fatal error: unexpected signal during runtime execution
D0331 14:54:00.880106 968535 task_signals.go:470] [ 6: 20] Notified of signal 23
D0331 14:54:00.880142 968535 task_exit.go:204] [ 27769: 27774] Transitioning from exit state TaskExitInitiated to TaskExitZombie
D0331 14:54:00.880191 968535 task_exit.go:204] [ 27769: 27774] Transitioning from exit state TaskExitZombie to TaskExitDead
D0331 14:54:00.880215 968535 task_signals.go:443] [ 29: 29] Discarding ignored signal 17
D0331 14:54:00.880185 968535 task_signals.go:220] [ 6: 20] Signal 23: delivering to handler
D0331 14:54:00.881092 968535 task_exit.go:204] [ 27769: 27769] Transitioning from exit state TaskExitZombie to TaskExitDead
D0331 14:54:00.883022 968535 usertrap_amd64.go:212] [ 27772: 27772] Found the pattern at ip 55722121e51a:sysno 56
D0331 14:54:00.883086 968535 usertrap_amd64.go:122] [ 27772: 27772] Allocate a new trap: 0xc002437d40 41
D0331 14:54:00.883108 968535 usertrap_amd64.go:225] [ 27772: 27772] Apply the binary patch addr 55722121e51a trap addr 69cd0 ([184 56 0 0 0 15 5] -> [255 36 37 208 156 6 0])
D0331 14:54:00.884116 968535 task_signals.go:470] [ 6: 21] Notified of signal 23
D0331 14:54:00.884178 968535 task_signals.go:220] [ 6: 21] Signal 23: delivering to handler
D0331 14:54:00.884885 968535 client.go:400] send [channel 0xc00025e1b0] WalkReq{DirFD: 1, Path: [, dev]}
D0331 14:54:00.885075 968535 client.go:400] recv [channel 0xc00025e1b0] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13639659, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-31 14:39:19.175275936 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-31 14:39:22.767272484 +0000 UTC, Mtime: 2023-03-31 14:39:22.767272484 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]}
D0331 14:54:00.886706 968535 client.go:400] send [channel 0xc00025e1b0] WalkReq{DirFD: 1, Path: [, dev]}
D0331 14:54:00.886800 968535 client.go:400] recv [channel 0xc00025e1b0] WalkStatResp{Stats: [Statx{Mask: 0x7ff, Mode: S_IFDIR|0o777, UID: 0, GID: 0, Ino: 13639659, DevMajor: 8, DevMinor: 16, Size: 4096, Blocks: 8, Blksize: 4096, Nlink: 3, Atime: 2023-03-31 14:39:19.175275936 +0000 UTC, Btime: 1970-01-01 00:00:00 +0000 UTC, Ctime: 2023-03-31 14:39:22.767272484 +0000 UTC, Mtime: 2023-03-31 14:39:22.767272484 +0000 UTC, Attributes: 0, AttributesMask: 0, RdevMajor: 0, RdevMinor: 0}]}
D0331 14:54:00.887302 968535 usertrap_amd64.go:212] [ 27772: 27775] Found the pattern at ip 5572211cf27d:sysno 257
D0331 14:54:00.887333 968535 usertrap_amd64.go:122] [ 27772: 27775] Allocate a new trap: 0xc002437d40 42
D0331 14:54:00.887347 968535 usertrap_amd64.go:225] [ 27772: 27775] Apply the binary patch addr 5572211cf27d trap addr 69d20 ([184 1 1 0 0 15 5] -> [255 36 37 32 157 6 0])
[signal SIGSEGV: segmentation violation code=0x80 addr=0x0 pc=0x44c54c]