607] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987974.725630] warn_bad_vsyscall: 87 callbacks suppressed [1987974.725633] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987974.766083] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987974.964975] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.088849] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.129928] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.243543] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.366761] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.591328] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.709502] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987975.881902] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987979.808773] warn_bad_vsyscall: 23 callbacks suppressed [1987979.808775] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.025937] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.271890] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.462779] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.621662] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987980.781972] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987981.116161] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987981.167078] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987981.368932] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987981.550556] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987984.824173] warn_bad_vsyscall: 18 callbacks suppressed [1987984.824177] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987984.974771] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.175958] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.362861] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.508908] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.516698] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.796704] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987985.963471] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987986.099803] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987986.279517] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.169093] warn_bad_vsyscall: 25 callbacks suppressed [1987990.169096] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.408254] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.466549] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.696228] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.889779] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987990.931657] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987991.049383] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987991.236318] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987991.451151] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987991.609588] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987995.284191] warn_bad_vsyscall: 24 callbacks suppressed [1987995.284194] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987995.511775] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987995.761386] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987995.915082] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.121288] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.275810] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.393604] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.538568] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.845399] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1987996.997912] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.302208] warn_bad_vsyscall: 33 callbacks suppressed [1988000.302211] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.348101] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.389369] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.429092] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.466659] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.507914] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.546532] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.585848] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.624766] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988000.664865] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988005.443108] warn_bad_vsyscall: 67 callbacks suppressed [1988005.443112] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988005.562862] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988005.606989] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988005.811636] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.003870] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.133443] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.299524] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.571109] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.615234] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988006.754605] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988010.490165] warn_bad_vsyscall: 12 callbacks suppressed [1988010.490168] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988010.703963] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988010.906588] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.120734] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.381265] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.572324] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.771073] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988011.951991] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988012.190785] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988012.394096] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988015.601224] warn_bad_vsyscall: 5 callbacks suppressed [1988015.601227] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988015.847207] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988016.118025] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988016.402811] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988016.650411] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988016.884400] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988017.128246] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988017.392788] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988017.608149] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988017.820871] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.693891] warn_bad_vsyscall: 16 callbacks suppressed [1988020.693894] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.740403] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.784807] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.825093] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.865040] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.901923] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.941138] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988020.977860] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988021.015558] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988021.054401] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.706835] warn_bad_vsyscall: 72 callbacks suppressed [1988025.706839] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.745218] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.778832] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.811083] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.846655] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.878581] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.911515] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.944610] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988025.982768] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988026.020666] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988030.812401] warn_bad_vsyscall: 33 callbacks suppressed [1988030.812403] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988031.016050] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988031.236982] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988031.416688] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988031.984566] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.178624] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.344771] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.552017] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.794997] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988032.838383] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988035.831370] warn_bad_vsyscall: 74 callbacks suppressed [1988035.831373] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988035.877965] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988035.922085] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988035.962552] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.003749] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.046780] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.089919] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.129712] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.170519] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988036.208863] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988040.840192] warn_bad_vsyscall: 130 callbacks suppressed [1988040.840195] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988040.887109] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988040.932484] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988040.972645] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.013466] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.052532] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.091096] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.133108] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.175738] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988041.219060] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988045.957192] warn_bad_vsyscall: 162 callbacks suppressed [1988045.957195] exe[462734] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.139458] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.341008] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.478257] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.733383] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.901808] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988046.946142] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988047.083801] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988047.249940] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988047.398709] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.043601] warn_bad_vsyscall: 27 callbacks suppressed [1988051.043604] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.095007] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.218002] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.378266] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.507176] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.544988] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.684255] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988051.903271] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988052.344816] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988052.462609] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.052180] warn_bad_vsyscall: 22 callbacks suppressed [1988056.052182] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.260224] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.406801] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.540596] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.739838] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988056.994628] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988057.124891] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988057.720180] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988057.920815] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988058.063842] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.399766] warn_bad_vsyscall: 11 callbacks suppressed [1988061.399768] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.593413] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.762014] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.766302] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988061.982904] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.313279] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.374803] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.543397] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.594200] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988062.830194] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988066.458433] warn_bad_vsyscall: 23 callbacks suppressed [1988066.458436] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988066.741663] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988066.924701] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988066.974580] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988067.114858] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988068.110095] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988068.315468] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988068.481089] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988069.571695] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988069.753585] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988071.461270] warn_bad_vsyscall: 12 callbacks suppressed [1988071.461273] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988071.687390] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988071.746250] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988071.911783] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988072.190129] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988072.359020] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988072.561379] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988072.913714] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988073.203453] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988073.370475] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988076.785647] warn_bad_vsyscall: 75 callbacks suppressed [1988076.785651] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.010925] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.208897] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.526707] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.668272] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.794700] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988077.978097] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988078.855841] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988079.480756] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988079.649581] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988081.842182] warn_bad_vsyscall: 6 callbacks suppressed [1988081.842185] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988081.994947] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.038331] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.327309] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.576877] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.581082] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.712255] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988082.906492] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988083.089203] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988083.240670] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.084383] warn_bad_vsyscall: 51 callbacks suppressed [1988087.084386] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.347906] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.395900] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.550221] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.591160] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.631716] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.667874] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.707496] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.745767] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988087.784841] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988092.211409] warn_bad_vsyscall: 34 callbacks suppressed [1988092.211412] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988092.436030] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988092.643553] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988102.070775] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988102.647807] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988103.200993] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988103.701834] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988104.243813] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988104.819603] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988105.322624] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988105.890862] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988106.430162] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988106.890684] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988107.354664] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988107.863222] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988108.307109] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988108.750145] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988109.114307] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988109.505564] exe[472600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988109.822775] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988110.173547] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988110.474118] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988110.731465] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988112.523163] warn_bad_vsyscall: 7 callbacks suppressed [1988112.523166] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988112.851444] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.067490] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.073233] exe[462743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.232058] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.239031] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.404038] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.526850] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.634860] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988113.795810] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988117.639656] warn_bad_vsyscall: 55 callbacks suppressed [1988117.639659] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988117.685426] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988117.833565] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988117.872609] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.039454] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.184657] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.222431] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.259234] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.296466] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988118.339675] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.655907] warn_bad_vsyscall: 107 callbacks suppressed [1988122.655909] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.707968] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.916138] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.953456] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988122.989325] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.029165] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.068982] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.109550] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.147658] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988123.189237] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988127.806043] warn_bad_vsyscall: 81 callbacks suppressed [1988127.806046] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.010561] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.045269] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.080907] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.116113] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.152738] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.190653] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.226895] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.268338] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988128.299867] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988132.981868] warn_bad_vsyscall: 50 callbacks suppressed [1988132.981872] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.032467] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.205016] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.388490] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.547510] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.660919] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988133.882164] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988134.011222] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988134.182498] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988134.371637] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988140.228532] warn_bad_vsyscall: 7 callbacks suppressed [1988140.228535] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988142.819840] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.027421] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.032839] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.204574] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.386669] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.542764] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.667206] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.672917] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988143.890459] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988145.243877] warn_bad_vsyscall: 8 callbacks suppressed [1988145.243880] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988145.445686] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988145.574659] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988145.744785] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.060803] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.190269] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.243399] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.480795] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.650150] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988146.777021] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.381088] warn_bad_vsyscall: 80 callbacks suppressed [1988150.381091] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.522472] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.565916] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.684080] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988150.982346] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.126648] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.335664] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.606060] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.769432] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988151.960496] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988155.535384] warn_bad_vsyscall: 52 callbacks suppressed [1988155.535387] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988155.665751] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988155.821437] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988155.959366] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.054090] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.091369] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.296057] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.434995] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.554234] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988156.920334] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988160.684735] warn_bad_vsyscall: 50 callbacks suppressed [1988160.684738] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988160.826761] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988160.970046] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988161.256668] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988161.412983] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988161.599064] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988161.811933] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988162.006831] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988162.055465] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988162.167365] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988165.762527] warn_bad_vsyscall: 75 callbacks suppressed [1988165.762530] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988165.889906] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988165.926317] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.108859] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.263550] exe[511485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.435895] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.476394] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.573746] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.604158] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988166.638405] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.005274] warn_bad_vsyscall: 110 callbacks suppressed [1988171.005277] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.424861] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.480095] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.640707] exe[463139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.859365] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988171.987398] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988172.196565] exe[509250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988172.387796] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988172.636737] exe[546891] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988172.799736] exe[462791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.090293] warn_bad_vsyscall: 23 callbacks suppressed [1988176.090296] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.564187] exe[508557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.765201] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.800835] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.834389] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.870684] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.906511] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988176.997285] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988177.033325] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988177.070441] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988427.709416] warn_bad_vsyscall: 39 callbacks suppressed [1988427.709420] exe[118832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff0b7f2506 cs:33 sp:7f31c7894f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1988427.762066] exe[118832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff0b7f2506 cs:33 sp:7f31c7873f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1988427.812464] exe[118914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff0b7f2506 cs:33 sp:7f31c7894f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1988427.835441] exe[118914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff0b7f2506 cs:33 sp:7f31c7873f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1988627.135485] exe[189686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c06fa76378 cs:33 sp:7f6612263f90 ax:7f6612264020 si:ffffffffff600000 di:55c06fb402b3 [1988627.211010] exe[189625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c06fa76378 cs:33 sp:7f6612263f90 ax:7f6612264020 si:ffffffffff600000 di:55c06fb402b3 [1988627.214072] exe[189509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c06fa76378 cs:33 sp:7f6612242f90 ax:7f6612243020 si:ffffffffff600000 di:55c06fb402b3 [1988627.308606] exe[218758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c06fa76378 cs:33 sp:7f6612263f90 ax:7f6612264020 si:ffffffffff600000 di:55c06fb402b3 [1988649.330251] exe[163498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.385145] exe[189621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.462331] exe[189431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.523945] exe[189276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.575866] exe[189835] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.631335] exe[189616] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.682414] exe[189625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.730582] exe[189860] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.782847] exe[197211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988649.829829] exe[189529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a5971e6378 cs:33 sp:7f57430a4f90 ax:7f57430a5020 si:ffffffffff600000 di:55a5972b02b3 [1988742.725339] warn_bad_vsyscall: 20 callbacks suppressed [1988742.725341] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988742.988672] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988743.215305] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988794.448515] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988794.855934] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988795.212812] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988795.536707] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988795.907061] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988796.203531] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988796.536745] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988796.815458] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988797.089541] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988797.383756] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988799.475851] warn_bad_vsyscall: 11 callbacks suppressed [1988799.475854] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988799.690349] exe[650327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988799.878558] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988800.132509] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988800.309109] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1988800.486626] exe[462750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988800.660134] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988800.835924] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.158567] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.333739] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.478200] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.482712] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988846.887022] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988847.030912] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988847.152648] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988847.407778] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988847.577313] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988847.807535] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.349716] warn_bad_vsyscall: 26 callbacks suppressed [1988851.349719] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.496144] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.614729] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.760743] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.954132] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988851.994563] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988852.035429] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988852.076985] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988852.122400] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988852.161484] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.459772] warn_bad_vsyscall: 75 callbacks suppressed [1988856.459775] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.639623] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.775856] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.821207] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988856.995076] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.174898] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.307867] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.595932] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.794841] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988857.945363] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988861.495182] warn_bad_vsyscall: 24 callbacks suppressed [1988861.495186] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988861.707615] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988861.833341] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.023889] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.194155] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.319642] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.527573] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.692074] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.753283] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988862.989481] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988866.503656] warn_bad_vsyscall: 76 callbacks suppressed [1988866.503660] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988866.567513] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988866.714448] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988866.904372] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.063708] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.216505] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.416369] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.774199] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988867.939170] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988868.168670] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988871.637036] warn_bad_vsyscall: 49 callbacks suppressed [1988871.637039] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988871.840277] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988871.960094] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.153632] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.300456] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.466171] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.654425] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.821345] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988872.945535] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988873.096408] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988876.900098] warn_bad_vsyscall: 23 callbacks suppressed [1988876.900101] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.071076] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.130820] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.382303] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.538177] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.585534] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.712091] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988877.759976] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988878.041445] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988878.194680] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.008471] warn_bad_vsyscall: 83 callbacks suppressed [1988882.008474] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.313912] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.425519] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.472232] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.687107] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988882.902124] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988883.089541] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988883.224962] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988883.422384] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988883.544928] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.017093] warn_bad_vsyscall: 51 callbacks suppressed [1988887.017096] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.149076] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.372712] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.508958] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.625328] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.629120] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988887.917665] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988888.054118] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988888.110406] exe[465646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988888.225095] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.072750] warn_bad_vsyscall: 31 callbacks suppressed [1988892.072758] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.123925] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.312828] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.548778] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988892.691237] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988893.047197] exe[734250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988893.261326] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988893.450744] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988893.793011] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988894.022654] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.157193] warn_bad_vsyscall: 18 callbacks suppressed [1988897.157195] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.199493] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.298558] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.334675] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.483197] exe[462746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.702474] exe[463298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988897.891285] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988898.073250] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [1988898.234821] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [1988898.346940] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000040 di:ffffffffff600000 [1988902.261269] warn_bad_vsyscall: 25 callbacks suppressed [1988902.261271] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988902.399699] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988902.650686] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988902.807440] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988903.071062] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [1988903.326738] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988903.485009] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988903.660063] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988903.938624] exe[675065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1988904.096215] exe[462756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1989133.146381] warn_bad_vsyscall: 9 callbacks suppressed [1989133.146385] exe[283467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec4a8ee506 cs:33 sp:7f50a4043f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1989249.231385] exe[462752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1989249.450986] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1989249.577029] exe[555155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1989249.621075] exe[734239] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1989447.118208] exe[332289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560fca937506 cs:33 sp:7ff035a85f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1989453.105012] exe[335099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a798f35506 cs:33 sp:7ef101114f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1989887.357575] exe[211741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989888.181309] exe[211758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989888.279316] exe[185845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.307926] exe[185845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.339171] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.366500] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.395761] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.423310] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.451759] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989888.480471] exe[280319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa773fe8e8 ax:ffffffffff600000 si:7faa773fee08 di:ffffffffff600000 [1989959.656380] warn_bad_vsyscall: 57 callbacks suppressed [1989959.656383] exe[264645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989960.430020] exe[338012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989960.527746] exe[338012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989961.302427] exe[208682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989961.373152] exe[211741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989962.166010] exe[211741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989962.234927] exe[208597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989962.305255] exe[191559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989963.039628] exe[212105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1989963.119018] exe[211525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0ec9be506 cs:33 sp:7faa7782a8e8 ax:ffffffffff600000 si:7faa7782ae08 di:ffffffffff600000 [1990305.633297] exe[447918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7e4bf2506 cs:33 sp:7ff01a7fef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990454.367093] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990454.535815] exe[463132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990454.663673] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2d7f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990494.292674] exe[465910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0de11f506 cs:33 sp:7f0d4ad27f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990553.268858] exe[470268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf4023d506 cs:33 sp:7ff3f4ffef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990572.333734] exe[473075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557fec86a506 cs:33 sp:7fc20fb6bf88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990654.587884] exe[462757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990654.757032] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990654.885566] exe[554473] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990655.020928] exe[462738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2b6f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1990785.990637] exe[880100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990786.181812] exe[471184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1990786.311268] exe[462757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1991010.241109] exe[534629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991010.315061] exe[534637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991010.371910] exe[534645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991011.820201] exe[534903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991011.872077] exe[534909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991011.936393] exe[534939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991011.994114] exe[534951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991012.045871] exe[534961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991012.106988] exe[534972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991012.166527] exe[534982] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556868bcf378 cs:33 sp:7ee03da2ff90 ax:7ee03da30020 si:ffffffffff600000 di:556868c992b3 [1991369.963130] warn_bad_vsyscall: 16 callbacks suppressed [1991369.963133] exe[554269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564eceef2506 cs:33 sp:7f14df86bf88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1991556.017023] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1991556.392929] exe[541930] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1991556.535517] exe[463582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ee83e65506 cs:33 sp:7fe3fe2f8f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [1991648.376229] exe[617302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557da0663506 cs:33 sp:7f5926640f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1991741.090416] exe[476883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991741.195122] exe[631877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991741.314022] exe[476883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991747.937721] exe[483307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.021588] exe[486560] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.086773] exe[520118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.159166] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.269701] exe[486569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.357257] exe[486569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.423751] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.486486] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.551539] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1991748.603215] exe[495368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608587f2378 cs:33 sp:7fe4090b7f90 ax:7fe4090b8020 si:ffffffffff600000 di:5608588bc2b3 [1992062.291434] warn_bad_vsyscall: 14 callbacks suppressed [1992062.291437] exe[698326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5611c8c9b506 cs:33 sp:7f56951c7f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1992243.962358] exe[740205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eeaf0c8506 cs:33 sp:7f7c689a5f88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1992421.433565] exe[495968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ed7dd8506 cs:33 sp:7f5a4edd6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1992421.562863] exe[728832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ed7dd8506 cs:33 sp:7f5a4edd6f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1992421.686429] exe[735260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559ed7dd8506 cs:33 sp:7f5a4ed94f88 ax:ffffffffff600000 si:200000c0 di:ffffffffff600000 [1992588.719394] exe[800224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559589e8a101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:50000000 [1992886.881846] exe[495986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992886.993232] exe[819242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992887.100600] exe[495931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a85f9bf90 ax:7f6a85f9c020 si:ffffffffff600000 di:562f2e0782b3 [1992893.741841] exe[499122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992893.823587] exe[728171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992893.944587] exe[496775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.064105] exe[496823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.183300] exe[497972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.299214] exe[727927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.446792] exe[730055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.563528] exe[544128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.690318] exe[498878] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992894.805453] exe[727452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562f2dfae378 cs:33 sp:7f6a8642df90 ax:7f6a8642e020 si:ffffffffff600000 di:562f2e0782b3 [1992919.748157] warn_bad_vsyscall: 6 callbacks suppressed [1992919.748160] exe[646627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a70afb4378 cs:33 sp:7f2dc2bdbf90 ax:7f2dc2bdc020 si:ffffffffff600000 di:55a70b07e2b3 [1992919.854680] exe[646627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a70afb4378 cs:33 sp:7f2dc2bbaf90 ax:7f2dc2bbb020 si:ffffffffff600000 di:55a70b07e2b3 [1992920.080271] exe[669866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a70afb4378 cs:33 sp:7f2dc2b99f90 ax:7f2dc2b9a020 si:ffffffffff600000 di:55a70b07e2b3 [1992933.160879] exe[861923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efeb8cc506 cs:33 sp:7ee5a075ef88 ax:ffffffffff600000 si:20000100 di:ffffffffff600000 [1993917.294559] exe[658579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993917.536365] exe[648516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.565406] exe[646771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.596915] exe[646719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.628716] exe[705902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.660390] exe[705902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.693632] exe[646771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.724090] exe[646771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.758727] exe[648516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993917.790220] exe[646719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47488e8 ax:ffffffffff600000 si:7f9ba4748e08 di:ffffffffff600000 [1993922.338691] warn_bad_vsyscall: 31 callbacks suppressed [1993922.338694] exe[648516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993922.545257] exe[658579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993922.678991] exe[648518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993922.850407] exe[646728] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1993923.000553] exe[646877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1994065.224000] exe[658209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.289340] exe[648518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.351036] exe[654516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.428810] exe[648501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.520290] exe[646942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.643501] exe[646883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06578e8 ax:ffffffffff600000 si:7f39a0657e08 di:ffffffffff600000 [1994065.728330] exe[654492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.811554] exe[658209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994065.811724] exe[648593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06788e8 ax:ffffffffff600000 si:7f39a0678e08 di:ffffffffff600000 [1994065.910103] exe[646673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994070.882181] warn_bad_vsyscall: 132 callbacks suppressed [1994070.882185] exe[700413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06788e8 ax:ffffffffff600000 si:7f39a0678e08 di:ffffffffff600000 [1994070.971843] exe[646771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.053168] exe[646888] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.151011] exe[646942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.236842] exe[646870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.331704] exe[646900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.465084] exe[646876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.550945] exe[657287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.638988] exe[646733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994071.790687] exe[646622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994075.889588] warn_bad_vsyscall: 73 callbacks suppressed [1994075.889590] exe[657291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.032745] exe[648507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.217096] exe[701068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.327032] exe[700607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.384423] exe[658579] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06368e8 ax:ffffffffff600000 si:7f39a0636e08 di:ffffffffff600000 [1994076.508413] exe[654516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.601904] exe[646940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.628052] exe[646940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.727413] exe[662864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994076.839167] exe[648516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994080.964863] warn_bad_vsyscall: 171 callbacks suppressed [1994080.964866] exe[866353] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.098270] exe[646594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.184979] exe[646908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.586411] exe[648538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.663158] exe[646842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.695092] exe[654477] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.787597] exe[648507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.887286] exe[662856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994081.981425] exe[646747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994082.011606] exe[648518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.062768] warn_bad_vsyscall: 100 callbacks suppressed [1994086.062771] exe[662887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.067687] exe[646696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06788e8 ax:ffffffffff600000 si:7f39a0678e08 di:ffffffffff600000 [1994086.196368] exe[662887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.319158] exe[700432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.464478] exe[658583] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.569529] exe[646607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.677310] exe[646673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.777815] exe[654516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.815147] exe[646690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994086.939883] exe[646747] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.109183] warn_bad_vsyscall: 97 callbacks suppressed [1994091.109186] exe[646617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.227568] exe[646704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.362625] exe[646719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.686733] exe[646700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.799908] exe[646716] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.834706] exe[646723] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994091.941768] exe[646716] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994092.033290] exe[657262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994092.128792] exe[662864] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06788e8 ax:ffffffffff600000 si:7f39a0678e08 di:ffffffffff600000 [1994093.151290] exe[646704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.131932] warn_bad_vsyscall: 29 callbacks suppressed [1994096.131935] exe[646696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.241804] exe[646877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.321108] exe[646681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.349263] exe[646681] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.434405] exe[646738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.523766] exe[646883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.622062] exe[648507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.704360] exe[843149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.814345] exe[648538] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994096.888926] exe[646733] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994101.367577] warn_bad_vsyscall: 80 callbacks suppressed [1994101.367580] exe[646883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994101.495483] exe[700607] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1994101.590732] exe[658209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e625e7d506 cs:33 sp:7f39a06998e8 ax:ffffffffff600000 si:7f39a0699e08 di:ffffffffff600000 [1995101.661803] exe[141065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d052c94101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1995101.715488] exe[139000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d052c94101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1995101.755431] exe[138034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d052c94101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [1995207.119110] exe[654492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1995207.288514] exe[658279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1995207.466163] exe[654492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560df1445506 cs:33 sp:7f9ba47698e8 ax:ffffffffff600000 si:7f9ba4769e08 di:ffffffffff600000 [1995832.530567] exe[171611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c1aadd378 cs:33 sp:7f1539ae5f90 ax:7f1539ae6020 si:ffffffffff600000 di:556c1aba72b3 [1995832.592997] exe[171633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c1aadd378 cs:33 sp:7f1539ae5f90 ax:7f1539ae6020 si:ffffffffff600000 di:556c1aba72b3 [1995832.646150] exe[138312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c1aadd378 cs:33 sp:7f1539ae5f90 ax:7f1539ae6020 si:ffffffffff600000 di:556c1aba72b3 [1995832.646214] exe[171624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c1aadd378 cs:33 sp:7f1539ac4f90 ax:7f1539ac5020 si:ffffffffff600000 di:556c1aba72b3 [1997201.093804] exe[413417] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650309cd506 cs:33 sp:7f45c0ae08e8 ax:ffffffffff600000 si:7f45c0ae0e08 di:ffffffffff600000 [1997201.135704] exe[421195] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650309cd506 cs:33 sp:7f45c0ae08e8 ax:ffffffffff600000 si:7f45c0ae0e08 di:ffffffffff600000 [1997201.922512] exe[413391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650309cd506 cs:33 sp:7f45c0ae08e8 ax:ffffffffff600000 si:7f45c0ae0e08 di:ffffffffff600000 [1997201.948114] exe[413626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650309cd506 cs:33 sp:7f45c0abf8e8 ax:ffffffffff600000 si:7f45c0abfe08 di:ffffffffff600000 [1997630.947045] exe[337113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997631.074901] exe[390832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997631.075683] exe[389330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997631.205090] exe[336043] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997639.317282] exe[388432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.392608] exe[336055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.466297] exe[388432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.540623] exe[336447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.616992] exe[408241] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.700083] exe[336324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.797874] exe[336447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.882726] exe[387189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997639.968134] exe[336447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997640.078197] exe[336447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.497028] warn_bad_vsyscall: 12 callbacks suppressed [1997698.497031] exe[337112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.605938] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.707028] exe[337112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.707284] exe[335934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997698.836285] exe[337112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997698.929233] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997699.023705] exe[470482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997699.051466] exe[470482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997699.142698] exe[337112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997699.248493] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.572520] warn_bad_vsyscall: 120 callbacks suppressed [1997703.572524] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.679555] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.763041] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.795813] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.887256] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.971656] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997703.974308] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997704.082265] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997704.104563] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997704.216792] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.625771] warn_bad_vsyscall: 91 callbacks suppressed [1997708.625774] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.653829] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.745651] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.832803] exe[389348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997708.915151] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997709.019396] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997709.118778] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997709.237273] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997709.237844] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997709.374624] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997713.698879] warn_bad_vsyscall: 150 callbacks suppressed [1997713.698881] exe[336594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997713.828705] exe[470482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997713.947109] exe[470482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997714.068001] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997714.709907] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997715.023054] exe[336594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997715.133020] exe[336594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997715.176265] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997715.276585] exe[336594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997715.393444] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997718.722632] warn_bad_vsyscall: 44 callbacks suppressed [1997718.722635] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997718.808219] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997718.879384] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997718.881333] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997718.982806] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997719.097541] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997719.132830] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997719.206963] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997719.302056] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997719.378417] exe[337179] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997723.807162] warn_bad_vsyscall: 144 callbacks suppressed [1997723.807166] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98788e8 ax:ffffffffff600000 si:7fe8e9878e08 di:ffffffffff600000 [1997723.911817] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997723.946117] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.022290] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.124943] exe[462739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.150839] exe[335554] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.233678] exe[335938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.348830] exe[389352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98ba8e8 ax:ffffffffff600000 si:7fe8e98bae08 di:ffffffffff600000 [1997724.464502] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997724.571864] exe[391662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838a3506 cs:33 sp:7fe8e98998e8 ax:ffffffffff600000 si:7fe8e9899e08 di:ffffffffff600000 [1997736.572493] warn_bad_vsyscall: 89 callbacks suppressed [1997736.572497] exe[424983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56164720c506 cs:33 sp:7efcf55aa8e8 ax:ffffffffff600000 si:7efcf55aae08 di:ffffffffff600000 [1997736.646724] exe[448250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56164720c506 cs:33 sp:7efcf55aa8e8 ax:ffffffffff600000 si:7efcf55aae08 di:ffffffffff600000 [1997736.696796] exe[448187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56164720c506 cs:33 sp:7efcf55aa8e8 ax:ffffffffff600000 si:7efcf55aae08 di:ffffffffff600000 [1997736.749322] exe[452827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997736.878190] exe[448258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997736.968238] exe[446720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997737.044281] exe[424837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997737.121524] exe[424802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997737.195721] exe[446591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997737.258043] exe[424981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559204de0506 cs:33 sp:7f355ffdd8e8 ax:ffffffffff600000 si:7f355ffdde08 di:ffffffffff600000 [1997741.631735] warn_bad_vsyscall: 120 callbacks suppressed [1997741.631739] exe[448187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997741.771812] exe[424803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997741.899031] exe[425411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.020931] exe[425161] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.377324] exe[424696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.444762] exe[446568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.516370] exe[424667] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.596381] exe[448634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997742.660588] exe[424732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997742.735906] exe[446585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997746.651384] warn_bad_vsyscall: 207 callbacks suppressed [1997746.651389] exe[424821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997746.757401] exe[486177] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997746.823102] exe[424766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997746.846533] exe[424821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997746.912389] exe[425047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997746.997607] exe[424989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997747.103782] exe[486144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997747.159861] exe[424997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997747.232665] exe[424696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997747.331687] exe[424820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997752.324285] warn_bad_vsyscall: 156 callbacks suppressed [1997752.324289] exe[425154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997752.354381] exe[424985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997753.170594] exe[424803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997753.236186] exe[425002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.030504] exe[425055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.089772] exe[486144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.141304] exe[425390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.162177] exe[424985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.189319] exe[424981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997754.211479] exe[424981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.375819] warn_bad_vsyscall: 321 callbacks suppressed [1997757.375823] exe[448258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.444293] exe[424837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.505088] exe[448216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.527417] exe[448254] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.583130] exe[425432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.584763] exe[424729] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bb18e8 ax:ffffffffff600000 si:7f7023bb1e08 di:ffffffffff600000 [1997757.653174] exe[424802] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.712318] exe[448203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.738311] exe[487414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1997757.787334] exe[425390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b0389506 cs:33 sp:7f7023bd28e8 ax:ffffffffff600000 si:7f7023bd2e08 di:ffffffffff600000 [1998216.298868] warn_bad_vsyscall: 197 callbacks suppressed [1998216.298872] exe[489137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604a2a1d506 cs:33 sp:7f9433d9b8e8 ax:ffffffffff600000 si:7f9433d9be08 di:ffffffffff600000 [1998216.375195] exe[446625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604a2a1d506 cs:33 sp:7f9433d9b8e8 ax:ffffffffff600000 si:7f9433d9be08 di:ffffffffff600000 [1998216.451926] exe[446594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5604a2a1d506 cs:33 sp:7f9433d9b8e8 ax:ffffffffff600000 si:7f9433d9be08 di:ffffffffff600000 [1998307.641864] exe[531738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562642c3b506 cs:33 sp:7f4ba7f0b8e8 ax:ffffffffff600000 si:7f4ba7f0be08 di:ffffffffff600000 [1998319.597620] exe[571402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d0812e506 cs:33 sp:7efff2a228e8 ax:ffffffffff600000 si:7efff2a22e08 di:ffffffffff600000 [1998336.231470] exe[543281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563ee7186506 cs:33 sp:7fc3fa8bf8e8 ax:ffffffffff600000 si:7fc3fa8bfe08 di:ffffffffff600000 [1998369.358701] exe[580850] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b80e30d506 cs:33 sp:7efe5c93c8e8 ax:ffffffffff600000 si:7efe5c93ce08 di:ffffffffff600000 [1998390.483993] exe[387194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838b4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2040000 [1998390.572580] exe[335997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838b4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2040000 [1998390.646944] exe[439420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838b4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2040000 [1998390.665542] exe[586028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563f838b4101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2040000 [1998504.903331] exe[603922] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca0288b506 cs:33 sp:7f1f53c458e8 ax:ffffffffff600000 si:7f1f53c45e08 di:ffffffffff600000 [1998862.441363] exe[666434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c77ac76506 cs:33 sp:7f55b917c8e8 ax:ffffffffff600000 si:7f55b917ce08 di:ffffffffff600000 [1998968.372121] exe[301567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998968.586694] exe[391138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998968.763041] exe[333611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998968.763858] exe[317264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998980.618816] exe[390979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998980.779951] exe[317426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998980.946429] exe[375831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.120008] exe[333839] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.292151] exe[390902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.456206] exe[298720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.604714] exe[376819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.766737] exe[408618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998981.912638] exe[420188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998982.038239] exe[375831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5608f935f506 cs:33 sp:7f1670abc8e8 ax:ffffffffff600000 si:7f1670abce08 di:ffffffffff600000 [1998988.932448] warn_bad_vsyscall: 4 callbacks suppressed [1998988.932451] exe[409550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998989.088543] exe[408936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998989.092984] exe[348389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998989.391916] exe[387890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998989.652623] exe[387890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998989.862014] exe[317497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998990.035722] exe[316030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998990.205807] exe[295073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998990.472256] exe[317719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998990.472900] exe[511816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998994.004903] warn_bad_vsyscall: 18 callbacks suppressed [1998994.004906] exe[301592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998994.808494] exe[472232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.032306] exe[391138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.032652] exe[330257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1998995.240509] exe[333462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.372762] exe[390937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.523147] exe[371961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.662085] exe[371961] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.785544] exe[295073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998995.816997] exe[301558] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.138245] warn_bad_vsyscall: 74 callbacks suppressed [1998999.138248] exe[350256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.185620] exe[356854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.354858] exe[399649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.592887] exe[390887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.803886] exe[316045] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1998999.835008] exe[315869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999000.381969] exe[317343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999000.513010] exe[317444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999001.335044] exe[333655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999001.503892] exe[400452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.201378] warn_bad_vsyscall: 78 callbacks suppressed [1999004.201381] exe[350279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.350031] exe[387222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.384591] exe[418132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.520157] exe[317343] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.686708] exe[317368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999004.917123] exe[403700] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999005.025783] exe[317347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999005.252054] exe[350279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999005.252256] exe[333611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999005.452105] exe[319462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.222241] warn_bad_vsyscall: 13 callbacks suppressed [1999009.222244] exe[318883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.430845] exe[320469] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.584749] exe[406055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.770558] exe[387084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.898408] exe[390973] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999009.938206] exe[390931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999010.106298] exe[399655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999010.251880] exe[390257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999010.280202] exe[390257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999010.402928] exe[316051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.260598] warn_bad_vsyscall: 79 callbacks suppressed [1999014.260600] exe[301545] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.399275] exe[381292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.557271] exe[333462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.699611] exe[382506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999014.844476] exe[533947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999015.036999] exe[546074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999015.227451] exe[400909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999015.392719] exe[399620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999015.539228] exe[469181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999015.658291] exe[390902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999019.480472] warn_bad_vsyscall: 25 callbacks suppressed [1999019.480475] exe[330637] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999019.481159] exe[295073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999019.721304] exe[333626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999019.844808] exe[316281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999020.068775] exe[391070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999020.295304] exe[315721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999020.544276] exe[391062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999021.445822] exe[410501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999022.449133] exe[390934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999023.367767] exe[469209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999024.578035] warn_bad_vsyscall: 38 callbacks suppressed [1999024.578037] exe[316333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999024.729494] exe[348437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999024.799649] exe[317426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999024.958029] exe[316308] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999025.087784] exe[471165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999025.244647] exe[390937] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999025.408314] exe[400720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999025.567571] exe[317248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999025.735420] exe[316428] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999026.626672] exe[387010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999030.007550] warn_bad_vsyscall: 9 callbacks suppressed [1999030.007553] exe[513568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999030.193558] exe[543427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999030.933261] exe[298709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999031.100907] exe[350279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999031.857863] exe[395194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999031.906161] exe[316302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999032.058974] exe[400909] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999032.208935] exe[390908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999032.331647] exe[297078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999032.370073] exe[297078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999035.034779] warn_bad_vsyscall: 75 callbacks suppressed [1999035.034783] exe[628777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610a10be506 cs:33 sp:7f28bac948e8 ax:ffffffffff600000 si:7f28bac94e08 di:ffffffffff600000 [1999035.107882] exe[653968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610a10be506 cs:33 sp:7f28bac948e8 ax:ffffffffff600000 si:7f28bac94e08 di:ffffffffff600000 [1999035.167637] exe[653968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610a10be506 cs:33 sp:7f28bac948e8 ax:ffffffffff600000 si:7f28bac94e08 di:ffffffffff600000 [1999035.167770] exe[514954] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5610a10be506 cs:33 sp:7f28bac738e8 ax:ffffffffff600000 si:7f28bac73e08 di:ffffffffff600000 [1999035.212590] exe[333429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.314826] exe[390887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.371900] exe[333429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.424448] exe[390908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.513430] exe[350260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999035.574851] exe[350260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61238e8 ax:ffffffffff600000 si:7f67f6123e08 di:ffffffffff600000 [1999040.437917] warn_bad_vsyscall: 87 callbacks suppressed [1999040.437921] exe[317410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999040.480277] exe[336597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999040.645735] exe[387041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999041.634937] exe[418536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.107880] exe[390231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.285311] exe[298709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.416919] exe[309660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.568736] exe[535414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.598958] exe[471046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999042.749435] exe[315852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999045.513645] warn_bad_vsyscall: 11 callbacks suppressed [1999045.513647] exe[294746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999045.660643] exe[386990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999045.793438] exe[387042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999045.968469] exe[409341] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999046.116742] exe[317251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.145883] exe[309668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.171581] exe[309668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.199585] exe[310806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.226869] exe[349102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999046.254695] exe[349102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61448e8 ax:ffffffffff600000 si:7f67f6144e08 di:ffffffffff600000 [1999050.576874] warn_bad_vsyscall: 56 callbacks suppressed [1999050.576877] exe[315883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999051.191405] exe[319415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999051.473267] exe[315856] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999051.601896] exe[348391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999052.142654] exe[473388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999052.289158] exe[319462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999053.045586] exe[316105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999053.166703] exe[316115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999053.352926] exe[326291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999053.386986] exe[319425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999055.602858] warn_bad_vsyscall: 77 callbacks suppressed [1999055.602861] exe[409550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999055.735852] exe[315622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999055.880553] exe[317367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.060021] exe[319783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.236981] exe[309668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.415153] exe[309154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.560308] exe[413698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.672978] exe[335038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999056.820464] exe[309092] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999057.002720] exe[335029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562037c8b506 cs:33 sp:7f67f61658e8 ax:ffffffffff600000 si:7f67f6165e08 di:ffffffffff600000 [1999278.805930] warn_bad_vsyscall: 17 callbacks suppressed [1999278.805934] exe[750515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999278.872036] exe[750519] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999278.930082] exe[750525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999284.398017] exe[751508] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999284.544464] exe[751568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999284.696033] exe[751599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999284.866791] exe[751622] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.040747] exe[751669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.186064] exe[751685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.262557] exe[751711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.338023] exe[751721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.443638] exe[751732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999285.507152] exe[751741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999289.410031] warn_bad_vsyscall: 147 callbacks suppressed [1999289.410035] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.460448] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.482808] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.511625] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.532995] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.554725] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.577238] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.598646] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.618939] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999289.639857] exe[752391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83687cf90 ax:7ea83687d020 si:ffffffffff600000 di:55be3dd252b3 [1999294.480869] warn_bad_vsyscall: 280 callbacks suppressed [1999294.480873] exe[752972] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.556104] exe[752979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.639346] exe[752986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.705646] exe[752997] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.771400] exe[753003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.869281] exe[753013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999294.967914] exe[753020] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999295.065703] exe[753027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999295.121309] exe[753034] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999295.207874] exe[753041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.490686] warn_bad_vsyscall: 286 callbacks suppressed [1999299.490690] exe[753705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.594502] exe[753754] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.686243] exe[753788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.761865] exe[753804] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.835590] exe[753822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.901144] exe[753837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999299.973879] exe[753855] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999300.051001] exe[753872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999300.126955] exe[753887] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999300.196520] exe[753892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.233484] warn_bad_vsyscall: 165 callbacks suppressed [1999305.233487] exe[754589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.317729] exe[754594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.395967] exe[754601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.463780] exe[754609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.557104] exe[754619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.625583] exe[754634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.712443] exe[754646] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.805023] exe[754656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.923561] exe[754668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999305.995461] exe[754676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be3dc5b378 cs:33 sp:7ea83689df90 ax:7ea83689e020 si:ffffffffff600000 di:55be3dd252b3 [1999490.618537] warn_bad_vsyscall: 8 callbacks suppressed [1999490.618540] exe[729776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5651daaec506 cs:33 sp:7f1e6b5bd8e8 ax:ffffffffff600000 si:7f1e6b5bde08 di:ffffffffff600000 [1999573.587278] exe[424986] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b033a378 cs:33 sp:7f7023bd2f90 ax:7f7023bd3020 si:ffffffffff600000 di:5647b04042b3 [1999573.665946] exe[448182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b033a378 cs:33 sp:7f7023bd2f90 ax:7f7023bd3020 si:ffffffffff600000 di:5647b04042b3 [1999573.750330] exe[494957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647b033a378 cs:33 sp:7f7023bd2f90 ax:7f7023bd3020 si:ffffffffff600000 di:5647b04042b3 [1999655.955649] exe[787753] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f0d0485506 cs:33 sp:7f19f3b828e8 ax:ffffffffff600000 si:7f19f3b82e08 di:ffffffffff600000 [1999721.084024] exe[818650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0be5b506 cs:33 sp:7f38140a48e8 ax:ffffffffff600000 si:7f38140a4e08 di:ffffffffff600000 [1999843.663088] exe[808369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75310c506 cs:33 sp:7fdac57608e8 ax:ffffffffff600000 si:7fdac5760e08 di:ffffffffff600000 [1999843.799284] exe[786823] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75310c506 cs:33 sp:7fdac573f8e8 ax:ffffffffff600000 si:7fdac573fe08 di:ffffffffff600000 [1999843.922346] exe[798634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75310c506 cs:33 sp:7fdac57608e8 ax:ffffffffff600000 si:7fdac5760e08 di:ffffffffff600000 [1999851.682139] exe[792730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999851.786576] exe[808410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999851.900862] exe[827005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.082862] exe[748399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.183901] exe[787563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.294482] exe[787173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.385644] exe[787011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.472373] exe[826979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.562781] exe[808414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [1999852.673586] exe[787562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000798.674871] exe[788014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000798.771260] exe[787591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000798.888821] exe[714383] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000799.049648] exe[787261] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.192442] exe[787591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.353788] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.354304] exe[808399] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000799.491549] exe[730263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.605897] exe[827749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000799.698854] exe[795060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000803.726651] warn_bad_vsyscall: 18 callbacks suppressed [2000803.726655] exe[788012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000803.839581] exe[796057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000803.874663] exe[797188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1dd8e8 ax:ffffffffff600000 si:7f853e1dde08 di:ffffffffff600000 [2000803.997909] exe[789123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000804.098917] exe[799066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000804.203350] exe[798761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000804.299702] exe[796233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000804.331429] exe[799060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000804.454037] exe[810148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000804.597955] exe[915485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000809.108018] warn_bad_vsyscall: 43 callbacks suppressed [2000809.108020] exe[826958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000810.032374] exe[798663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000810.974084] exe[787231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.086915] exe[808475] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.121705] exe[830758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.224391] exe[703139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000811.342072] exe[787196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.453001] exe[796093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000811.496082] exe[799060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1dd8e8 ax:ffffffffff600000 si:7f853e1dde08 di:ffffffffff600000 [2000811.615851] exe[703084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.141220] warn_bad_vsyscall: 18 callbacks suppressed [2000814.141223] exe[808462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000814.264608] exe[798660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.367183] exe[787310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.473725] exe[796018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.507632] exe[796018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.604582] exe[734159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.717463] exe[787165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.823867] exe[787536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.918007] exe[783204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000814.952284] exe[795060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.145349] warn_bad_vsyscall: 56 callbacks suppressed [2000819.145352] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.180094] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.210436] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.241465] exe[826948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.272651] exe[808410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.304259] exe[808410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.334222] exe[808410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.367878] exe[828610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.397831] exe[828610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000819.426803] exe[828610] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.220728] warn_bad_vsyscall: 92 callbacks suppressed [2000824.220731] exe[788005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.327764] exe[828578] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.427157] exe[787208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.543349] exe[827749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.653745] exe[915489] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000824.800869] exe[787208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000825.042589] exe[796046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000825.107317] exe[798654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000825.231961] exe[787339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000825.328092] exe[787284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000830.107830] warn_bad_vsyscall: 23 callbacks suppressed [2000830.107833] exe[808370] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000830.999403] exe[787591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000831.893648] exe[798633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.009735] exe[787563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.012683] exe[787166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000832.143207] exe[788000] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.145201] exe[792661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000832.267407] exe[915476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.369352] exe[703084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000832.478617] exe[787994] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.161577] warn_bad_vsyscall: 85 callbacks suppressed [2000835.161579] exe[914706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.165598] exe[788012] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000835.300640] exe[787129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.342525] exe[789066] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000835.449018] exe[787304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.540509] exe[914706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.798942] exe[941175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000835.901223] exe[808414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000836.805310] exe[908842] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000836.892039] exe[788008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000840.205191] warn_bad_vsyscall: 19 callbacks suppressed [2000840.205194] exe[796067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.331413] exe[703069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.333956] exe[941175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e1fe8e8 ax:ffffffffff600000 si:7f853e1fee08 di:ffffffffff600000 [2000840.490547] exe[792661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.613662] exe[787562] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.722000] exe[787165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.817039] exe[703069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.846210] exe[730263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000840.951110] exe[787310] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2000841.058982] exe[788632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555bf6118506 cs:33 sp:7f853e62c8e8 ax:ffffffffff600000 si:7f853e62ce08 di:ffffffffff600000 [2001024.422897] warn_bad_vsyscall: 24 callbacks suppressed [2001024.422902] exe[61672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc965c378 cs:33 sp:7fcde943ff90 ax:7fcde9440020 si:ffffffffff600000 di:564cc97262b3 [2001024.485734] exe[966984] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc965c378 cs:33 sp:7fcde943ff90 ax:7fcde9440020 si:ffffffffff600000 di:564cc97262b3 [2001024.485959] exe[967344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc965c378 cs:33 sp:7fcde8ffef90 ax:7fcde8fff020 si:ffffffffff600000 di:564cc97262b3 [2001024.556998] exe[31976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cc965c378 cs:33 sp:7fcde943ff90 ax:7fcde9440020 si:ffffffffff600000 di:564cc97262b3 [2001098.839972] exe[797159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3f1e3b506 cs:33 sp:7fd67f1198e8 ax:ffffffffff600000 si:7fd67f119e08 di:ffffffffff600000 [2001099.637074] exe[714401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3f1e3b506 cs:33 sp:7fd67f1198e8 ax:ffffffffff600000 si:7fd67f119e08 di:ffffffffff600000 [2001099.755736] exe[796093] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3f1e3b506 cs:33 sp:7fd67f1198e8 ax:ffffffffff600000 si:7fd67f119e08 di:ffffffffff600000 [2001099.803194] exe[787176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d3f1e3b506 cs:33 sp:7fd67f1198e8 ax:ffffffffff600000 si:7fd67f119e08 di:ffffffffff600000 [2001387.629506] exe[161662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001388.490032] exe[160338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001388.519386] exe[159784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001389.383595] exe[159286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001389.394314] exe[158166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010b8cf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001390.253180] exe[158298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001391.118089] exe[158048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001391.981728] exe[157991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001392.851633] exe[161595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001393.724950] exe[157991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001394.602472] exe[161648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001395.455497] exe[158146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001396.320519] exe[159608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001397.194355] exe[161732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001398.060892] exe[158463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001398.939544] exe[162367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001399.785952] exe[161738] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001452.414100] exe[158462] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001453.278284] exe[159537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001453.287705] exe[158002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001454.153743] exe[158293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001454.158597] exe[169413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001455.020348] exe[177216] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001455.022540] exe[158463] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001455.885107] exe[177156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001455.888761] exe[161352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001456.736700] exe[177218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001457.634668] warn_bad_vsyscall: 1 callbacks suppressed [2001457.634671] exe[159739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001457.653273] exe[177151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001457.715447] exe[158414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001458.483425] exe[177156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001458.493948] exe[161542] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001458.501910] exe[177218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001458.581733] exe[159769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001459.362193] exe[158129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001459.369948] exe[162570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001459.374034] exe[158396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001462.819299] warn_bad_vsyscall: 13 callbacks suppressed [2001462.819303] exe[177269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001462.830006] exe[177251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001462.834818] exe[158465] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001462.895872] exe[158002] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001463.676126] exe[161635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001463.691575] exe[159511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001463.691868] exe[158099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001463.756335] exe[157979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001464.547983] exe[177188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001464.559589] exe[159511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001467.995653] warn_bad_vsyscall: 16 callbacks suppressed [2001467.995657] exe[159511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.052461] exe[177201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.056657] exe[160138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.058852] exe[157979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c87879e506 cs:33 sp:7f46904a2f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.094933] exe[177201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.164470] exe[177201] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.218324] exe[177269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.284448] exe[162644] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [2001468.868542] exe[158688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001468.911615] exe[159769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:0 di:ffffffffff600000 [2001473.186754] warn_bad_vsyscall: 18 callbacks suppressed [2001473.186758] exe[159284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001473.189676] exe[158298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001474.039059] exe[158210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001474.051315] exe[177272] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001474.895371] exe[177174] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001474.909379] exe[159769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001475.753568] exe[161333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001475.766795] exe[158210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001476.608780] exe[169413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001476.627284] exe[158298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001478.317455] warn_bad_vsyscall: 2 callbacks suppressed [2001478.317459] exe[162570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001478.339693] exe[159192] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001479.178287] exe[169413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001479.191503] exe[159550] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001479.240236] exe[158204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.033861] exe[161289] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.047240] exe[158396] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560113af1506 cs:33 sp:7f7010bcef88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.097669] exe[158204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.887302] exe[161333] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001480.957176] exe[158149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001483.462503] warn_bad_vsyscall: 4 callbacks suppressed [2001483.462506] exe[161635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001483.530897] exe[158198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001484.314778] exe[161352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564e9e150506 cs:33 sp:7f3b7ed00f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001484.403208] exe[157983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001485.254745] exe[161635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001486.121559] exe[158187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001486.995810] exe[162570] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001487.866765] exe[158187] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001488.720690] exe[161635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001489.580936] exe[158198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001490.436936] exe[158291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001491.298501] exe[158213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55718078f506 cs:33 sp:7f535e095f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2001697.896026] exe[211904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f188d6506 cs:33 sp:7ec6648c18e8 ax:ffffffffff600000 si:7ec6648c1e08 di:ffffffffff600000 [2004244.991815] exe[472101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55efea9ac506 cs:33 sp:7f6f1b9068e8 ax:ffffffffff600000 si:7f6f1b906e08 di:ffffffffff600000 [2004642.241935] exe[629687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c370b7506 cs:33 sp:7f7724911f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2004664.245380] exe[633483] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b745c9506 cs:33 sp:7f0544d71f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2005056.606119] exe[644832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bb54d3f21 cs:33 sp:7fc08a25f110 ax:563bb54d3f10 si:ffffffffff600000 di:563bb5583278 [2005057.523933] exe[495029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563bb54d3f21 cs:33 sp:7fc08a25f110 ax:563bb54d3f10 si:ffffffffff600000 di:563bb5583278 [2005092.618443] exe[702867] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5584dfb37506 cs:33 sp:7eb0224fcf88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2005110.428741] exe[701487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643bbf26506 cs:33 sp:7ff91cfc5f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2005164.832462] exe[644194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5616d7b6df21 cs:33 sp:7f23a1764110 ax:5616d7b6df10 si:ffffffffff600000 di:5616d7c1d278 [2005760.064224] exe[241481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370c0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:42040000 [2005760.471756] exe[263695] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370c0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:42040000 [2005760.731320] exe[293134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370c0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:42040000 [2005838.111859] exe[123612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370c0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:42040000 [2005838.479828] exe[739645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370c0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:42040000 [2005838.965471] exe[231506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370c0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:42040000 [2005839.422695] exe[123612] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370c0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:42040000 [2005839.772774] exe[185771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370c0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:42040000 [2005840.063397] exe[212736] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56370c0fe101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [2006137.186374] exe[828059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56389b633506 cs:33 sp:7ec493ad4f88 ax:ffffffffff600000 si:20000080 di:ffffffffff600000 [2006426.215196] exe[772634] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f869830378 cs:33 sp:7fe5946b9f90 ax:7fe5946ba020 si:ffffffffff600000 di:55f8698fa2b3 [2006426.269910] exe[773137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f869830378 cs:33 sp:7fe594698f90 ax:7fe594699020 si:ffffffffff600000 di:55f8698fa2b3 [2006426.270110] exe[775625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f869830378 cs:33 sp:7fe5946b9f90 ax:7fe5946ba020 si:ffffffffff600000 di:55f8698fa2b3 [2006427.058413] exe[773137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f869830378 cs:33 sp:7fe5946b9f90 ax:7fe5946ba020 si:ffffffffff600000 di:55f8698fa2b3 [2006479.731543] exe[865932] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563768002101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [2006600.063639] exe[863365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006600.215155] exe[863566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe2e4f90 ax:7feabe2e5020 si:ffffffffff600000 di:56527d0a22b3 [2006600.383926] exe[876647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe2e4f90 ax:7feabe2e5020 si:ffffffffff600000 di:56527d0a22b3 [2006611.578319] exe[862824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006611.734540] exe[863836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006611.910500] exe[876647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006612.074641] exe[876647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006612.210891] exe[862824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006612.371857] exe[863617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006612.519558] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006612.685178] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006612.886898] exe[863365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006613.032345] exe[862824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006616.609361] warn_bad_vsyscall: 26 callbacks suppressed [2006616.609363] exe[862060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006616.761111] exe[869278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006616.888247] exe[869278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006617.038531] exe[862824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006617.064860] exe[862824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006617.223700] exe[863617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006617.390252] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006617.538141] exe[862824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006617.680490] exe[863836] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006617.838005] exe[862060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006621.688818] warn_bad_vsyscall: 27 callbacks suppressed [2006621.688821] exe[863617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006621.719615] exe[863617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006621.836288] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006621.943298] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006622.095360] exe[876647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe2e4f90 ax:7feabe2e5020 si:ffffffffff600000 di:56527d0a22b3 [2006622.224638] exe[862824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006622.362823] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006622.480417] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006622.503404] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006622.694569] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006626.701481] warn_bad_vsyscall: 41 callbacks suppressed [2006626.701485] exe[863485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006626.845889] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006626.986278] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006627.148596] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006627.349257] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006627.472210] exe[876647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006627.596071] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006627.704340] exe[863485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006627.821348] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006627.855105] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe2c3f90 ax:7feabe2c4020 si:ffffffffff600000 di:56527d0a22b3 [2006631.723280] warn_bad_vsyscall: 41 callbacks suppressed [2006631.723282] exe[862060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006631.844297] exe[876647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006631.960644] exe[862410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006632.080766] exe[869278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006632.165788] exe[862323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006632.304422] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006632.422218] exe[869278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006632.447978] exe[869278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006632.535946] exe[863525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006633.077944] exe[863525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006636.784533] warn_bad_vsyscall: 31 callbacks suppressed [2006636.784537] exe[862323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006636.829742] exe[862060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe2c3f90 ax:7feabe2c4020 si:ffffffffff600000 di:56527d0a22b3 [2006636.952705] exe[862323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006637.097840] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006637.226665] exe[862323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006637.307888] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006637.418692] exe[863525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006637.533182] exe[863525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006637.651019] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006637.766993] exe[863525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe2e4f90 ax:7feabe2e5020 si:ffffffffff600000 di:56527d0a22b3 [2006642.066410] warn_bad_vsyscall: 34 callbacks suppressed [2006642.066413] exe[862323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe2e4f90 ax:7feabe2e5020 si:ffffffffff600000 di:56527d0a22b3 [2006642.996796] exe[862824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006643.829733] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006643.912138] exe[862060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006643.934241] exe[862060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006644.049762] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006644.153782] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006644.274851] exe[862323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006644.399216] exe[863617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006644.438391] exe[863817] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe2e4f90 ax:7feabe2e5020 si:ffffffffff600000 di:56527d0a22b3 [2006647.118506] warn_bad_vsyscall: 66 callbacks suppressed [2006647.118509] exe[869278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006647.230123] exe[863617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006647.353357] exe[862060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006647.458468] exe[863857] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006647.568291] exe[869278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006647.672501] exe[862060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006647.778362] exe[863485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006647.866123] exe[862060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006648.032270] exe[863617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006648.144699] exe[863525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56527cfd8378 cs:33 sp:7feabe305f90 ax:7feabe306020 si:ffffffffff600000 di:56527d0a22b3 [2006911.272584] warn_bad_vsyscall: 102 callbacks suppressed [2006911.272587] exe[918220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641bfc6f101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0 [2007129.545126] exe[936872] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b1afb86101 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:0