I0806 19:57:06.023528 902845 calibrated_clock.go:74] CalibratedClock(Monotonic): ready I0806 19:57:06.023698 902845 calibrated_clock.go:74] CalibratedClock(Realtime): ready D0806 19:57:08.023499 902845 sampler.go:191] Time: Adjusting syscall overhead down to 875 D0806 19:57:14.023711 902845 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0806 19:57:15.023245 902845 sampler.go:191] Time: Adjusting syscall overhead down to 671 D0806 19:57:17.023888 902845 sampler.go:191] Time: Adjusting syscall overhead down to 875 I0806 19:57:24.448943 903318 main.go:180] *************************** I0806 19:57:24.449022 903318 main.go:181] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot exec -user=0:0 -cap CAP_CHOWN -cap CAP_DAC_OVERRIDE -cap CAP_DAC_READ_SEARCH -cap CAP_FOWNER -cap CAP_FSETID -cap CAP_KILL -cap CAP_SETGID -cap CAP_SETUID -cap CAP_SETPCAP -cap CAP_LINUX_IMMUTABLE -cap CAP_NET_BIND_SERVICE -cap CAP_NET_BROADCAST -cap CAP_NET_ADMIN -cap CAP_NET_RAW -cap CAP_IPC_LOCK -cap CAP_IPC_OWNER -cap CAP_SYS_MODULE -cap CAP_SYS_RAWIO -cap CAP_SYS_CHROOT -cap CAP_SYS_PTRACE -cap CAP_SYS_PACCT -cap CAP_SYS_ADMIN -cap CAP_SYS_BOOT -cap CAP_SYS_NICE -cap CAP_SYS_RESOURCE -cap CAP_SYS_TIME -cap CAP_SYS_TTY_CONFIG -cap CAP_MKNOD -cap CAP_LEASE -cap CAP_AUDIT_WRITE -cap CAP_AUDIT_CONTROL -cap CAP_SETFCAP -cap CAP_MAC_OVERRIDE -cap CAP_MAC_ADMIN -cap CAP_SYSLOG -cap CAP_WAKE_ALARM -cap CAP_BLOCK_SUSPEND -cap CAP_AUDIT_READ ci-gvisor-systrap-1-race-1 /syz-executor1714621085] I0806 19:57:24.449165 903318 main.go:182] Version 0.0.0 I0806 19:57:24.449195 903318 main.go:183] GOOS: linux I0806 19:57:24.449212 903318 main.go:184] GOARCH: amd64 I0806 19:57:24.449249 903318 main.go:185] PID: 903318 I0806 19:57:24.449273 903318 main.go:186] UID: 0, GID: 0 I0806 19:57:24.449293 903318 main.go:187] Configuration: I0806 19:57:24.449316 903318 main.go:188] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0806 19:57:24.449333 903318 main.go:189] Platform: systrap I0806 19:57:24.449356 903318 main.go:190] FileAccess: shared I0806 19:57:24.449399 903318 main.go:191] Directfs: true I0806 19:57:24.449435 903318 main.go:192] Overlay: none I0806 19:57:24.449458 903318 main.go:193] Network: sandbox, logging: false I0806 19:57:24.449475 903318 main.go:194] Strace: false, max size: 1024, syscalls: I0806 19:57:24.449499 903318 main.go:195] IOURING: false I0806 19:57:24.449550 903318 main.go:196] Debug: true I0806 19:57:24.449565 903318 main.go:197] Systemd: false I0806 19:57:24.449579 903318 main.go:198] *************************** W0806 19:57:24.449599 903318 main.go:203] Block the TERM signal. This is only safe in tests! D0806 19:57:24.449747 903318 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:false TryLock:false RootContainer:false} D0806 19:57:24.454729 903318 container.go:648] Signal container, cid: ci-gvisor-systrap-1-race-1, signal: signal 0 (0) D0806 19:57:24.454786 903318 sandbox.go:1177] Signal sandbox "ci-gvisor-systrap-1-race-1" D0806 19:57:24.454822 903318 sandbox.go:603] Connecting to sandbox "ci-gvisor-systrap-1-race-1" D0806 19:57:24.455206 903318 urpc.go:568] urpc: successfully marshalled 106 bytes. D0806 19:57:24.455324 902845 urpc.go:611] urpc: unmarshal success. D0806 19:57:24.455674 902845 controller.go:619] containerManager.Signal: cid: ci-gvisor-systrap-1-race-1, PID: 0, signal: 0, mode: Process D0806 19:57:24.455911 902845 urpc.go:568] urpc: successfully marshalled 37 bytes. D0806 19:57:24.456031 903318 urpc.go:611] urpc: unmarshal success. D0806 19:57:24.456100 903318 exec.go:129] Exec arguments: /syz-executor1714621085 D0806 19:57:24.456149 903318 exec.go:130] Exec capabilities: &{PermittedCaps:274877906943 InheritableCaps:274877906943 EffectiveCaps:274877906943 BoundingCaps:274877906943 AmbientCaps:0} D0806 19:57:24.456242 903318 container.go:567] Execute in container, cid: ci-gvisor-systrap-1-race-1, args: /syz-executor1714621085 D0806 19:57:24.456296 903318 sandbox.go:552] Executing new process in container "ci-gvisor-systrap-1-race-1" in sandbox "ci-gvisor-systrap-1-race-1" D0806 19:57:24.456372 903318 sandbox.go:603] Connecting to sandbox "ci-gvisor-systrap-1-race-1" D0806 19:57:24.456982 903318 urpc.go:568] urpc: successfully marshalled 462 bytes. D0806 19:57:24.457172 902845 urpc.go:611] urpc: unmarshal success. D0806 19:57:24.457973 902845 controller.go:368] containerManager.ExecuteAsync, cid: ci-gvisor-systrap-1-race-1, args: /syz-executor1714621085 I0806 19:57:24.458314 902845 kernel.go:845] EXEC: [/syz-executor1714621085] D0806 19:57:24.460164 902845 syscalls.go:262] Allocating stack with size of 8388608 bytes D0806 19:57:24.460890 902845 loader.go:1125] updated processes: map[{ci-gvisor-systrap-1-race-1 0}:0xc000043890 {ci-gvisor-systrap-1-race-1 7}:0xc000818c00] D0806 19:57:24.461062 902845 urpc.go:568] urpc: successfully marshalled 36 bytes. D0806 19:57:24.461138 903318 urpc.go:611] urpc: unmarshal success. D0806 19:57:24.461219 903318 container.go:636] Wait on process 7 in container, cid: ci-gvisor-systrap-1-race-1 D0806 19:57:24.461254 903318 sandbox.go:1131] Waiting for PID 7 in sandbox "ci-gvisor-systrap-1-race-1" D0806 19:57:24.461310 903318 sandbox.go:603] Connecting to sandbox "ci-gvisor-systrap-1-race-1" D0806 19:57:24.461447 903318 urpc.go:568] urpc: successfully marshalled 88 bytes. D0806 19:57:24.461657 902845 urpc.go:611] urpc: unmarshal success. D0806 19:57:24.461869 902845 controller.go:558] containerManager.Wait, cid: ci-gvisor-systrap-1-race-1, pid: 7 D0806 19:57:24.471437 902845 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 562a988a7783:sysno 218 D0806 19:57:24.471568 902845 usertrap_amd64.go:106] [ 7: 7] Map a usertrap vma at 6a000 D0806 19:57:24.471787 902845 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0003fe7e0 1 D0806 19:57:24.471878 902845 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 562a988a7783 trap addr 6a050 ([184 218 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0806 19:57:24.473031 902845 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 562a988a7816:sysno 334 D0806 19:57:24.473091 902845 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0003fe7e0 2 D0806 19:57:24.473192 902845 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 562a988a7816 trap addr 6a0a0 ([184 78 1 0 0 15 5] -> [255 36 37 160 160 6 0]) I0806 19:57:24.473508 902845 compat.go:120] Unsupported syscall rseq(0x562a98931ce0,0x20,0x0,0x53053053,0x0,0x562a988fbc84). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/rseq for more information. D0806 19:57:24.474846 902845 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 562a988b7ba9:sysno 318 D0806 19:57:24.474938 902845 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0003fe7e0 3 D0806 19:57:24.475005 902845 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 562a988b7ba9 trap addr 6a0f0 ([184 62 1 0 0 15 5] -> [255 36 37 240 160 6 0]) D0806 19:57:24.476572 902845 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 562a988a0210:sysno 12 D0806 19:57:24.476648 902845 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0003fe7e0 4 D0806 19:57:24.476720 902845 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 562a988a0210 trap addr 6a140 ([184 12 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0806 19:57:24.479268 902845 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 562a988a0490:sysno 10 D0806 19:57:24.479342 902845 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0003fe7e0 5 D0806 19:57:24.479436 902845 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 562a988a0490 trap addr 6a190 ([184 10 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0806 19:57:24.480567 902845 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 562a9889e3ac:sysno 56 D0806 19:57:24.480614 902845 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0003fe7e0 6 D0806 19:57:24.480658 902845 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 562a9889e3ac trap addr 6a1e0 ([184 56 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0806 19:57:24.511309 902845 usertrap_amd64.go:212] [ 8: 8] Found the pattern at ip 562a9889e3e6:sysno 273 D0806 19:57:24.511416 902845 usertrap_amd64.go:122] [ 8: 8] Allocate a new trap: 0xc00038a9f0 7 D0806 19:57:24.511865 902845 usertrap_amd64.go:225] [ 8: 8] Apply the binary patch addr 562a9889e3e6 trap addr 6a230 ([184 17 1 0 0 15 5] -> [255 36 37 48 162 6 0]) D0806 19:57:24.520906 902845 usertrap_amd64.go:212] [ 8: 8] Found the pattern at ip 562a9889dd6c:sysno 61 D0806 19:57:24.521056 902845 usertrap_amd64.go:122] [ 8: 8] Allocate a new trap: 0xc00038a9f0 8 D0806 19:57:24.521499 902845 usertrap_amd64.go:225] [ 8: 8] Apply the binary patch addr 562a9889dd6c trap addr 6a280 ([184 61 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0806 19:57:24.522960 902845 usertrap_amd64.go:212] [ 8: 8] Found the pattern at ip 562a988ccbfc:sysno 230 D0806 19:57:24.523011 902845 usertrap_amd64.go:122] [ 8: 8] Allocate a new trap: 0xc00038a9f0 9 D0806 19:57:24.523059 902845 usertrap_amd64.go:225] [ 8: 8] Apply the binary patch addr 562a988ccbfc trap addr 6a2d0 ([184 230 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0806 19:57:24.531211 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.531295 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 8 D0806 19:57:24.531414 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a988a1676 trap addr 6a280 ([184 157 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0806 19:57:24.533095 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.533184 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 9 D0806 19:57:24.533276 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a988cce20 trap addr 6a2d0 ([184 109 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0806 19:57:24.533784 902845 usertrap_amd64.go:212] [ 10: 10] Found the pattern at ip 562a9889e3e6:sysno 273 D0806 19:57:24.533942 902845 usertrap_amd64.go:122] [ 10: 10] Allocate a new trap: 0xc0000480c0 7 D0806 19:57:24.534427 902845 usertrap_amd64.go:225] [ 10: 10] Apply the binary patch addr 562a9889e3e6 trap addr 6a230 ([184 17 1 0 0 15 5] -> [255 36 37 48 162 6 0]) D0806 19:57:24.535788 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.535879 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 10 D0806 19:57:24.535961 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a9889f47a trap addr 6a320 ([184 1 1 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.539706 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.539833 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 11 D0806 19:57:24.539937 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a9889f609 trap addr 6a370 ([184 1 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.540489 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.540584 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 12 D0806 19:57:24.540696 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a9889f6d9 trap addr 6a3c0 ([184 3 0 0 0 15 5] -> [255 36 37 192 163 6 0]) executing program D0806 19:57:24.542719 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.543593 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 13 D0806 19:57:24.543786 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a988b7a58 trap addr 6a410 ([184 13 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.544708 902845 usertrap_amd64.go:212] [ 7: 7] Found the pattern at ip 562a988ccbfc:sysno 230 D0806 19:57:24.544813 902845 usertrap_amd64.go:122] [ 7: 7] Allocate a new trap: 0xc0003fe7e0 7 D0806 19:57:24.545132 902845 usertrap_amd64.go:212] [ 11: 11] Found the pattern at ip 562a9889e3e6:sysno 273 D0806 19:57:24.545202 902845 usertrap_amd64.go:122] [ 11: 11] Allocate a new trap: 0xc00028c150 7 D0806 19:57:24.545234 902845 usertrap_amd64.go:225] [ 7: 7] Apply the binary patch addr 562a988ccbfc trap addr 6a230 ([184 230 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0806 19:57:24.545997 902845 usertrap_amd64.go:212] [ 10: 10] Found the pattern at ip 562a9889dd6c:sysno 61 D0806 19:57:24.546088 902845 usertrap_amd64.go:122] [ 10: 10] Allocate a new trap: 0xc0000480c0 8 D0806 19:57:24.546061 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.546156 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 14 D0806 19:57:24.546230 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a9887d2b2 trap addr 6a460 ([184 14 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0806 19:57:24.547510 902845 usertrap_amd64.go:225] [ 10: 10] Apply the binary patch addr 562a9889dd6c trap addr 6a280 ([184 61 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0806 19:57:24.547912 902845 usertrap_amd64.go:225] [ 11: 11] Apply the binary patch addr 562a9889e3e6 trap addr 6a230 ([184 17 1 0 0 15 5] -> [255 36 37 48 162 6 0]) D0806 19:57:24.548771 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.548817 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 15 D0806 19:57:24.548868 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a988a040c trap addr 6a4b0 ([184 9 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.549801 902845 usertrap_amd64.go:212] [ 10: 10] Found the pattern at ip 562a988ccbfc:sysno 230 D0806 19:57:24.549886 902845 usertrap_amd64.go:122] [ 10: 10] Allocate a new trap: 0xc0000480c0 9 D0806 19:57:24.549967 902845 usertrap_amd64.go:225] [ 10: 10] Apply the binary patch addr 562a988ccbfc trap addr 6a2d0 ([184 230 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0806 19:57:24.553592 902845 usertrap_amd64.go:212] [ 12: 12] Found the pattern at ip 562a9889e3e6:sysno 273 D0806 19:57:24.553741 902845 usertrap_amd64.go:122] [ 12: 12] Allocate a new trap: 0xc0009ee000 7 D0806 19:57:24.554358 902845 usertrap_amd64.go:225] [ 12: 12] Apply the binary patch addr 562a9889e3e6 trap addr 6a230 ([184 17 1 0 0 15 5] -> [255 36 37 48 162 6 0]) D0806 19:57:24.557644 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.557734 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 16 D0806 19:57:24.557802 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a988cd172 trap addr 6a500 ([184 179 1 0 0 15 5] -> [255 36 37 0 165 6 0]) I0806 19:57:24.558371 902845 compat.go:120] Unsupported syscall clone3(0x7efe19285a00,0x58,0x562a9887c880,0x8,0x7eec55d9d6c0,0x7efe19285ae7). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/clone3 for more information. D0806 19:57:24.559054 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.559133 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 17 D0806 19:57:24.559225 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a988cd12b trap addr 6a550 ([184 56 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.561738 902845 usertrap_amd64.go:212] [ 11: 11] Found the pattern at ip 562a9889dd6c:sysno 61 D0806 19:57:24.561803 902845 usertrap_amd64.go:122] [ 11: 11] Allocate a new trap: 0xc00028c150 8 D0806 19:57:24.562188 902845 usertrap_amd64.go:225] [ 11: 11] Apply the binary patch addr 562a9889dd6c trap addr 6a280 ([184 61 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0806 19:57:24.561644 902845 usertrap_amd64.go:212] [ 9: 15] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.563866 902845 usertrap_amd64.go:122] [ 9: 15] Allocate a new trap: 0xc000048030 18 D0806 19:57:24.565667 902845 usertrap_amd64.go:212] [ 11: 11] Found the pattern at ip 562a988ccbfc:sysno 230 D0806 19:57:24.565741 902845 usertrap_amd64.go:122] [ 11: 11] Allocate a new trap: 0xc00028c150 9 D0806 19:57:24.565801 902845 usertrap_amd64.go:225] [ 11: 11] Apply the binary patch addr 562a988ccbfc trap addr 6a2d0 ([184 230 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0806 19:57:24.564591 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.571337 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 8 D0806 19:57:24.571540 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a988a1676 trap addr 6a280 ([184 157 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0806 19:57:24.572963 902845 usertrap_amd64.go:225] [ 9: 15] Apply the binary patch addr 562a9887c930 trap addr 6a5a0 ([184 17 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.574608 902845 usertrap_amd64.go:212] [ 9: 9] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.574677 902845 usertrap_amd64.go:122] [ 9: 9] Allocate a new trap: 0xc000048030 19 D0806 19:57:24.574758 902845 usertrap_amd64.go:225] [ 9: 9] Apply the binary patch addr 562a9887d220 trap addr 6a5f0 ([184 14 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.575017 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.575083 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 9 D0806 19:57:24.575156 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a988cce20 trap addr 6a2d0 ([184 109 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0806 19:57:24.576799 902845 usertrap_amd64.go:212] [ 12: 12] Found the pattern at ip 562a9889dd6c:sysno 61 D0806 19:57:24.576877 902845 usertrap_amd64.go:122] [ 12: 12] Allocate a new trap: 0xc0009ee000 8 D0806 19:57:24.576827 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.576988 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 10 D0806 19:57:24.577094 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a9889f47a trap addr 6a320 ([184 1 1 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.577430 902845 usertrap_amd64.go:225] [ 12: 12] Apply the binary patch addr 562a9889dd6c trap addr 6a280 ([184 61 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0806 19:57:24.580203 902845 usertrap_amd64.go:212] [ 12: 12] Found the pattern at ip 562a988ccbfc:sysno 230 D0806 19:57:24.580305 902845 usertrap_amd64.go:122] [ 12: 12] Allocate a new trap: 0xc0009ee000 9 D0806 19:57:24.580392 902845 usertrap_amd64.go:225] [ 12: 12] Apply the binary patch addr 562a988ccbfc trap addr 6a2d0 ([184 230 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0806 19:57:24.580672 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.580753 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 8 D0806 19:57:24.580936 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a988a1676 trap addr 6a280 ([184 157 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0806 19:57:24.581726 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.581773 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 11 D0806 19:57:24.581829 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a9889f609 trap addr 6a370 ([184 1 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.582427 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.582488 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 12 D0806 19:57:24.582561 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a9889f6d9 trap addr 6a3c0 ([184 3 0 0 0 15 5] -> [255 36 37 192 163 6 0]) executing program D0806 19:57:24.582862 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.582920 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 9 D0806 19:57:24.582998 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a988cce20 trap addr 6a2d0 ([184 109 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0806 19:57:24.583764 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.583837 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 13 D0806 19:57:24.583892 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a988b7a58 trap addr 6a410 ([184 13 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.585133 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.585290 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 14 D0806 19:57:24.585397 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a9887d2b2 trap addr 6a460 ([184 14 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0806 19:57:24.585834 902845 usertrap_amd64.go:212] [ 9: 15] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.585893 902845 usertrap_amd64.go:122] [ 9: 15] Allocate a new trap: 0xc000048030 20 D0806 19:57:24.585975 902845 usertrap_amd64.go:225] [ 9: 15] Apply the binary patch addr 562a9889f4f9 trap addr 6a640 ([184 1 1 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.586368 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.586499 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 10 D0806 19:57:24.586599 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a9889f47a trap addr 6a320 ([184 1 1 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.587666 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.587768 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 15 D0806 19:57:24.587906 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a988a040c trap addr 6a4b0 ([184 9 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.588261 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.588374 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 8 D0806 19:57:24.588547 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a988a1676 trap addr 6a280 ([184 157 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0806 19:57:24.589490 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.589540 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 11 D0806 19:57:24.589600 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a9889f609 trap addr 6a370 ([184 1 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.590045 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.590215 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.590655 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 12 D0806 19:57:24.590700 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 9 D0806 19:57:24.590782 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a988cce20 trap addr 6a2d0 ([184 109 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0806 19:57:24.590770 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a9889f6d9 trap addr 6a3c0 ([184 3 0 0 0 15 5] -> [255 36 37 192 163 6 0]) executing program D0806 19:57:24.592893 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.592963 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 13 D0806 19:57:24.593057 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a988b7a58 trap addr 6a410 ([184 13 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.593835 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.593924 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 10 D0806 19:57:24.593997 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a9889f47a trap addr 6a320 ([184 1 1 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.594190 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.594249 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 14 D0806 19:57:24.594320 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a9887d2b2 trap addr 6a460 ([184 14 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0806 19:57:24.595436 902845 task_exit.go:204] [ 9: 9] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.595691 902845 task_signals.go:204] [ 9: 15] Signal 9, PID: 15, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.596970 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.597025 902845 task_exit.go:204] [ 9: 15] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.597066 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 11 D0806 19:57:24.597154 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a9889f609 trap addr 6a370 ([184 1 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.597432 902845 task_exit.go:204] [ 9: 9] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.597572 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.597645 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 16 D0806 19:57:24.597659 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.597710 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a988cd172 trap addr 6a500 ([184 179 1 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.597734 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 15 D0806 19:57:24.597994 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a988a040c trap addr 6a4b0 ([184 9 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.598255 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.598402 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 12 D0806 19:57:24.598556 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a9889f6d9 trap addr 6a3c0 ([184 3 0 0 0 15 5] -> [255 36 37 192 163 6 0]) executing program D0806 19:57:24.599266 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.599336 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 17 D0806 19:57:24.599449 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a988cd12b trap addr 6a550 ([184 56 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.599827 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.599905 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 13 D0806 19:57:24.599996 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a988b7a58 trap addr 6a410 ([184 13 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.600776 902845 usertrap_amd64.go:212] [ 13: 13] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.600920 902845 usertrap_amd64.go:122] [ 13: 13] Allocate a new trap: 0xc0008720c0 18 D0806 19:57:24.601037 902845 usertrap_amd64.go:225] [ 13: 13] Apply the binary patch addr 562a9887d220 trap addr 6a5a0 ([184 14 0 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.601642 902845 task_exit.go:204] [ 9: 15] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.601700 902845 task_exit.go:204] [ 9: 15] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.601768 902845 task_signals.go:443] [ 8: 8] Discarding ignored signal 17 D0806 19:57:24.602784 902845 task_exit.go:204] [ 9: 9] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.602748 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.602955 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 14 D0806 19:57:24.603021 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a9887d2b2 trap addr 6a460 ([184 14 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0806 19:57:24.602821 902845 usertrap_amd64.go:212] [ 13: 17] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.603120 902845 usertrap_amd64.go:122] [ 13: 17] Allocate a new trap: 0xc0008720c0 19 D0806 19:57:24.603203 902845 usertrap_amd64.go:225] [ 13: 17] Apply the binary patch addr 562a9887c930 trap addr 6a5f0 ([184 17 1 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.607660 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.607722 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 16 D0806 19:57:24.607835 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a988cd172 trap addr 6a500 ([184 179 1 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.608389 902845 usertrap_amd64.go:212] [ 13: 17] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.608514 902845 usertrap_amd64.go:122] [ 13: 17] Allocate a new trap: 0xc0008720c0 20 D0806 19:57:24.608600 902845 usertrap_amd64.go:225] [ 13: 17] Apply the binary patch addr 562a9889f4f9 trap addr 6a640 ([184 1 1 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.609303 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.609373 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 15 D0806 19:57:24.609455 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a988a040c trap addr 6a4b0 ([184 9 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.609949 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.610014 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 17 D0806 19:57:24.610111 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a988cd12b trap addr 6a550 ([184 56 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.612577 902845 task_exit.go:204] [ 13: 13] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.612714 902845 task_signals.go:204] [ 13: 17] Signal 13, PID: 17, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.612844 902845 task_exit.go:204] [ 13: 17] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.612968 902845 task_exit.go:204] [ 13: 13] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.614100 902845 usertrap_amd64.go:212] [ 14: 14] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.614165 902845 usertrap_amd64.go:122] [ 14: 14] Allocate a new trap: 0xc000c0c000 18 D0806 19:57:24.614258 902845 usertrap_amd64.go:225] [ 14: 14] Apply the binary patch addr 562a9887d220 trap addr 6a5a0 ([184 14 0 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.616208 902845 task_exit.go:204] [ 13: 17] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.616331 902845 task_exit.go:204] [ 13: 17] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.616436 902845 task_signals.go:443] [ 10: 10] Discarding ignored signal 17 D0806 19:57:24.616569 902845 usertrap_amd64.go:212] [ 14: 19] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.616692 902845 usertrap_amd64.go:122] [ 14: 19] Allocate a new trap: 0xc000c0c000 19 D0806 19:57:24.616776 902845 usertrap_amd64.go:225] [ 14: 19] Apply the binary patch addr 562a9887c930 trap addr 6a5f0 ([184 17 1 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.617071 902845 task_exit.go:204] [ 13: 13] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.617985 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.618055 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 16 D0806 19:57:24.618163 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a988cd172 trap addr 6a500 ([184 179 1 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.618895 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.618979 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 10 D0806 19:57:24.619658 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.619771 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 17 D0806 19:57:24.619634 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.619857 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a988cd12b trap addr 6a550 ([184 56 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.622905 902845 usertrap_amd64.go:212] [ 16: 16] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.622963 902845 usertrap_amd64.go:122] [ 16: 16] Allocate a new trap: 0xc000c0c030 18 D0806 19:57:24.623010 902845 usertrap_amd64.go:225] [ 16: 16] Apply the binary patch addr 562a9887d220 trap addr 6a5a0 ([184 14 0 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.623713 902845 usertrap_amd64.go:212] [ 14: 19] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.623779 902845 usertrap_amd64.go:122] [ 14: 19] Allocate a new trap: 0xc000c0c000 20 D0806 19:57:24.623829 902845 usertrap_amd64.go:225] [ 14: 19] Apply the binary patch addr 562a9889f4f9 trap addr 6a640 ([184 1 1 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.624067 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.624124 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 11 D0806 19:57:24.624208 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.625571 902845 usertrap_amd64.go:212] [ 16: 20] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.625623 902845 usertrap_amd64.go:122] [ 16: 20] Allocate a new trap: 0xc000c0c030 19 D0806 19:57:24.625670 902845 usertrap_amd64.go:225] [ 16: 20] Apply the binary patch addr 562a9887c930 trap addr 6a5f0 ([184 17 1 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.626294 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.626374 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 12 D0806 19:57:24.626445 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.627583 902845 task_exit.go:204] [ 14: 14] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.627863 902845 task_signals.go:204] [ 14: 19] Signal 14, PID: 19, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.627990 902845 task_exit.go:204] [ 14: 19] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.628952 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.629039 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 13 D0806 19:57:24.629135 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.629240 902845 task_exit.go:204] [ 14: 14] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.629354 902845 usertrap_amd64.go:212] [ 16: 20] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.629434 902845 usertrap_amd64.go:122] [ 16: 20] Allocate a new trap: 0xc000c0c030 20 D0806 19:57:24.629517 902845 usertrap_amd64.go:225] [ 16: 20] Apply the binary patch addr 562a9889f4f9 trap addr 6a640 ([184 1 1 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.629704 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.629792 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 14 D0806 19:57:24.629862 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.631747 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.631809 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 15 D0806 19:57:24.631893 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.632263 902845 task_exit.go:204] [ 14: 19] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.632350 902845 task_exit.go:204] [ 14: 19] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.632443 902845 task_signals.go:443] [ 11: 11] Discarding ignored signal 17 D0806 19:57:24.632589 902845 task_signals.go:204] [ 16: 20] Signal 16, PID: 20, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.632662 902845 task_exit.go:204] [ 16: 16] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.632868 902845 task_exit.go:204] [ 16: 20] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.633231 902845 task_exit.go:204] [ 14: 14] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.633342 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.633410 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 16 D0806 19:57:24.633490 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.633493 902845 task_exit.go:204] [ 16: 16] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.635231 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.635230 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.635322 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 10 D0806 19:57:24.635348 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 17 D0806 19:57:24.635422 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.635962 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.636939 902845 task_exit.go:204] [ 16: 20] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.637011 902845 task_exit.go:204] [ 16: 20] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.637091 902845 task_signals.go:443] [ 12: 12] Discarding ignored signal 17 D0806 19:57:24.637905 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.637977 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 11 D0806 19:57:24.638081 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.638668 902845 task_exit.go:204] [ 16: 16] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.640466 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.640526 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 12 D0806 19:57:24.640602 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.641523 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.641596 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 18 D0806 19:57:24.641689 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.643099 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.643169 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 13 D0806 19:57:24.643160 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.643248 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 19 D0806 19:57:24.643236 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.643325 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.643793 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.643865 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 14 D0806 19:57:24.643928 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.644430 902845 usertrap_amd64.go:212] [ 18: 18] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.644508 902845 usertrap_amd64.go:122] [ 18: 18] Allocate a new trap: 0xc000ca2270 20 D0806 19:57:24.644569 902845 usertrap_amd64.go:225] [ 18: 18] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.644729 902845 usertrap_amd64.go:212] [ 18: 23] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.644803 902845 usertrap_amd64.go:122] [ 18: 23] Allocate a new trap: 0xc000ca2270 21 D0806 19:57:24.644863 902845 usertrap_amd64.go:225] [ 18: 23] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.644924 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.645009 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 15 D0806 19:57:24.648106 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.650245 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.651639 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 16 D0806 19:57:24.651728 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.653660 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.653763 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 17 D0806 19:57:24.653859 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.654886 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.655009 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 10 D0806 19:57:24.655441 902845 usertrap_amd64.go:212] [ 18: 23] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.655520 902845 usertrap_amd64.go:122] [ 18: 23] Allocate a new trap: 0xc000ca2270 22 D0806 19:57:24.655537 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.655585 902845 usertrap_amd64.go:225] [ 18: 23] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.657359 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.657444 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 11 D0806 19:57:24.657539 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.658510 902845 task_exit.go:204] [ 18: 18] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.658731 902845 task_signals.go:204] [ 18: 23] Signal 18, PID: 23, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.658839 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.658879 902845 task_exit.go:204] [ 18: 23] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.658960 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 10 D0806 19:57:24.659028 902845 task_exit.go:204] [ 18: 18] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.659421 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.660647 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.660725 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 18 D0806 19:57:24.660747 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.660786 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 12 D0806 19:57:24.660894 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.660791 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.661462 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.661545 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 11 D0806 19:57:24.661668 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.662251 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.662365 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 19 D0806 19:57:24.662471 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.663139 902845 task_exit.go:204] [ 18: 23] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.663224 902845 task_exit.go:204] [ 18: 23] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.663310 902845 task_signals.go:443] [ 8: 8] Discarding ignored signal 17 D0806 19:57:24.663502 902845 task_exit.go:204] [ 18: 18] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.663620 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.663720 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 13 D0806 19:57:24.663800 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.663905 902845 usertrap_amd64.go:212] [ 21: 21] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.663993 902845 usertrap_amd64.go:122] [ 21: 21] Allocate a new trap: 0xc000872690 20 D0806 19:57:24.664091 902845 usertrap_amd64.go:225] [ 21: 21] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.664122 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.664161 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.664213 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 12 D0806 19:57:24.664285 902845 usertrap_amd64.go:212] [ 21: 25] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.664346 902845 usertrap_amd64.go:122] [ 21: 25] Allocate a new trap: 0xc000872690 21 D0806 19:57:24.664296 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.664165 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 14 D0806 19:57:24.664433 902845 usertrap_amd64.go:225] [ 21: 25] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.664492 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.665445 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.665513 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 15 D0806 19:57:24.665562 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.666873 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.666917 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.666949 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 13 D0806 19:57:24.666964 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 16 D0806 19:57:24.667014 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.667067 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.667310 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.667359 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 14 D0806 19:57:24.667442 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.668334 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.668396 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 15 D0806 19:57:24.668458 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.668746 902845 usertrap_amd64.go:212] [ 21: 25] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.668837 902845 usertrap_amd64.go:122] [ 21: 25] Allocate a new trap: 0xc000872690 22 D0806 19:57:24.668925 902845 usertrap_amd64.go:225] [ 21: 25] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.669379 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.669498 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 17 D0806 19:57:24.669635 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.669887 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.669965 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 16 D0806 19:57:24.670033 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.671663 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.671740 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 17 D0806 19:57:24.671842 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.672062 902845 task_exit.go:204] [ 21: 21] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.672429 902845 task_signals.go:204] [ 21: 25] Signal 21, PID: 25, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.672478 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.672502 902845 task_exit.go:204] [ 21: 21] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.672547 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 10 D0806 19:57:24.672651 902845 task_exit.go:204] [ 21: 25] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.673052 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.674947 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.675038 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 11 D0806 19:57:24.675111 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.676555 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.676614 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 18 D0806 19:57:24.676672 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.676919 902845 task_exit.go:204] [ 21: 25] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.676993 902845 task_exit.go:204] [ 21: 25] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.677085 902845 task_signals.go:443] [ 10: 10] Discarding ignored signal 17 D0806 19:57:24.677228 902845 task_exit.go:204] [ 21: 21] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.677890 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.677957 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 12 D0806 19:57:24.678030 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.678223 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.678342 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 18 D0806 19:57:24.678358 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.678468 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.678531 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 19 D0806 19:57:24.678655 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.679595 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.679688 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 19 D0806 19:57:24.679806 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.680332 902845 usertrap_amd64.go:212] [ 22: 22] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.680404 902845 usertrap_amd64.go:122] [ 22: 22] Allocate a new trap: 0xc0009b4060 20 D0806 19:57:24.680495 902845 usertrap_amd64.go:225] [ 22: 22] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.680768 902845 usertrap_amd64.go:212] [ 22: 27] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.680832 902845 usertrap_amd64.go:122] [ 22: 27] Allocate a new trap: 0xc0009b4060 21 D0806 19:57:24.680923 902845 usertrap_amd64.go:225] [ 22: 27] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.681221 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.681291 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 13 D0806 19:57:24.681459 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.681319 902845 usertrap_amd64.go:212] [ 24: 24] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.681555 902845 usertrap_amd64.go:122] [ 24: 24] Allocate a new trap: 0xc0009ee030 20 D0806 19:57:24.681647 902845 usertrap_amd64.go:225] [ 24: 24] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.681825 902845 usertrap_amd64.go:212] [ 24: 29] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.681869 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.681901 902845 usertrap_amd64.go:122] [ 24: 29] Allocate a new trap: 0xc0009ee030 21 D0806 19:57:24.681916 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 14 D0806 19:57:24.682368 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0806 19:57:24.682356 902845 usertrap_amd64.go:225] [ 24: 29] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) executing program D0806 19:57:24.683682 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.683819 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 15 D0806 19:57:24.683928 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.685354 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.685432 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 16 D0806 19:57:24.685501 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.686072 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.686154 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 10 D0806 19:57:24.686710 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.686985 902845 usertrap_amd64.go:212] [ 22: 27] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.687042 902845 usertrap_amd64.go:122] [ 22: 27] Allocate a new trap: 0xc0009b4060 22 D0806 19:57:24.687101 902845 usertrap_amd64.go:225] [ 22: 27] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.687413 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.687491 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 17 D0806 19:57:24.687563 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.688388 902845 usertrap_amd64.go:212] [ 24: 29] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.688466 902845 usertrap_amd64.go:122] [ 24: 29] Allocate a new trap: 0xc0009ee030 22 D0806 19:57:24.688530 902845 usertrap_amd64.go:225] [ 24: 29] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.690714 902845 task_exit.go:204] [ 22: 22] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.691086 902845 task_signals.go:204] [ 22: 27] Signal 22, PID: 27, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.691164 902845 task_exit.go:204] [ 22: 22] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.691338 902845 task_exit.go:204] [ 22: 27] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.691665 902845 task_exit.go:204] [ 24: 24] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.692018 902845 task_exit.go:204] [ 24: 24] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.692015 902845 task_signals.go:204] [ 24: 29] Signal 24, PID: 29, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.692395 902845 task_exit.go:204] [ 24: 29] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.693266 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.693329 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 18 D0806 19:57:24.693407 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.694571 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.694657 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 19 D0806 19:57:24.694779 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.696012 902845 task_exit.go:204] [ 22: 27] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.696139 902845 task_exit.go:204] [ 22: 27] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.696150 902845 usertrap_amd64.go:212] [ 26: 26] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.696215 902845 usertrap_amd64.go:122] [ 26: 26] Allocate a new trap: 0xc0009b4210 20 D0806 19:57:24.696250 902845 task_signals.go:443] [ 11: 11] Discarding ignored signal 17 D0806 19:57:24.696326 902845 usertrap_amd64.go:225] [ 26: 26] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.696465 902845 task_exit.go:204] [ 24: 29] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.696536 902845 task_exit.go:204] [ 24: 29] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.696616 902845 task_signals.go:443] [ 12: 12] Discarding ignored signal 17 D0806 19:57:24.696735 902845 task_exit.go:204] [ 22: 22] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.696791 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.696875 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 11 D0806 19:57:24.696889 902845 usertrap_amd64.go:212] [ 26: 30] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.696949 902845 usertrap_amd64.go:122] [ 26: 30] Allocate a new trap: 0xc0009b4210 21 D0806 19:57:24.696967 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.697031 902845 usertrap_amd64.go:225] [ 26: 30] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.697195 902845 task_exit.go:204] [ 24: 24] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.699330 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.699404 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 12 D0806 19:57:24.699458 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.701556 902845 usertrap_amd64.go:212] [ 26: 30] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.701722 902845 usertrap_amd64.go:122] [ 26: 30] Allocate a new trap: 0xc0009b4210 22 D0806 19:57:24.701859 902845 usertrap_amd64.go:225] [ 26: 30] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.702547 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.702595 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 13 D0806 19:57:24.702644 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.702858 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.702900 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 14 D0806 19:57:24.702941 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.704370 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.704515 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 15 D0806 19:57:24.704691 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.704797 902845 task_exit.go:204] [ 26: 26] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.705122 902845 task_exit.go:204] [ 26: 26] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.705255 902845 task_signals.go:204] [ 26: 30] Signal 26, PID: 30, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.705365 902845 task_exit.go:204] [ 26: 30] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.705766 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.705832 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 10 D0806 19:57:24.706118 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.706182 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 16 D0806 19:57:24.706247 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.706358 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.707979 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.708052 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 17 D0806 19:57:24.708107 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.708200 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 10 D0806 19:57:24.708187 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.708684 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.709653 902845 task_exit.go:204] [ 26: 30] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.709721 902845 task_exit.go:204] [ 26: 30] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.709852 902845 task_signals.go:443] [ 8: 8] Discarding ignored signal 17 D0806 19:57:24.710200 902845 task_exit.go:204] [ 26: 26] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.710764 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.710833 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 11 D0806 19:57:24.710914 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.713995 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.714049 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 12 D0806 19:57:24.714096 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.714151 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 11 D0806 19:57:24.714121 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.714231 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.715987 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.716050 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 18 D0806 19:57:24.716138 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.717340 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.717357 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.717423 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 13 D0806 19:57:24.717445 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 19 D0806 19:57:24.717547 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.717634 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.717836 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.717911 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 14 D0806 19:57:24.717942 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.718013 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 12 D0806 19:57:24.718005 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0806 19:57:24.718135 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) executing program D0806 19:57:24.718680 902845 usertrap_amd64.go:212] [ 28: 28] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.718797 902845 usertrap_amd64.go:122] [ 28: 28] Allocate a new trap: 0xc0009b4420 20 D0806 19:57:24.718820 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.718902 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 10 D0806 19:57:24.718882 902845 usertrap_amd64.go:225] [ 28: 28] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.718968 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.719022 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 15 D0806 19:57:24.719095 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.719433 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.719547 902845 usertrap_amd64.go:212] [ 28: 34] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.719644 902845 usertrap_amd64.go:122] [ 28: 34] Allocate a new trap: 0xc0009b4420 21 D0806 19:57:24.719751 902845 usertrap_amd64.go:225] [ 28: 34] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.720758 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.720885 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 16 D0806 19:57:24.721114 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.721458 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.721531 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 13 D0806 19:57:24.721448 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.721632 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.721671 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 11 D0806 19:57:24.721783 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.721956 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.722017 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 14 D0806 19:57:24.722109 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.723782 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.724051 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 15 D0806 19:57:24.724223 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.724336 902845 usertrap_amd64.go:212] [ 28: 34] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.724425 902845 usertrap_amd64.go:122] [ 28: 34] Allocate a new trap: 0xc0009b4420 22 D0806 19:57:24.724492 902845 usertrap_amd64.go:225] [ 28: 34] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.725320 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.725454 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 12 D0806 19:57:24.725581 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.725749 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.725893 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 16 D0806 19:57:24.725963 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.727352 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.727442 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 17 D0806 19:57:24.727647 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.728591 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.728672 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 13 D0806 19:57:24.728755 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.729234 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.729297 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 17 D0806 19:57:24.729335 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.729391 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 14 D0806 19:57:24.729364 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.729471 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.730858 902845 task_exit.go:204] [ 28: 28] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.730981 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.731033 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 15 D0806 19:57:24.731129 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.731179 902845 task_signals.go:204] [ 28: 34] Signal 28, PID: 34, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.731289 902845 task_exit.go:204] [ 28: 28] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.731384 902845 task_exit.go:204] [ 28: 34] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.732731 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.732853 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 16 D0806 19:57:24.732950 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.735201 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.735278 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 17 D0806 19:57:24.735313 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.735380 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 18 D0806 19:57:24.735426 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.735477 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.735749 902845 task_exit.go:204] [ 28: 34] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.735816 902845 task_exit.go:204] [ 28: 34] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.735917 902845 task_signals.go:443] [ 10: 10] Discarding ignored signal 17 D0806 19:57:24.736124 902845 task_exit.go:204] [ 28: 28] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.736534 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.736610 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 18 D0806 19:57:24.736684 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.736994 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.737107 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 19 D0806 19:57:24.737213 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.738412 902845 usertrap_amd64.go:212] [ 31: 31] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.738522 902845 usertrap_amd64.go:122] [ 31: 31] Allocate a new trap: 0xc000b6e1e0 20 D0806 19:57:24.738633 902845 usertrap_amd64.go:225] [ 31: 31] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.738807 902845 usertrap_amd64.go:212] [ 31: 35] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.738893 902845 usertrap_amd64.go:122] [ 31: 35] Allocate a new trap: 0xc000b6e1e0 21 D0806 19:57:24.738994 902845 usertrap_amd64.go:225] [ 31: 35] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.739281 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.739351 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 19 D0806 19:57:24.739532 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.740790 902845 usertrap_amd64.go:212] [ 32: 32] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.740889 902845 usertrap_amd64.go:122] [ 32: 32] Allocate a new trap: 0xc000ca2360 20 D0806 19:57:24.741200 902845 usertrap_amd64.go:225] [ 32: 32] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.741459 902845 usertrap_amd64.go:212] [ 32: 37] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.741576 902845 usertrap_amd64.go:122] [ 32: 37] Allocate a new trap: 0xc000ca2360 21 D0806 19:57:24.741825 902845 usertrap_amd64.go:225] [ 32: 37] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.743963 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.744044 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 18 D0806 19:57:24.744121 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.745243 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.745299 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 19 D0806 19:57:24.745364 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.749673 902845 usertrap_amd64.go:212] [ 31: 35] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.749978 902845 usertrap_amd64.go:122] [ 31: 35] Allocate a new trap: 0xc000b6e1e0 22 D0806 19:57:24.750206 902845 usertrap_amd64.go:225] [ 31: 35] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.750252 902845 usertrap_amd64.go:212] [ 33: 33] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.750557 902845 usertrap_amd64.go:122] [ 33: 33] Allocate a new trap: 0xc000b6e210 20 D0806 19:57:24.750647 902845 usertrap_amd64.go:225] [ 33: 33] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.750781 902845 usertrap_amd64.go:212] [ 33: 38] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.750873 902845 usertrap_amd64.go:122] [ 33: 38] Allocate a new trap: 0xc000b6e210 21 D0806 19:57:24.750982 902845 usertrap_amd64.go:225] [ 33: 38] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.753255 902845 usertrap_amd64.go:212] [ 32: 37] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.753377 902845 usertrap_amd64.go:122] [ 32: 37] Allocate a new trap: 0xc000ca2360 22 D0806 19:57:24.753489 902845 usertrap_amd64.go:225] [ 32: 37] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.757651 902845 task_exit.go:204] [ 31: 31] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.757818 902845 task_signals.go:204] [ 31: 35] Signal 31, PID: 35, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.757926 902845 task_exit.go:204] [ 31: 35] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.758160 902845 task_exit.go:204] [ 31: 31] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.758957 902845 usertrap_amd64.go:212] [ 33: 38] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.759038 902845 usertrap_amd64.go:122] [ 33: 38] Allocate a new trap: 0xc000b6e210 22 D0806 19:57:24.759116 902845 usertrap_amd64.go:225] [ 33: 38] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.759348 902845 task_exit.go:204] [ 32: 32] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.759751 902845 task_signals.go:204] [ 32: 37] Signal 32, PID: 37, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.759874 902845 task_exit.go:204] [ 32: 37] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.760086 902845 task_exit.go:204] [ 32: 32] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.763030 902845 task_exit.go:204] [ 33: 33] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.763296 902845 task_signals.go:204] [ 33: 38] Signal 33, PID: 38, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.763413 902845 task_exit.go:204] [ 33: 38] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.763532 902845 task_exit.go:204] [ 33: 33] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.764472 902845 task_exit.go:204] [ 31: 35] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.764533 902845 task_exit.go:204] [ 31: 35] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.764620 902845 task_signals.go:443] [ 11: 11] Discarding ignored signal 17 D0806 19:57:24.764739 902845 task_exit.go:204] [ 32: 37] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.764901 902845 task_exit.go:204] [ 32: 37] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.765028 902845 task_signals.go:443] [ 12: 12] Discarding ignored signal 17 D0806 19:57:24.765158 902845 task_exit.go:204] [ 32: 32] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.765811 902845 task_exit.go:204] [ 31: 31] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.766053 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.766162 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 10 D0806 19:57:24.766707 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.769237 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.769304 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 11 D0806 19:57:24.769379 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.772021 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.772204 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 12 D0806 19:57:24.772381 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.775736 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.775887 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 13 D0806 19:57:24.775999 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.776459 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.776564 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 14 D0806 19:57:24.776746 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.778084 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.778173 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 15 D0806 19:57:24.778257 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.779371 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.779431 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 16 D0806 19:57:24.779513 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.781099 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.781194 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 10 D0806 19:57:24.781258 902845 task_exit.go:204] [ 33: 38] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.781323 902845 task_exit.go:204] [ 33: 38] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.781425 902845 task_signals.go:443] [ 8: 8] Discarding ignored signal 17 D0806 19:57:24.781831 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.781873 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.782039 902845 task_exit.go:204] [ 33: 33] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.783517 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.783588 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 11 D0806 19:57:24.783726 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.781890 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 17 D0806 19:57:24.784143 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.787436 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.787488 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 12 D0806 19:57:24.787544 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.790391 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.790443 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 13 D0806 19:57:24.790509 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.790981 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.791058 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 14 D0806 19:57:24.791116 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.792219 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.792342 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 15 D0806 19:57:24.792410 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.792443 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.792465 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.792517 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 10 D0806 19:57:24.792547 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 10 D0806 19:57:24.792628 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.792840 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 18 D0806 19:57:24.792983 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.793111 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.793157 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.794362 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.794384 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.794457 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 16 D0806 19:57:24.794497 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 19 D0806 19:57:24.794539 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.794615 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.795096 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.795156 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 11 D0806 19:57:24.795252 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.795402 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.795594 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 11 D0806 19:57:24.795782 902845 usertrap_amd64.go:212] [ 36: 36] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.795857 902845 usertrap_amd64.go:122] [ 36: 36] Allocate a new trap: 0xc000d928d0 20 D0806 19:57:24.795784 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.795949 902845 usertrap_amd64.go:225] [ 36: 36] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.796100 902845 usertrap_amd64.go:212] [ 36: 42] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.796185 902845 usertrap_amd64.go:122] [ 36: 42] Allocate a new trap: 0xc000d928d0 21 D0806 19:57:24.796259 902845 usertrap_amd64.go:225] [ 36: 42] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.796355 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.796420 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 17 D0806 19:57:24.796498 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.798434 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.798504 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 12 D0806 19:57:24.798565 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.800798 902845 usertrap_amd64.go:212] [ 36: 42] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.800866 902845 usertrap_amd64.go:122] [ 36: 42] Allocate a new trap: 0xc000d928d0 22 D0806 19:57:24.800933 902845 usertrap_amd64.go:225] [ 36: 42] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.801589 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.801654 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 12 D0806 19:57:24.801777 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.802166 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.802266 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 13 D0806 19:57:24.802351 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.802648 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.802709 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 14 D0806 19:57:24.802759 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.803781 902845 task_exit.go:204] [ 36: 36] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.803957 902845 task_signals.go:204] [ 36: 42] Signal 36, PID: 42, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.804085 902845 task_exit.go:204] [ 36: 42] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.804210 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.804241 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.804300 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 18 D0806 19:57:24.804318 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 15 D0806 19:57:24.804477 902845 task_exit.go:204] [ 36: 36] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.804466 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.804600 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.804638 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 13 D0806 19:57:24.804427 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.804735 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.805016 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.805080 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 14 D0806 19:57:24.805145 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.805870 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.806004 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.806074 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 15 D0806 19:57:24.806007 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 19 D0806 19:57:24.806156 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.805940 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.806213 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.806367 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 16 D0806 19:57:24.806462 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.807312 902845 usertrap_amd64.go:212] [ 39: 39] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.807373 902845 usertrap_amd64.go:122] [ 39: 39] Allocate a new trap: 0xc000b6e030 20 D0806 19:57:24.807453 902845 usertrap_amd64.go:225] [ 39: 39] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.807774 902845 task_exit.go:204] [ 36: 42] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.807831 902845 task_exit.go:204] [ 36: 42] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.807914 902845 usertrap_amd64.go:212] [ 39: 43] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.807938 902845 task_signals.go:443] [ 10: 10] Discarding ignored signal 17 D0806 19:57:24.807990 902845 usertrap_amd64.go:122] [ 39: 43] Allocate a new trap: 0xc000b6e030 21 D0806 19:57:24.808057 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.808072 902845 usertrap_amd64.go:225] [ 39: 43] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.808113 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 17 D0806 19:57:24.808164 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.808083 902845 task_exit.go:204] [ 36: 36] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.808643 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.808695 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 16 D0806 19:57:24.808788 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.810344 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.810441 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 17 D0806 19:57:24.810517 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.813729 902845 usertrap_amd64.go:212] [ 39: 43] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.813821 902845 usertrap_amd64.go:122] [ 39: 43] Allocate a new trap: 0xc000b6e030 22 D0806 19:57:24.813899 902845 usertrap_amd64.go:225] [ 39: 43] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.815527 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.815642 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 18 D0806 19:57:24.815716 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.816519 902845 task_exit.go:204] [ 39: 39] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.816746 902845 task_signals.go:204] [ 39: 43] Signal 39, PID: 43, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.816870 902845 task_exit.go:204] [ 39: 43] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.817235 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.817227 902845 task_exit.go:204] [ 39: 39] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.817304 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 19 D0806 19:57:24.817313 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.817372 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.817403 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 18 D0806 19:57:24.817510 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.817605 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.817686 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 10 D0806 19:57:24.818212 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.818840 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.819020 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 19 D0806 19:57:24.819211 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.819494 902845 usertrap_amd64.go:212] [ 40: 40] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.819553 902845 usertrap_amd64.go:122] [ 40: 40] Allocate a new trap: 0xc000ca2000 20 D0806 19:57:24.819689 902845 usertrap_amd64.go:225] [ 40: 40] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.819844 902845 usertrap_amd64.go:212] [ 40: 45] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.819944 902845 usertrap_amd64.go:122] [ 40: 45] Allocate a new trap: 0xc000ca2000 21 D0806 19:57:24.820029 902845 usertrap_amd64.go:225] [ 40: 45] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.820554 902845 usertrap_amd64.go:212] [ 41: 41] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.820624 902845 usertrap_amd64.go:122] [ 41: 41] Allocate a new trap: 0xc0009b40f0 20 D0806 19:57:24.820687 902845 usertrap_amd64.go:225] [ 41: 41] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.821390 902845 task_exit.go:204] [ 39: 43] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.821717 902845 task_exit.go:204] [ 39: 43] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.821853 902845 task_signals.go:443] [ 12: 12] Discarding ignored signal 17 D0806 19:57:24.822060 902845 usertrap_amd64.go:212] [ 41: 46] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.822129 902845 usertrap_amd64.go:122] [ 41: 46] Allocate a new trap: 0xc0009b40f0 21 D0806 19:57:24.822226 902845 usertrap_amd64.go:225] [ 41: 46] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.822410 902845 task_exit.go:204] [ 39: 39] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.822726 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.822803 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 11 D0806 19:57:24.822893 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.825951 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.826042 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 12 D0806 19:57:24.826109 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.828248 902845 usertrap_amd64.go:212] [ 41: 46] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.828453 902845 usertrap_amd64.go:122] [ 41: 46] Allocate a new trap: 0xc0009b40f0 22 D0806 19:57:24.828548 902845 usertrap_amd64.go:225] [ 41: 46] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.828867 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.828929 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 13 D0806 19:57:24.828975 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.829243 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.829290 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 14 D0806 19:57:24.829348 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.830625 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.830698 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 15 D0806 19:57:24.830797 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.832108 902845 task_exit.go:204] [ 41: 41] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.832127 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.832199 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 16 D0806 19:57:24.832283 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.832362 902845 task_signals.go:204] [ 41: 46] Signal 41, PID: 46, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.832459 902845 task_exit.go:204] [ 41: 46] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.832951 902845 usertrap_amd64.go:212] [ 40: 45] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.833038 902845 usertrap_amd64.go:122] [ 40: 45] Allocate a new trap: 0xc000ca2000 22 D0806 19:57:24.832955 902845 task_exit.go:204] [ 41: 41] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.833136 902845 usertrap_amd64.go:225] [ 40: 45] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.833842 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.833925 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 17 D0806 19:57:24.833992 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.836311 902845 task_exit.go:204] [ 40: 40] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.837404 902845 task_signals.go:204] [ 40: 45] Signal 40, PID: 45, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.837919 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.838013 902845 task_exit.go:204] [ 40: 45] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.838152 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 10 D0806 19:57:24.838303 902845 task_exit.go:204] [ 40: 40] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.838434 902845 task_exit.go:204] [ 41: 46] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.838498 902845 task_exit.go:204] [ 41: 46] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.838613 902845 task_signals.go:443] [ 11: 11] Discarding ignored signal 17 D0806 19:57:24.838759 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.839424 902845 task_exit.go:204] [ 41: 41] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.840576 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.840655 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 11 D0806 19:57:24.840730 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.841454 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.841663 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 18 D0806 19:57:24.841796 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.841590 902845 task_exit.go:204] [ 40: 45] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.841950 902845 task_exit.go:204] [ 40: 45] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.842059 902845 task_signals.go:443] [ 8: 8] Discarding ignored signal 17 D0806 19:57:24.843027 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.843095 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.843102 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 12 D0806 19:57:24.843147 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 19 D0806 19:57:24.843193 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.843241 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.843812 902845 task_exit.go:204] [ 40: 40] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.844906 902845 usertrap_amd64.go:212] [ 44: 44] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.845022 902845 usertrap_amd64.go:122] [ 44: 44] Allocate a new trap: 0xc00094a5a0 20 D0806 19:57:24.845147 902845 usertrap_amd64.go:225] [ 44: 44] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.846148 902845 usertrap_amd64.go:212] [ 44: 49] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.846388 902845 usertrap_amd64.go:122] [ 44: 49] Allocate a new trap: 0xc00094a5a0 21 D0806 19:57:24.846724 902845 usertrap_amd64.go:225] [ 44: 49] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.847697 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.847831 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 13 D0806 19:57:24.847943 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.848396 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.848577 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 14 D0806 19:57:24.848685 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.850071 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.850261 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 10 D0806 19:57:24.850381 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.850449 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 15 D0806 19:57:24.850514 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.852343 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.852424 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 16 D0806 19:57:24.852508 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.854071 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.854128 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 17 D0806 19:57:24.854222 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.855109 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.856984 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.857138 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 11 D0806 19:57:24.857297 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.857991 902845 usertrap_amd64.go:212] [ 44: 49] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.858050 902845 usertrap_amd64.go:122] [ 44: 49] Allocate a new trap: 0xc00094a5a0 22 D0806 19:57:24.858135 902845 usertrap_amd64.go:225] [ 44: 49] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.860302 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.860405 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 12 D0806 19:57:24.860498 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.861335 902845 task_exit.go:204] [ 44: 44] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.861507 902845 task_signals.go:204] [ 44: 49] Signal 44, PID: 49, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.861635 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.861696 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 18 D0806 19:57:24.861825 902845 task_exit.go:204] [ 44: 49] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.861839 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.861917 902845 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.862065 902845 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc000872a20 10 D0806 19:57:24.862155 902845 task_exit.go:204] [ 44: 44] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.862697 902845 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.863355 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.863425 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 13 D0806 19:57:24.863509 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.863858 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.863960 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.864031 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 14 D0806 19:57:24.864101 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0806 19:57:24.863986 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 19 D0806 19:57:24.864434 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) executing program D0806 19:57:24.865655 902845 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.865728 902845 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc000872a20 11 D0806 19:57:24.865826 902845 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0806 19:57:24.866039 902845 task_exit.go:204] [ 44: 49] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.866132 902845 task_exit.go:204] [ 44: 49] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.866253 902845 task_signals.go:443] [ 10: 10] Discarding ignored signal 17 D0806 19:57:24.866540 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.866602 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 15 D0806 19:57:24.866727 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.866851 902845 usertrap_amd64.go:212] [ 47: 47] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.866930 902845 usertrap_amd64.go:122] [ 47: 47] Allocate a new trap: 0xc00028c3c0 20 D0806 19:57:24.867002 902845 usertrap_amd64.go:225] [ 47: 47] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.867130 902845 task_exit.go:204] [ 44: 44] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.867520 902845 usertrap_amd64.go:212] [ 47: 51] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.867580 902845 usertrap_amd64.go:122] [ 47: 51] Allocate a new trap: 0xc00028c3c0 21 D0806 19:57:24.867687 902845 usertrap_amd64.go:225] [ 47: 51] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.868421 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.868498 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 16 D0806 19:57:24.868572 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.870062 902845 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 562a9889f47a:sysno 257 D0806 19:57:24.870149 902845 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc000872a20 12 D0806 19:57:24.870210 902845 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 562a9889f47a trap addr 6a3c0 ([184 1 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0806 19:57:24.871109 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.871188 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 17 D0806 19:57:24.871269 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.872460 902845 usertrap_amd64.go:212] [ 47: 51] Found the pattern at ip 562a9889f4f9:sysno 257 D0806 19:57:24.872535 902845 usertrap_amd64.go:122] [ 47: 51] Allocate a new trap: 0xc00028c3c0 22 D0806 19:57:24.872640 902845 usertrap_amd64.go:225] [ 47: 51] Apply the binary patch addr 562a9889f4f9 trap addr 6a6e0 ([184 1 1 0 0 15 5] -> [255 36 37 224 166 6 0]) D0806 19:57:24.874056 902845 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 562a9889f609:sysno 1 D0806 19:57:24.874182 902845 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc000872a20 13 D0806 19:57:24.874371 902845 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 562a9889f609 trap addr 6a410 ([184 1 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0806 19:57:24.874778 902845 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 562a9889f6d9:sysno 3 D0806 19:57:24.874848 902845 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc000872a20 14 D0806 19:57:24.874963 902845 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 562a9889f6d9 trap addr 6a460 ([184 3 0 0 0 15 5] -> [255 36 37 96 164 6 0]) executing program D0806 19:57:24.876068 902845 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 562a988b7a58:sysno 13 D0806 19:57:24.876140 902845 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc000872a20 15 D0806 19:57:24.876143 902845 task_exit.go:204] [ 47: 47] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.876232 902845 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 562a988b7a58 trap addr 6a4b0 ([184 13 0 0 0 15 5] -> [255 36 37 176 164 6 0]) D0806 19:57:24.876432 902845 task_signals.go:204] [ 47: 51] Signal 47, PID: 51, TID: 0, fault addr: 0x9: terminating thread group D0806 19:57:24.876580 902845 task_exit.go:204] [ 47: 51] Transitioning from exit state TaskExitNone to TaskExitInitiated D0806 19:57:24.877049 902845 task_exit.go:204] [ 47: 51] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0806 19:57:24.877168 902845 task_exit.go:204] [ 47: 51] Transitioning from exit state TaskExitZombie to TaskExitDead D0806 19:57:24.877759 902845 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 562a9887d2b2:sysno 14 D0806 19:57:24.877920 902845 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc000872a20 16 D0806 19:57:24.878044 902845 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 562a9887d2b2 trap addr 6a500 ([184 14 0 0 0 15 5] -> [255 36 37 0 165 6 0]) D0806 19:57:24.893985 902845 usertrap_amd64.go:212] [ 52: 52] Found the pattern at ip 562a988a1676:sysno 157 D0806 19:57:24.894119 902845 usertrap_amd64.go:122] [ 52: 52] Allocate a new trap: 0xc000ca26c0 10 D0806 19:57:24.894597 902845 usertrap_amd64.go:225] [ 52: 52] Apply the binary patch addr 562a988a1676 trap addr 6a320 ([184 157 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0806 19:57:24.894899 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a988cd172:sysno 435 D0806 19:57:24.895081 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 18 D0806 19:57:24.895165 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a988cd172 trap addr 6a5a0 ([184 179 1 0 0 15 5] -> [255 36 37 160 165 6 0]) D0806 19:57:24.895548 902845 usertrap_amd64.go:212] [ 50: 50] Found the pattern at ip 562a988a040c:sysno 9 D0806 19:57:24.895740 902845 usertrap_amd64.go:122] [ 50: 50] Allocate a new trap: 0xc000872a20 17 D0806 19:57:24.896561 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a988cd12b:sysno 56 D0806 19:57:24.897292 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 19 D0806 19:57:24.897308 902845 usertrap_amd64.go:225] [ 50: 50] Apply the binary patch addr 562a988a040c trap addr 6a550 ([184 9 0 0 0 15 5] -> [255 36 37 80 165 6 0]) D0806 19:57:24.897388 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a988cd12b trap addr 6a5f0 ([184 56 0 0 0 15 5] -> [255 36 37 240 165 6 0]) D0806 19:57:24.898982 902845 usertrap_amd64.go:212] [ 48: 48] Found the pattern at ip 562a9887d220:sysno 14 D0806 19:57:24.899065 902845 usertrap_amd64.go:122] [ 48: 48] Allocate a new trap: 0xc00028c510 20 D0806 19:57:24.899137 902845 usertrap_amd64.go:225] [ 48: 48] Apply the binary patch addr 562a9887d220 trap addr 6a640 ([184 14 0 0 0 15 5] -> [255 36 37 64 166 6 0]) D0806 19:57:24.899679 902845 usertrap_amd64.go:212] [ 48: 53] Found the pattern at ip 562a9887c930:sysno 273 D0806 19:57:24.900182 902845 usertrap_amd64.go:212] [ 52: 52] Found the pattern at ip 562a988cce20:sysno 109 D0806 19:57:24.899800 902845 usertrap_amd64.go:122] [ 48: 53] Allocate a new trap: 0xc00028c510 21 D0806 19:57:24.900244 902845 usertrap_amd64.go:122] [ 52: 52] Allocate a new trap: 0xc000ca26c0 11 D0806 19:57:24.901990 902845 usertrap_amd64.go:225] [ 48: 53] Apply the binary patch addr 562a9887c930 trap addr 6a690 ([184 17 1 0 0 15 5] -> [255 36 37 144 166 6 0]) D0806 19:57:24.902122 902845 usertrap_amd64.go:225] [ 52: 52] Apply the binary patch addr 562a988cce20 trap addr 6a370 ([184 109 0 0 0 15 5] -> [255 36 37 112 163 6 0]) panic: nested locking: kernfs.filesystemRWMutex: goroutine 939 [running]: gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*filesystemRWMutex).Lock(0xc00038ddb0) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/fsimpl/kernfs/filesystem_mutex.go:31 +0x45 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).Release(0xc00038dd60, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/kernfs/filesystem.go:262 +0x6e gvisor.dev/gvisor/pkg/sentry/fsimpl/mqfs.(*filesystem).Release(0xc00038dd60, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/mqfs/mqfs.go:83 +0x8e gvisor.dev/gvisor/pkg/sentry/vfs.(*Filesystem).DecRef.func1() pkg/sentry/vfs/filesystem.go:81 +0x108 gvisor.dev/gvisor/pkg/sentry/vfs.(*FilesystemRefs).DecRef(0xc00038dd60, 0xc000be7568) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/vfs/filesystem_refs.go:132 +0x5f gvisor.dev/gvisor/pkg/sentry/vfs.(*Filesystem).DecRef(0xc00038dd60, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/filesystem.go:77 +0x6f gvisor.dev/gvisor/pkg/sentry/vfs.(*Mount).destroy(0xc00074fd80, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/mount.go:690 +0x1c5 gvisor.dev/gvisor/pkg/sentry/vfs.(*Mount).DecRef(0xc00074fd80, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/mount.go:674 +0x7a gvisor.dev/gvisor/pkg/sentry/fsimpl/mqfs.(*RegistryImpl).Destroy(0xc000449c68, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/mqfs/registry.go:137 +0x7d gvisor.dev/gvisor/pkg/sentry/kernel/mq.(*Registry).Destroy(0xc000f62020, {0x84cce0, 0xc000fc8000}) pkg/sentry/kernel/mq/mq.go:246 +0xce gvisor.dev/gvisor/pkg/sentry/kernel.(*IPCNamespace).Destroy(0xc000a579b0, {0x84cce0, 0xc000fc8000}) pkg/sentry/kernel/ipc_namespace.go:73 +0xa5 gvisor.dev/gvisor/pkg/sentry/fsimpl/nsfs.(*Inode).DecRef.func1() pkg/sentry/fsimpl/nsfs/nsfs.go:96 +0x75 gvisor.dev/gvisor/pkg/sentry/fsimpl/nsfs.(*inodeRefs).DecRef(0xc000f47560, 0xc000be77b8) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/fsimpl/nsfs/inode_refs.go:132 +0x5f gvisor.dev/gvisor/pkg/sentry/fsimpl/nsfs.(*Inode).DecRef(0xc000f47500, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/nsfs/nsfs.go:96 +0x73 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Dentry).destroy(0xc000c5ad80, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/kernfs/kernfs.go:447 +0x96 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Dentry).cacheLocked(0xc000c5ad80, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/kernfs/kernfs.go:360 +0x5cb gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Dentry).DecRef(0xc000c5ad80, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/kernfs/kernfs.go:296 +0x146 gvisor.dev/gvisor/pkg/sentry/vfs.(*Dentry).DecRef(...) pkg/sentry/vfs/dentry.go:156 gvisor.dev/gvisor/pkg/sentry/vfs.VirtualDentry.DecRef({0xc000206380?, 0xc000c5ad80?}, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/vfs.go:1014 +0x78 gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescription).DecRef.func1() pkg/sentry/vfs/file_description.go:201 +0x43b gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescriptionRefs).DecRef(0xc000207708, 0xc000be7b10) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/vfs/file_description_refs.go:132 +0x5f gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescription).DecRef(0xc000207708, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/file_description.go:161 +0x6f gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTable).drop(0xc000c40fd0?, {0x84cce0, 0xc000fc8000}, 0xc000207708) pkg/sentry/kernel/fd_table.go:137 +0x1d5 gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTable).RemoveIf(0xc000c40fc0, {0x84cce0, 0xc000fc8000}, 0x5713b0) pkg/sentry/kernel/fd_table.go:502 +0x139 gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTable).DecRef.func1() pkg/sentry/kernel/fd_table.go:152 +0x54 gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTableRefs).DecRef(0xc000c40fc0, 0xc000be7d28) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/kernel/fd_table_refs.go:132 +0x5f gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTable).DecRef(0xc000c40fc0, {0x84cce0, 0xc000fc8000}) pkg/sentry/kernel/fd_table.go:151 +0x6f gvisor.dev/gvisor/pkg/sentry/kernel.(*runExitMain).execute(0xc000fc8000, 0xc000fc8000) pkg/sentry/kernel/task_exit.go:281 +0x797 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000fc8000, 0x2f) pkg/sentry/kernel/task_run.go:98 +0x41b created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:389 +0x1ad goroutine 939 [running]: panic({0x2b7f80, 0xc000eb6000}) GOROOT/src/runtime/panic.go:987 +0x3bb fp=0xc000be72f0 sp=0xc000be7230 pc=0x1318c7b gvisor.dev/gvisor/pkg/sync/locking.AddGLock(0xc000242ab0, 0xffffffffffffffff) pkg/sync/locking/lockdep.go:136 +0x434 fp=0xc000be7418 sp=0xc000be72f0 pc=0x17e0274 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*filesystemRWMutex).Lock(0xc00038ddb0) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/fsimpl/kernfs/filesystem_mutex.go:31 +0x45 fp=0xc000be7438 sp=0xc000be7418 pc=0x1928c45 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Filesystem).Release(0xc00038dd60, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/kernfs/filesystem.go:262 +0x6e fp=0xc000be7470 sp=0xc000be7438 pc=0x191c8ee gvisor.dev/gvisor/pkg/sentry/fsimpl/mqfs.(*filesystem).Release(0xc00038dd60, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/mqfs/mqfs.go:83 +0x8e fp=0xc000be74a0 sp=0xc000be7470 pc=0x19555ee gvisor.dev/gvisor/pkg/sentry/vfs.(*Filesystem).DecRef.func1() pkg/sentry/vfs/filesystem.go:81 +0x108 fp=0xc000be74f0 sp=0xc000be74a0 pc=0x18602a8 gvisor.dev/gvisor/pkg/sentry/vfs.(*FilesystemRefs).DecRef(0xc00038dd60, 0xc000be7568) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/vfs/filesystem_refs.go:132 +0x5f fp=0xc000be7558 sp=0xc000be74f0 pc=0x1860b3f gvisor.dev/gvisor/pkg/sentry/vfs.(*Filesystem).DecRef(0xc00038dd60, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/filesystem.go:77 +0x6f fp=0xc000be7598 sp=0xc000be7558 pc=0x186014f gvisor.dev/gvisor/pkg/sentry/vfs.(*Mount).destroy(0xc00074fd80, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/mount.go:690 +0x1c5 fp=0xc000be7600 sp=0xc000be7598 pc=0x186bb05 gvisor.dev/gvisor/pkg/sentry/vfs.(*Mount).DecRef(0xc00074fd80, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/mount.go:674 +0x7a fp=0xc000be7628 sp=0xc000be7600 pc=0x186b8fa gvisor.dev/gvisor/pkg/sentry/fsimpl/mqfs.(*RegistryImpl).Destroy(0xc000449c68, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/mqfs/registry.go:137 +0x7d fp=0xc000be7650 sp=0xc000be7628 pc=0x195753d gvisor.dev/gvisor/pkg/sentry/kernel/mq.(*Registry).Destroy(0xc000f62020, {0x84cce0, 0xc000fc8000}) pkg/sentry/kernel/mq/mq.go:246 +0xce fp=0xc000be76d0 sp=0xc000be7650 pc=0x194da2e gvisor.dev/gvisor/pkg/sentry/kernel.(*IPCNamespace).Destroy(0xc000a579b0, {0x84cce0, 0xc000fc8000}) pkg/sentry/kernel/ipc_namespace.go:73 +0xa5 fp=0xc000be7700 sp=0xc000be76d0 pc=0x1b51085 gvisor.dev/gvisor/pkg/sentry/fsimpl/nsfs.(*Inode).DecRef.func1() pkg/sentry/fsimpl/nsfs/nsfs.go:96 +0x75 fp=0xc000be7740 sp=0xc000be7700 pc=0x1962815 gvisor.dev/gvisor/pkg/sentry/fsimpl/nsfs.(*inodeRefs).DecRef(0xc000f47560, 0xc000be77b8) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/fsimpl/nsfs/inode_refs.go:132 +0x5f fp=0xc000be77a8 sp=0xc000be7740 pc=0x196229f gvisor.dev/gvisor/pkg/sentry/fsimpl/nsfs.(*Inode).DecRef(0xc000f47500, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/nsfs/nsfs.go:96 +0x73 fp=0xc000be77e8 sp=0xc000be77a8 pc=0x1962753 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Dentry).destroy(0xc000c5ad80, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/kernfs/kernfs.go:447 +0x96 fp=0xc000be7818 sp=0xc000be77e8 pc=0x192f336 gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Dentry).cacheLocked(0xc000c5ad80, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/kernfs/kernfs.go:360 +0x5cb fp=0xc000be78a8 sp=0xc000be7818 pc=0x192ed0b gvisor.dev/gvisor/pkg/sentry/fsimpl/kernfs.(*Dentry).DecRef(0xc000c5ad80, {0x84cce0, 0xc000fc8000}) pkg/sentry/fsimpl/kernfs/kernfs.go:296 +0x146 fp=0xc000be7930 sp=0xc000be78a8 pc=0x192e566 gvisor.dev/gvisor/pkg/sentry/vfs.(*Dentry).DecRef(...) pkg/sentry/vfs/dentry.go:156 gvisor.dev/gvisor/pkg/sentry/vfs.VirtualDentry.DecRef({0xc000206380?, 0xc000c5ad80?}, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/vfs.go:1014 +0x78 fp=0xc000be7968 sp=0xc000be7930 pc=0x18843b8 gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescription).DecRef.func1() pkg/sentry/vfs/file_description.go:201 +0x43b fp=0xc000be7a98 sp=0xc000be7968 pc=0x18566fb gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescriptionRefs).DecRef(0xc000207708, 0xc000be7b10) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/vfs/file_description_refs.go:132 +0x5f fp=0xc000be7b00 sp=0xc000be7a98 pc=0x185fbff gvisor.dev/gvisor/pkg/sentry/vfs.(*FileDescription).DecRef(0xc000207708, {0x84cce0, 0xc000fc8000}) pkg/sentry/vfs/file_description.go:161 +0x6f fp=0xc000be7b40 sp=0xc000be7b00 pc=0x185626f gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTable).drop(0xc000c40fd0?, {0x84cce0, 0xc000fc8000}, 0xc000207708) pkg/sentry/kernel/fd_table.go:137 +0x1d5 fp=0xc000be7bd8 sp=0xc000be7b40 pc=0x1b49bf5 gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTable).RemoveIf(0xc000c40fc0, {0x84cce0, 0xc000fc8000}, 0x5713b0) pkg/sentry/kernel/fd_table.go:502 +0x139 fp=0xc000be7c68 sp=0xc000be7bd8 pc=0x1b4cfb9 gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTable).DecRef.func1() pkg/sentry/kernel/fd_table.go:152 +0x54 fp=0xc000be7cb0 sp=0xc000be7c68 pc=0x1b49ed4 gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTableRefs).DecRef(0xc000c40fc0, 0xc000be7d28) bazel-out/k8-fastbuild-ST-3dcbe13c9b87/bin/pkg/sentry/kernel/fd_table_refs.go:132 +0x5f fp=0xc000be7d18 sp=0xc000be7cb0 pc=0x1b4e13f gvisor.dev/gvisor/pkg/sentry/kernel.(*FDTable).DecRef(0xc000c40fc0, {0x84cce0, 0xc000fc8000}) pkg/sentry/kernel/fd_table.go:151 +0x6f fp=0xc000be7d58 sp=0xc000be7d18 pc=0x1b49e2f gvisor.dev/gvisor/pkg/sentry/kernel.(*runExitMain).execute(0xc000fc8000, 0xc000fc8000) pkg/sentry/kernel/task_exit.go:281 +0x797 fp=0xc000be7e70 sp=0xc000be7d58 pc=0x1b96d37 gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).run(0xc000fc8000, 0x2f) pkg/sentry/kernel/task_run.go:98 +0x41b fp=0xc000be7fb0 sp=0xc000be7e70 pc=0x1ba809b gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start.func1() pkg/sentry/kernel/task_start.go:389 +0x48 fp=0xc000be7fe0 sp=0xc000be7fb0 pc=0x1bbc968 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000be7fe8 sp=0xc000be7fe0 pc=0x1351c01 created by gvisor.dev/gvisor/pkg/sentry/kernel.(*Task).Start pkg/sentry/kernel/task_start.go:389 +0x1ad goroutine 1 [semacquire]: runtime.gopark(0xc0005751c8?, 0x3?, 0xa0?, 0x22?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000953170 sp=0xc000953150 pc=0x131beb6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.semacquire1(0xc00046e2e0, 0xd8?, 0x1, 0x0, 0x1?) GOROOT/src/runtime/sema.go:160 +0x20f fp=0xc0009531d8 sp=0xc000953170 pc=0x132ed6f sync.runtime_Semacquire(0xc00046e2e0?) GOROOT/src/runtime/sema.go:62 +0x27 fp=0xc000953210 sp=0xc0009531d8 pc=0x134d1e7 sync.(*WaitGroup).Wait(0xc00046e2d8) GOROOT/src/sync/waitgroup.go:116 +0xa5 fp=0xc000953240 sp=0xc000953210 pc=0x1365645 gvisor.dev/gvisor/pkg/sentry/kernel.(*Kernel).WaitExited(...) pkg/sentry/kernel/kernel.go:1163 gvisor.dev/gvisor/runsc/boot.(*Loader).WaitExit(0xc000040800) runsc/boot/loader.go:1207 +0x65 fp=0xc000953268 sp=0xc000953240 pc=0x234a105 gvisor.dev/gvisor/runsc/cmd.(*Boot).Execute(0xc00024db80, {0xc000040310?, 0xf?}, 0xc000469e00, {0xc00046d060, 0x2, 0xc0000061a0?}) runsc/cmd/boot.go:469 +0x25d6 fp=0xc000953ba0 sp=0xc000953268 pc=0x26d2036 github.com/google/subcommands.(*Commander).Execute(0xc000206000, {0x83f948, 0xc000044058}, {0xc00046d060, 0x2, 0x2}) external/com_github_google_subcommands/subcommands.go:200 +0x722 fp=0xc000953cb8 sp=0xc000953ba0 pc=0x145bd22 github.com/google/subcommands.Execute(...) external/com_github_google_subcommands/subcommands.go:481 gvisor.dev/gvisor/runsc/cli.Main() runsc/cli/main.go:210 +0x2050 fp=0xc000953f68 sp=0xc000953cb8 pc=0x2718830 main.main() runsc/main.go:31 +0x25 fp=0xc000953f80 sp=0xc000953f68 pc=0x2719905 runtime.main() GOROOT/src/runtime/proc.go:250 +0x207 fp=0xc000953fe0 sp=0xc000953f80 pc=0x131ba67 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000953fe8 sp=0xc000953fe0 pc=0x1351c01 goroutine 2 [force gc (idle)]: runtime.gopark(0x28a6180?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001347b0 sp=0xc000134790 pc=0x131beb6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.forcegchelper() GOROOT/src/runtime/proc.go:305 +0xb0 fp=0xc0001347e0 sp=0xc0001347b0 pc=0x131bcf0 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001347e8 sp=0xc0001347e0 pc=0x1351c01 created by runtime.init.6 GOROOT/src/runtime/proc.go:293 +0x25 goroutine 3 [runnable]: runtime.goschedIfBusy() GOROOT/src/runtime/proc.go:344 +0x30 fp=0xc000148f80 sp=0xc000148f68 pc=0x131bdb0 runtime.bgsweep(0x0?) GOROOT/src/runtime/mgcsweep.go:303 +0x151 fp=0xc000148fc8 sp=0xc000148f80 pc=0x1306391 runtime.gcenable.func1() GOROOT/src/runtime/mgc.go:178 +0x26 fp=0xc000148fe0 sp=0xc000148fc8 pc=0x12fb4e6 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000148fe8 sp=0xc000148fe0 pc=0x1351c01 created by runtime.gcenable GOROOT/src/runtime/mgc.go:178 +0x6b goroutine 4 [GC scavenge wait]: runtime.gopark(0x75ced04e5c6da?, 0xca8a45?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000142f70 sp=0xc000142f50 pc=0x131beb6 runtime.goparkunlock(...) GOROOT/src/runtime/proc.go:387 runtime.(*scavengerState).park(0x28a5460) GOROOT/src/runtime/mgcscavenge.go:400 +0x53 fp=0xc000142fa0 sp=0xc000142f70 pc=0x1304213 runtime.bgscavenge(0x0?) GOROOT/src/runtime/mgcscavenge.go:633 +0x65 fp=0xc000142fc8 sp=0xc000142fa0 pc=0x13047e5 runtime.gcenable.func2() GOROOT/src/runtime/mgc.go:179 +0x26 fp=0xc000142fe0 sp=0xc000142fc8 pc=0x12fb486 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000142fe8 sp=0xc000142fe0 pc=0x1351c01 created by runtime.gcenable GOROOT/src/runtime/mgc.go:179 +0xaa goroutine 5 [finalizer wait]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000284e28 sp=0xc000284e08 pc=0x131beb6 runtime.runfinq() GOROOT/src/runtime/mfinal.go:193 +0x13d fp=0xc000284fe0 sp=0xc000284e28 pc=0x12fa49d runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000284fe8 sp=0xc000284fe0 pc=0x1351c01 created by runtime.createfing GOROOT/src/runtime/mfinal.go:163 +0x45 goroutine 6 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000283f50 sp=0xc000283f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000283fe0 sp=0xc000283f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000283fe8 sp=0xc000283fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 18 [GC worker (idle)]: runtime.gopark(0xc00015e000?, 0x825770?, 0x1?, 0x0?, 0x13062ab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000282f50 sp=0xc000282f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000282fe0 sp=0xc000282f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000282fe8 sp=0xc000282fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 19 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000281f50 sp=0xc000281f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000281fe0 sp=0xc000281f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000281fe8 sp=0xc000281fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 34 [GC worker (idle)]: runtime.gopark(0x12ef907?, 0x48?, 0x40?, 0x4e?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000280f50 sp=0xc000280f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000280fe0 sp=0xc000280f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000280fe8 sp=0xc000280fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 7 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000295f50 sp=0xc000295f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000295fe0 sp=0xc000295f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000295fe8 sp=0xc000295fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 20 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000294f50 sp=0xc000294f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000294fe0 sp=0xc000294f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000294fe8 sp=0xc000294fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 21 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000293f50 sp=0xc000293f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000293fe0 sp=0xc000293f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000293fe8 sp=0xc000293fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 35 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000292f50 sp=0xc000292f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000292fe0 sp=0xc000292f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000292fe8 sp=0xc000292fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 8 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000291f50 sp=0xc000291f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000291fe0 sp=0xc000291f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000291fe8 sp=0xc000291fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 22 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000290f50 sp=0xc000290f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000290fe0 sp=0xc000290f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000290fe8 sp=0xc000290fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 9 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00028ff50 sp=0xc00028ff30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00028ffe0 sp=0xc00028ff50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00028ffe8 sp=0xc00028ffe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 36 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00028ef50 sp=0xc00028ef30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00028efe0 sp=0xc00028ef50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00028efe8 sp=0xc00028efe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 10 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a1f50 sp=0xc0001a1f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a1fe0 sp=0xc0001a1f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a1fe8 sp=0xc0001a1fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 37 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a0f50 sp=0xc0001a0f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a0fe0 sp=0xc0001a0f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a0fe8 sp=0xc0001a0fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 23 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019ff50 sp=0xc00019ff30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019ffe0 sp=0xc00019ff50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019ffe8 sp=0xc00019ffe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 11 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019ef50 sp=0xc00019ef30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019efe0 sp=0xc00019ef50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019efe8 sp=0xc00019efe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 38 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019df50 sp=0xc00019df30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019dfe0 sp=0xc00019df50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019dfe8 sp=0xc00019dfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 12 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019cf50 sp=0xc00019cf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019cfe0 sp=0xc00019cf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019cfe8 sp=0xc00019cfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 24 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019bf50 sp=0xc00019bf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019bfe0 sp=0xc00019bf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019bfe8 sp=0xc00019bfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 13 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00019af50 sp=0xc00019af30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00019afe0 sp=0xc00019af50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00019afe8 sp=0xc00019afe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 25 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000199f50 sp=0xc000199f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000199fe0 sp=0xc000199f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000199fe8 sp=0xc000199fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 14 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000198f50 sp=0xc000198f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000198fe0 sp=0xc000198f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000198fe8 sp=0xc000198fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 39 [GC worker (idle)]: runtime.gopark(0x12ef907?, 0x48?, 0x40?, 0x4e?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000197f50 sp=0xc000197f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000197fe0 sp=0xc000197f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000197fe8 sp=0xc000197fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 40 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000196f50 sp=0xc000196f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000196fe0 sp=0xc000196f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000196fe8 sp=0xc000196fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 41 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000195f50 sp=0xc000195f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000195fe0 sp=0xc000195f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000195fe8 sp=0xc000195fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 26 [GC worker (idle)]: runtime.gopark(0xc00015e000?, 0x825770?, 0x1?, 0x0?, 0x13062ab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000194f50 sp=0xc000194f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000194fe0 sp=0xc000194f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000194fe8 sp=0xc000194fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 42 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000193f50 sp=0xc000193f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000193fe0 sp=0xc000193f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000193fe8 sp=0xc000193fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 27 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000192f50 sp=0xc000192f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000192fe0 sp=0xc000192f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000192fe8 sp=0xc000192fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 15 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001abf50 sp=0xc0001abf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001abfe0 sp=0xc0001abf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001abfe8 sp=0xc0001abfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 43 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001aaf50 sp=0xc0001aaf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001aafe0 sp=0xc0001aaf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001aafe8 sp=0xc0001aafe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 28 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a9f50 sp=0xc0001a9f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a9fe0 sp=0xc0001a9f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a9fe8 sp=0xc0001a9fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 16 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a8f50 sp=0xc0001a8f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a8fe0 sp=0xc0001a8f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a8fe8 sp=0xc0001a8fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 29 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a7f50 sp=0xc0001a7f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a7fe0 sp=0xc0001a7f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a7fe8 sp=0xc0001a7fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 30 [GC worker (idle)]: runtime.gopark(0x12ef907?, 0x48?, 0x40?, 0x4e?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a6f50 sp=0xc0001a6f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a6fe0 sp=0xc0001a6f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a6fe8 sp=0xc0001a6fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 31 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a5f50 sp=0xc0001a5f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a5fe0 sp=0xc0001a5f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a5fe8 sp=0xc0001a5fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 44 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001a4f50 sp=0xc0001a4f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001a4fe0 sp=0xc0001a4f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001a4fe8 sp=0xc0001a4fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 32 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001bbf50 sp=0xc0001bbf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bbfe0 sp=0xc0001bbf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bbfe8 sp=0xc0001bbfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 45 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001baf50 sp=0xc0001baf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001bafe0 sp=0xc0001baf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001bafe8 sp=0xc0001bafe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 33 [GC worker (idle)]: runtime.gopark(0xc00015e000?, 0x825770?, 0x1?, 0x0?, 0x13062ab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b9f50 sp=0xc0001b9f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b9fe0 sp=0xc0001b9f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b9fe8 sp=0xc0001b9fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 50 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b8f50 sp=0xc0001b8f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b8fe0 sp=0xc0001b8f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b8fe8 sp=0xc0001b8fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 66 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b7f50 sp=0xc0001b7f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b7fe0 sp=0xc0001b7f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b7fe8 sp=0xc0001b7fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 51 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b6f50 sp=0xc0001b6f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b6fe0 sp=0xc0001b6f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b6fe8 sp=0xc0001b6fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 67 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b5f50 sp=0xc0001b5f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b5fe0 sp=0xc0001b5f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b5fe8 sp=0xc0001b5fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 46 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b4f50 sp=0xc0001b4f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b4fe0 sp=0xc0001b4f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b4fe8 sp=0xc0001b4fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 52 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b3f50 sp=0xc0001b3f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b3fe0 sp=0xc0001b3f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b3fe8 sp=0xc0001b3fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 68 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b2f50 sp=0xc0001b2f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b2fe0 sp=0xc0001b2f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b2fe8 sp=0xc0001b2fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 53 [GC worker (idle)]: runtime.gopark(0x12ef907?, 0x48?, 0x40?, 0x4e?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b1f50 sp=0xc0001b1f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b1fe0 sp=0xc0001b1f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b1fe8 sp=0xc0001b1fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 69 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001b0f50 sp=0xc0001b0f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001b0fe0 sp=0xc0001b0f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001b0fe8 sp=0xc0001b0fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 47 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001aff50 sp=0xc0001aff30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001affe0 sp=0xc0001aff50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001affe8 sp=0xc0001affe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 54 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001aef50 sp=0xc0001aef30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001aefe0 sp=0xc0001aef50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001aefe8 sp=0xc0001aefe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 70 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001adf50 sp=0xc0001adf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001adfe0 sp=0xc0001adf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001adfe8 sp=0xc0001adfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 48 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0001acf50 sp=0xc0001acf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0001acfe0 sp=0xc0001acf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0001acfe8 sp=0xc0001acfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 55 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000551f50 sp=0xc000551f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000551fe0 sp=0xc000551f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000551fe8 sp=0xc000551fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 71 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000550f50 sp=0xc000550f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000550fe0 sp=0xc000550f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000550fe8 sp=0xc000550fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 49 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00054ff50 sp=0xc00054ff30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00054ffe0 sp=0xc00054ff50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00054ffe8 sp=0xc00054ffe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 56 [GC worker (idle)]: runtime.gopark(0xc00015e000?, 0x825770?, 0x1?, 0x0?, 0x13062ab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00054ef50 sp=0xc00054ef30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00054efe0 sp=0xc00054ef50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00054efe8 sp=0xc00054efe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 72 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00054df50 sp=0xc00054df30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00054dfe0 sp=0xc00054df50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00054dfe8 sp=0xc00054dfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 73 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00054cf50 sp=0xc00054cf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00054cfe0 sp=0xc00054cf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00054cfe8 sp=0xc00054cfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 74 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00054bf50 sp=0xc00054bf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00054bfe0 sp=0xc00054bf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00054bfe8 sp=0xc00054bfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 75 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00054af50 sp=0xc00054af30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00054afe0 sp=0xc00054af50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00054afe8 sp=0xc00054afe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 76 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000559f50 sp=0xc000559f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000559fe0 sp=0xc000559f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000559fe8 sp=0xc000559fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 77 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000558f50 sp=0xc000558f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000558fe0 sp=0xc000558f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000558fe8 sp=0xc000558fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 57 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000557f50 sp=0xc000557f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000557fe0 sp=0xc000557f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000557fe8 sp=0xc000557fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 58 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000556f50 sp=0xc000556f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000556fe0 sp=0xc000556f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000556fe8 sp=0xc000556fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 82 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000555f50 sp=0xc000555f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000555fe0 sp=0xc000555f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000555fe8 sp=0xc000555fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 78 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000554f50 sp=0xc000554f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000554fe0 sp=0xc000554f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000554fe8 sp=0xc000554fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 83 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000553f50 sp=0xc000553f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000553fe0 sp=0xc000553f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000553fe8 sp=0xc000553fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 79 [GC worker (idle)]: runtime.gopark(0xc00015e000?, 0x825770?, 0x1?, 0x0?, 0x13062ab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000552f50 sp=0xc000552f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000552fe0 sp=0xc000552f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000552fe8 sp=0xc000552fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 84 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00029ff50 sp=0xc00029ff30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00029ffe0 sp=0xc00029ff50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00029ffe8 sp=0xc00029ffe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 59 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00029ef50 sp=0xc00029ef30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00029efe0 sp=0xc00029ef50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00029efe8 sp=0xc00029efe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 85 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00029df50 sp=0xc00029df30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00029dfe0 sp=0xc00029df50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00029dfe8 sp=0xc00029dfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 60 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00029cf50 sp=0xc00029cf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00029cfe0 sp=0xc00029cf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00029cfe8 sp=0xc00029cfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 80 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00029bf50 sp=0xc00029bf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00029bfe0 sp=0xc00029bf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00029bfe8 sp=0xc00029bfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 86 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc00029af50 sp=0xc00029af30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc00029afe0 sp=0xc00029af50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc00029afe8 sp=0xc00029afe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 61 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000299f50 sp=0xc000299f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000299fe0 sp=0xc000299f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000299fe8 sp=0xc000299fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 81 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000298f50 sp=0xc000298f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000298fe0 sp=0xc000298f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000298fe8 sp=0xc000298fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 87 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002aff50 sp=0xc0002aff30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002affe0 sp=0xc0002aff50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002affe8 sp=0xc0002affe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 62 [GC worker (idle)]: runtime.gopark(0x12ef907?, 0x48?, 0x40?, 0x4e?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002aef50 sp=0xc0002aef30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002aefe0 sp=0xc0002aef50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002aefe8 sp=0xc0002aefe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 88 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002adf50 sp=0xc0002adf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002adfe0 sp=0xc0002adf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002adfe8 sp=0xc0002adfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 63 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002acf50 sp=0xc0002acf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002acfe0 sp=0xc0002acf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002acfe8 sp=0xc0002acfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 64 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002abf50 sp=0xc0002abf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002abfe0 sp=0xc0002abf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002abfe8 sp=0xc0002abfe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 98 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002aaf50 sp=0xc0002aaf30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002aafe0 sp=0xc0002aaf50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002aafe8 sp=0xc0002aafe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 89 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a9f50 sp=0xc0002a9f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a9fe0 sp=0xc0002a9f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a9fe8 sp=0xc0002a9fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 99 [GC worker (idle)]: runtime.gopark(0x0?, 0x0?, 0x0?, 0x0?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a8f50 sp=0xc0002a8f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a8fe0 sp=0xc0002a8f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a8fe8 sp=0xc0002a8fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 90 [GC worker (idle)]: runtime.gopark(0x3815a20?, 0x1?, 0x7c?, 0x60?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a7f50 sp=0xc0002a7f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a7fe0 sp=0xc0002a7f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a7fe8 sp=0xc0002a7fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 100 [GC worker (idle)]: runtime.gopark(0x3815a20?, 0x1?, 0xf6?, 0x14?, 0x1?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a6f50 sp=0xc0002a6f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a6fe0 sp=0xc0002a6f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a6fe8 sp=0xc0002a6fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 65 [GC worker (idle)]: runtime.gopark(0x3815a20?, 0x1?, 0x89?, 0x20?, 0x13062ab?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a5f50 sp=0xc0002a5f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a5fe0 sp=0xc0002a5f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a5fe8 sp=0xc0002a5fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 114 [GC worker (idle)]: runtime.gopark(0x75cf175dc1a12?, 0x1?, 0xf6?, 0xe6?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a4f50 sp=0xc0002a4f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a4fe0 sp=0xc0002a4f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a4fe8 sp=0xc0002a4fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 115 [GC worker (idle)]: runtime.gopark(0x75cf175dbe1fa?, 0x1?, 0x1d?, 0x21?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a3f50 sp=0xc0002a3f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a3fe0 sp=0xc0002a3f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a3fe8 sp=0xc0002a3fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 116 [GC worker (idle)]: runtime.gopark(0x75cf175db279b?, 0x1?, 0x91?, 0x54?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a2f50 sp=0xc0002a2f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a2fe0 sp=0xc0002a2f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a2fe8 sp=0xc0002a2fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 91 [GC worker (idle)]: runtime.gopark(0x3815a20?, 0x1?, 0x1e?, 0xfb?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a1f50 sp=0xc0002a1f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a1fe0 sp=0xc0002a1f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a1fe8 sp=0xc0002a1fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 117 [GC worker (idle)]: runtime.gopark(0x75cf175db7742?, 0x1?, 0x76?, 0xb4?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc0002a0f50 sp=0xc0002a0f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc0002a0fe0 sp=0xc0002a0f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc0002a0fe8 sp=0xc0002a0fe0 pc=0x1351c01 created by runtime.gcBgMarkStartWorkers GOROOT/src/runtime/mgc.go:1199 +0x25 goroutine 92 [GC worker (idle)]: runtime.gopark(0x3815a20?, 0x1?, 0xe2?, 0xa8?, 0x0?) GOROOT/src/runtime/proc.go:381 +0xd6 fp=0xc000569f50 sp=0xc000569f30 pc=0x131beb6 runtime.gcBgMarkWorker() GOROOT/src/runtime/mgc.go:1275 +0xf1 fp=0xc000569fe0 sp=0xc000569f50 pc=0x12fd251 runtime.goexit() src/runtime/asm_amd64.s:1598 +0x1 fp=0xc000569fe8 sp=0xc000569fe0 pc=0x1351c01 VM DIAGNOSIS: I0806 19:57:25.010757 903357 main.go:180] *************************** I0806 19:57:25.010855 903357 main.go:181] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0806 19:57:25.010949 903357 main.go:182] Version 0.0.0 I0806 19:57:25.010990 903357 main.go:183] GOOS: linux I0806 19:57:25.011027 903357 main.go:184] GOARCH: amd64 I0806 19:57:25.011054 903357 main.go:185] PID: 903357 I0806 19:57:25.011088 903357 main.go:186] UID: 0, GID: 0 I0806 19:57:25.011125 903357 main.go:187] Configuration: I0806 19:57:25.011169 903357 main.go:188] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0806 19:57:25.011193 903357 main.go:189] Platform: systrap I0806 19:57:25.011224 903357 main.go:190] FileAccess: shared I0806 19:57:25.011251 903357 main.go:191] Directfs: true I0806 19:57:25.011300 903357 main.go:192] Overlay: none I0806 19:57:25.011338 903357 main.go:193] Network: sandbox, logging: false I0806 19:57:25.011390 903357 main.go:194] Strace: false, max size: 1024, syscalls: I0806 19:57:25.011417 903357 main.go:195] IOURING: false I0806 19:57:25.011461 903357 main.go:196] Debug: true I0806 19:57:25.011493 903357 main.go:197] Systemd: false I0806 19:57:25.011535 903357 main.go:198] *************************** W0806 19:57:25.011575 903357 main.go:203] Block the TERM signal. This is only safe in tests! D0806 19:57:25.011717 903357 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0806 19:57:25.012008 903357 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-1": file does not exist loading container "ci-gvisor-systrap-1-race-1": file does not exist W0806 19:57:25.012292 903357 main.go:224] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/current/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-1"]: exit status 128 I0806 19:57:25.010757 903357 main.go:180] *************************** I0806 19:57:25.010855 903357 main.go:181] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/current/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-1] I0806 19:57:25.010949 903357 main.go:182] Version 0.0.0 I0806 19:57:25.010990 903357 main.go:183] GOOS: linux I0806 19:57:25.011027 903357 main.go:184] GOARCH: amd64 I0806 19:57:25.011054 903357 main.go:185] PID: 903357 I0806 19:57:25.011088 903357 main.go:186] UID: 0, GID: 0 I0806 19:57:25.011125 903357 main.go:187] Configuration: I0806 19:57:25.011169 903357 main.go:188] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root I0806 19:57:25.011193 903357 main.go:189] Platform: systrap I0806 19:57:25.011224 903357 main.go:190] FileAccess: shared I0806 19:57:25.011251 903357 main.go:191] Directfs: true I0806 19:57:25.011300 903357 main.go:192] Overlay: none I0806 19:57:25.011338 903357 main.go:193] Network: sandbox, logging: false I0806 19:57:25.011390 903357 main.go:194] Strace: false, max size: 1024, syscalls: I0806 19:57:25.011417 903357 main.go:195] IOURING: false I0806 19:57:25.011461 903357 main.go:196] Debug: true I0806 19:57:25.011493 903357 main.go:197] Systemd: false I0806 19:57:25.011535 903357 main.go:198] *************************** W0806 19:57:25.011575 903357 main.go:203] Block the TERM signal. This is only safe in tests! D0806 19:57:25.011717 903357 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-1}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0806 19:57:25.012008 903357 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-1": file does not exist loading container "ci-gvisor-systrap-1-race-1": file does not exist W0806 19:57:25.012292 903357 main.go:224] Failure to execute command, err: 1 [1953607.471726] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1953607.480602] RDX: 0000000000000005 RSI: 0000000000003000 RDI: 0000000020000000 [1953607.489506] RBP: 000000c00039bd40 R08: 0000000000000009 R09: 000000000de00000 [1953607.498348] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00039bbd8 [1953607.507303] R13: 000000c000138c00 R14: 000000c00021e340 R15: 00000000000f3c80 [1953607.516165] FS: 00007f43a50896c0 GS: 0000000000000000 [1955096.246583] exe[65331] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052c157f9 cs:33 sp:7fc40ff25ee8 ax:0 si:200006c0 di:ffffffffff600000 [1955097.063389] exe[42491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052c157f9 cs:33 sp:7fc40ff04ee8 ax:0 si:200006c0 di:ffffffffff600000 [1955097.976242] exe[65328] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556052c157f9 cs:33 sp:7fc40fec2ee8 ax:0 si:200006c0 di:ffffffffff600000 [1955247.465760] exe[42435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eae6817f9 cs:33 sp:7f91a7d55858 ax:0 si:556eae6da062 di:ffffffffff600000 [1955247.540092] exe[52913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eae6817f9 cs:33 sp:7f91a7d55858 ax:0 si:556eae6da062 di:ffffffffff600000 [1955247.563871] exe[42440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eae6817f9 cs:33 sp:7f91a7d55858 ax:0 si:556eae6da062 di:ffffffffff600000 [1955248.198451] exe[65329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eae6817f9 cs:33 sp:7f91a7d55858 ax:0 si:556eae6da062 di:ffffffffff600000 [1955248.200772] exe[50899] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556eae6817f9 cs:33 sp:7f91a7d34858 ax:0 si:556eae6da062 di:ffffffffff600000 [1956224.172408] exe[1838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c9a6927f9 cs:33 sp:7fcd1129c858 ax:0 si:562c9a6eb062 di:ffffffffff600000 [1956224.253190] exe[994054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c9a6927f9 cs:33 sp:7fcd1129c858 ax:0 si:562c9a6eb062 di:ffffffffff600000 [1956224.324095] exe[997300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c9a6927f9 cs:33 sp:7fcd1129c858 ax:0 si:562c9a6eb062 di:ffffffffff600000 [1956227.857576] exe[1910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956227.925960] exe[994005] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956227.992639] exe[996931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956228.055838] exe[995623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956228.107852] exe[994158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956228.167546] exe[993992] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956228.255965] exe[1849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.223156] warn_bad_vsyscall: 80 callbacks suppressed [1956229.223159] exe[1964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.283733] exe[999040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.304124] exe[999040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.324327] exe[999040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.346884] exe[1871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.366761] exe[1871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.387502] exe[1871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.408990] exe[1871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.428559] exe[1871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956229.448115] exe[1871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956234.498253] warn_bad_vsyscall: 176 callbacks suppressed [1956234.498256] exe[4329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956234.549292] exe[993941] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956235.355731] exe[4326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956235.414351] exe[994126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956235.470794] exe[996931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956235.521830] exe[1894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956235.586749] exe[996952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad184858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956235.638978] exe[996952] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956235.665424] exe[995771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956235.709087] exe[995671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956239.521103] warn_bad_vsyscall: 267 callbacks suppressed [1956239.521106] exe[995656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d070 di:ffffffffff600000 [1956239.575503] exe[1870] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d070 di:ffffffffff600000 [1956239.683247] exe[995691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956239.747886] exe[49846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956239.822649] exe[995656] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956239.876691] exe[998776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956239.941118] exe[997302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956240.002811] exe[49846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956240.079869] exe[34617] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956240.126588] exe[1925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956245.285824] warn_bad_vsyscall: 210 callbacks suppressed [1956245.285827] exe[999040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956245.377447] exe[1871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956245.470800] exe[999086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956245.550737] exe[1894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956245.601977] exe[326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad184858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956245.649780] exe[995691] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956245.653816] exe[995771] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad184858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956245.796815] exe[1854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956245.886772] exe[1854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad163858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956246.611371] exe[4347] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaabfb47f9 cs:33 sp:7f67ad1a5858 ax:0 si:55aaac00d062 di:ffffffffff600000 [1956777.621351] exe[72405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f220e4d7f9 cs:33 sp:7fedd230dee8 ax:0 si:20002600 di:ffffffffff600000 [1956777.752391] exe[8354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f220e4d7f9 cs:33 sp:7fedd22ecee8 ax:0 si:20002600 di:ffffffffff600000 [1956777.832867] exe[36079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f220e4d7f9 cs:33 sp:7fedd230dee8 ax:0 si:20002600 di:ffffffffff600000 [1956997.426025] exe[994515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1956997.487188] exe[996680] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1956997.532610] exe[995803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1956997.556655] exe[1838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1956997.579276] exe[1838] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1956997.601147] exe[326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1956997.625826] exe[998777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1956997.648452] exe[995671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1956997.669104] exe[995671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1956997.692497] exe[997262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1d3ace3ca cs:33 sp:7f338b2dcee8 ax:12 si:ffffffffff600000 di:55d1d3b3aff2 [1957074.619833] potentially unexpected fatal signal 5. [1957074.625750] CPU: 0 PID: 94071 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1957074.636094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1957074.645884] RIP: 0033:0x7fffffffe062 [1957074.650020] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1957074.669282] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1957074.674829] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1957074.683640] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1957074.691630] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1957074.699089] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1957074.708451] R13: 0000000000000022 R14: 000000c000196b60 R15: 00000000000f199a [1957074.715943] FS: 000000c000130890 GS: 0000000000000000 [1957186.578989] potentially unexpected fatal signal 5. [1957186.584125] CPU: 38 PID: 2325 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1957186.594633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1957186.604307] RIP: 0033:0x7fffffffe062 [1957186.608336] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1957186.627420] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [1957186.634349] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1957186.641831] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1957186.650928] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [1957186.658518] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00058fe20 [1957186.667662] R13: 0000000000000036 R14: 000000c000511d40 R15: 0000000000000521 [1957186.675113] FS: 0000000001ff7f10 GS: 0000000000000000 [1957449.637230] warn_bad_vsyscall: 57 callbacks suppressed [1957449.637233] exe[121437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3097 di:ffffffffff600000 [1957449.757056] exe[110097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3097 di:ffffffffff600000 [1957449.857366] exe[108210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3097 di:ffffffffff600000 [1957476.150394] exe[111243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3097 di:ffffffffff600000 [1957476.247209] exe[115232] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3097 di:ffffffffff600000 [1957476.337895] exe[110219] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3097 di:ffffffffff600000 [1957476.450370] exe[109900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1957476.625998] exe[108582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1957476.716989] exe[110819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1957476.824589] exe[111243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1957998.256590] exe[108060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1957998.337516] exe[109885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1957998.427705] exe[107868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1958261.646227] exe[107861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647f84f27f9 cs:33 sp:7f93f68dcee8 ax:0 si:20000080 di:ffffffffff600000 [1958261.733251] exe[108033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647f84f27f9 cs:33 sp:7f93f689aee8 ax:0 si:20000080 di:ffffffffff600000 [1958261.837693] exe[108046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5647f84f27f9 cs:33 sp:7f93f68bbee8 ax:0 si:20000080 di:ffffffffff600000 [1958901.364917] exe[133091] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600df9527f9 cs:33 sp:7f388adee858 ax:0 si:5600df9ab062 di:ffffffffff600000 [1958901.489632] exe[133046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600df9527f9 cs:33 sp:7f388adee858 ax:0 si:5600df9ab062 di:ffffffffff600000 [1958901.597541] exe[108619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600df9527f9 cs:33 sp:7f388adee858 ax:0 si:5600df9ab062 di:ffffffffff600000 [1959098.201595] exe[108629] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cf0d173ca cs:33 sp:7fe41b9feee8 ax:12 si:ffffffffff600000 di:564cf0d83ff2 [1959098.333063] exe[115217] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cf0d173ca cs:33 sp:7fe41b9feee8 ax:12 si:ffffffffff600000 di:564cf0d83ff2 [1959098.498859] exe[109568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cf0d173ca cs:33 sp:7fe41b9bcee8 ax:12 si:ffffffffff600000 di:564cf0d83ff2 [1959316.140698] exe[135028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bb87b53ca cs:33 sp:7eacd7c80ee8 ax:12 si:ffffffffff600000 di:561bb8821ff2 [1959316.231313] exe[134750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bb87b53ca cs:33 sp:7eacd7c80ee8 ax:12 si:ffffffffff600000 di:561bb8821ff2 [1959316.293450] exe[135775] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bb87b53ca cs:33 sp:7eacd7c5fee8 ax:12 si:ffffffffff600000 di:561bb8821ff2 [1959465.710027] exe[139731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b109aa97f9 cs:33 sp:7ed5014eb858 ax:0 si:55b109b02070 di:ffffffffff600000 [1959465.871978] exe[139847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b109aa97f9 cs:33 sp:7ed5014eb858 ax:0 si:55b109b02070 di:ffffffffff600000 [1959466.037869] exe[139940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b109aa97f9 cs:33 sp:7ed5014eb858 ax:0 si:55b109b02070 di:ffffffffff600000 [1959466.046862] exe[139957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b109aa97f9 cs:33 sp:7ed5014ca858 ax:0 si:55b109b02070 di:ffffffffff600000 [1959482.643897] exe[152912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55798c7bd7f9 cs:33 sp:7fe4129e8858 ax:0 si:55798c816070 di:ffffffffff600000 [1959482.725356] exe[115874] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55798c7bd7f9 cs:33 sp:7fe4129e8858 ax:0 si:55798c816070 di:ffffffffff600000 [1959482.725625] exe[117871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55798c7bd7f9 cs:33 sp:7fe4129c7858 ax:0 si:55798c816070 di:ffffffffff600000 [1959482.840409] exe[116959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55798c7bd7f9 cs:33 sp:7fe4129c7858 ax:0 si:55798c816070 di:ffffffffff600000 [1959483.635144] exe[116879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959483.721524] exe[153507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959483.813265] exe[153059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959483.901403] exe[152949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959484.020622] exe[116016] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959484.117665] exe[115780] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959487.689838] warn_bad_vsyscall: 116 callbacks suppressed [1959487.689842] exe[115993] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959487.782104] exe[153059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959487.886429] exe[117589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959487.989693] exe[152955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136d9858 ax:0 si:55f385734097 di:ffffffffff600000 [1959488.086649] exe[115800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734062 di:ffffffffff600000 [1959488.150095] exe[153639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734062 di:ffffffffff600000 [1959488.226898] exe[117340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734062 di:ffffffffff600000 [1959488.250385] exe[117340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734062 di:ffffffffff600000 [1959488.336148] exe[98446] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959488.429749] exe[153320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959492.748561] warn_bad_vsyscall: 243 callbacks suppressed [1959492.748564] exe[116702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959492.869943] exe[117087] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959492.957616] exe[116546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959493.022453] exe[116546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959493.120051] exe[116533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959493.122283] exe[153059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136d9858 ax:0 si:55f385734097 di:ffffffffff600000 [1959493.204915] exe[116533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959493.277003] exe[153291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959493.366964] exe[115925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959493.433362] exe[153322] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959497.765969] warn_bad_vsyscall: 153 callbacks suppressed [1959497.765972] exe[116879] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734062 di:ffffffffff600000 [1959497.870964] exe[118068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734062 di:ffffffffff600000 [1959498.848055] exe[153317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959499.006607] exe[153317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959499.037189] exe[126619] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600df9527f9 cs:33 sp:7f388adee858 ax:0 si:5600df9ab062 di:ffffffffff600000 [1959499.148738] exe[130275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600df9527f9 cs:33 sp:7f388adee858 ax:0 si:5600df9ab062 di:ffffffffff600000 [1959499.174084] exe[116456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959499.251968] exe[126620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5600df9527f9 cs:33 sp:7f388adee858 ax:0 si:5600df9ab062 di:ffffffffff600000 [1959499.266632] exe[153271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959499.346531] exe[153355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959502.802662] warn_bad_vsyscall: 139 callbacks suppressed [1959502.802665] exe[153311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959502.904259] exe[117072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959502.997784] exe[116974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959503.026320] exe[117564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136d9858 ax:0 si:55f385734097 di:ffffffffff600000 [1959503.122774] exe[116859] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959503.228480] exe[116444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959503.330616] exe[153317] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959503.409054] exe[116488] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959503.478417] exe[111507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959503.583053] exe[116456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734097 di:ffffffffff600000 [1959507.875314] warn_bad_vsyscall: 148 callbacks suppressed [1959507.875318] exe[116533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959507.964225] exe[117567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959507.986844] exe[151309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959508.053012] exe[116971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959508.129708] exe[153355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959508.236246] exe[151324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959508.330863] exe[111507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959508.431293] exe[115925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959508.495879] exe[116340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1959508.571411] exe[153639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3856db7f9 cs:33 sp:7f5e136fa858 ax:0 si:55f385734070 di:ffffffffff600000 [1960217.302881] warn_bad_vsyscall: 25 callbacks suppressed [1960217.302885] exe[162764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd50c37f9 cs:33 sp:7f62a718f858 ax:0 si:55dfd511c097 di:ffffffffff600000 [1960282.201972] exe[169181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b30f14c7f9 cs:33 sp:7eaa40b55858 ax:0 si:55b30f1a5062 di:ffffffffff600000 [1960282.370056] exe[169189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b30f14c7f9 cs:33 sp:7eaa40b13858 ax:0 si:55b30f1a5062 di:ffffffffff600000 [1960282.508466] exe[169203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b30f14c7f9 cs:33 sp:7eaa40b55858 ax:0 si:55b30f1a5062 di:ffffffffff600000 [1960282.508720] exe[169194] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b30f14c7f9 cs:33 sp:7eaa40b34858 ax:0 si:55b30f1a5062 di:ffffffffff600000 [1960426.863466] exe[148024] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56344b04a7f9 cs:33 sp:7fe1152b1ee8 ax:0 si:20000f00 di:ffffffffff600000 [1960427.035720] exe[144759] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56344b04a7f9 cs:33 sp:7fe1152b1ee8 ax:0 si:20000f00 di:ffffffffff600000 [1960427.150062] exe[122604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56344b04a7f9 cs:33 sp:7fe115290ee8 ax:0 si:20000f00 di:ffffffffff600000 [1960492.466612] exe[163502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56344b04a7f9 cs:33 sp:7fe1152b1ee8 ax:0 si:20000200 di:ffffffffff600000 [1960493.243217] exe[163454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56344b04a7f9 cs:33 sp:7fe115290ee8 ax:0 si:20000200 di:ffffffffff600000 [1960493.326442] exe[122480] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56344b04a7f9 cs:33 sp:7fe115290ee8 ax:0 si:20000200 di:ffffffffff600000 [1960527.261830] exe[164250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1960527.372244] exe[108136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1960527.474019] exe[174218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561e3a29a7f9 cs:33 sp:7f57f4d09858 ax:0 si:561e3a2f3062 di:ffffffffff600000 [1960558.148653] exe[174501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571a53547f9 cs:33 sp:7fca660ec858 ax:0 si:5571a53ad062 di:ffffffffff600000 [1960558.283463] exe[131452] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571a53547f9 cs:33 sp:7fca660ec858 ax:0 si:5571a53ad062 di:ffffffffff600000 [1960558.430340] exe[148286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571a53547f9 cs:33 sp:7fca660ec858 ax:0 si:5571a53ad062 di:ffffffffff600000 [1960619.541894] exe[47149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642c4cdf7f9 cs:33 sp:7f0587303858 ax:0 si:5642c4d38062 di:ffffffffff600000 [1960622.704523] exe[52903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642c4cdf7f9 cs:33 sp:7f0587303858 ax:0 si:5642c4d38097 di:ffffffffff600000 [1960668.361271] exe[167551] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55798c7bd7f9 cs:33 sp:7fe4129e8858 ax:0 si:55798c816070 di:ffffffffff600000 [1960668.485078] exe[169251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55798c7bd7f9 cs:33 sp:7fe4129e8858 ax:0 si:55798c816070 di:ffffffffff600000 [1960668.539032] exe[173697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55798c7bd7f9 cs:33 sp:7fe4129e8858 ax:0 si:55798c816070 di:ffffffffff600000 [1960668.659037] exe[167442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55798c7bd7f9 cs:33 sp:7fe4129c7858 ax:0 si:55798c816070 di:ffffffffff600000 [1960668.659919] exe[167942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55798c7bd7f9 cs:33 sp:7fe4129e8858 ax:0 si:55798c816070 di:ffffffffff600000 [1960707.171566] exe[163167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17db13858 ax:0 si:559e20571070 di:ffffffffff600000 [1960707.332279] exe[177970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17daf2858 ax:0 si:559e20571070 di:ffffffffff600000 [1960707.359534] exe[177970] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17daf2858 ax:0 si:559e20571070 di:ffffffffff600000 [1960707.387446] exe[169770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17daf2858 ax:0 si:559e20571070 di:ffffffffff600000 [1960707.417166] exe[177981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17daf2858 ax:0 si:559e20571070 di:ffffffffff600000 [1960707.444346] exe[177981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17daf2858 ax:0 si:559e20571070 di:ffffffffff600000 [1960707.473368] exe[177981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17daf2858 ax:0 si:559e20571070 di:ffffffffff600000 [1960707.501473] exe[169770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17daf2858 ax:0 si:559e20571070 di:ffffffffff600000 [1960707.528289] exe[169770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17daf2858 ax:0 si:559e20571070 di:ffffffffff600000 [1960707.554872] exe[169770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559e205187f9 cs:33 sp:7fc17daf2858 ax:0 si:559e20571070 di:ffffffffff600000 [1960789.339527] potentially unexpected fatal signal 5. [1960789.344661] CPU: 54 PID: 101243 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1960789.355199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1960789.364737] RIP: 0033:0x7fffffffe062 [1960789.368608] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1960789.387773] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1960789.393350] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1960789.402171] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1960789.410995] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1960789.418451] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1960789.427280] R13: 0000000000000006 R14: 000000c000158ea0 R15: 00000000000189c4 [1960789.436097] FS: 0000000001ff7f10 GS: 0000000000000000 [1960795.442629] warn_bad_vsyscall: 62 callbacks suppressed [1960795.442632] exe[180548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fa1a0e7f9 cs:33 sp:7f0cbfd32858 ax:0 si:559fa1a67062 di:ffffffffff600000 [1960796.371230] potentially unexpected fatal signal 5. [1960796.376369] CPU: 37 PID: 151649 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1960796.386964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1960796.396522] RIP: 0033:0x7fffffffe062 [1960796.400411] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1960796.419553] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1960796.426489] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1960796.433942] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1960796.442762] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1960796.451643] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1960796.460459] R13: 0000000000000022 R14: 000000c0001b24e0 R15: 0000000000018cf2 [1960796.468009] FS: 000000c000130c90 GS: 0000000000000000 [1960797.068428] exe[184018] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fa1a0e7f9 cs:33 sp:7f0cbfd32858 ax:0 si:559fa1a67062 di:ffffffffff600000 [1960797.766787] potentially unexpected fatal signal 5. [1960797.772477] CPU: 59 PID: 184407 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1960797.783053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1960797.792678] RIP: 0033:0x7fffffffe062 [1960797.796582] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1960797.815855] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1960797.822754] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1960797.830223] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1960797.839054] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1960797.847913] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1960797.854247] potentially unexpected fatal signal 5. [1960797.856842] R13: 0000000000000032 R14: 000000c000513040 R15: 0000000000018e72 [1960797.861926] CPU: 11 PID: 104224 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1960797.861928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1960797.861932] RIP: 0033:0x7fffffffe062 [1960797.861934] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1960797.861935] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1960797.861937] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1960797.861938] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1960797.861938] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1960797.861939] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1960797.861940] R13: 0000000000000032 R14: 000000c000513040 R15: 0000000000018e72 [1960797.861941] FS: 000000c000510090 GS: 0000000000000000 [1960797.966868] FS: 000000c000510090 GS: 0000000000000000 [1960798.103208] exe[184180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fa1a0e7f9 cs:33 sp:7f0cbfd11858 ax:0 si:559fa1a67062 di:ffffffffff600000 [1960810.791072] exe[174456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed787e07f9 cs:33 sp:7ec811ea0858 ax:0 si:55ed78839070 di:ffffffffff600000 [1960811.944402] exe[186794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55590572e7f9 cs:33 sp:7f3ac10e5858 ax:0 si:555905787070 di:ffffffffff600000 [1960815.161771] exe[186509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e6989717f9 cs:33 sp:7f6949962858 ax:0 si:55e6989ca070 di:ffffffffff600000 [1960819.724813] exe[188139] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560e6260c7f9 cs:33 sp:7fdf5bdfe858 ax:0 si:560e62665070 di:ffffffffff600000 [1960840.496689] exe[172258] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579afe5d7f9 cs:33 sp:7ea201b13858 ax:0 si:5579afeb6070 di:ffffffffff600000 [1960852.841449] exe[192605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565175b707f9 cs:33 sp:7fd5a2828858 ax:0 si:565175bc9070 di:ffffffffff600000 [1960906.589647] exe[187274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558e27cf7f9 cs:33 sp:7eb649a74858 ax:0 si:5558e2828070 di:ffffffffff600000 [1960954.395104] exe[72080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603e2b917f9 cs:33 sp:7f1a2f5c5858 ax:0 si:5603e2bea070 di:ffffffffff600000 [1961003.508413] exe[171910] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617d82b37f9 cs:33 sp:7eb028318858 ax:0 si:5617d830c070 di:ffffffffff600000 [1961083.984235] exe[175015] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5257f67f9 cs:33 sp:7f65f03f1858 ax:0 si:55e52584f070 di:ffffffffff600000 [1961340.571999] exe[208437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8abe7f9 cs:33 sp:7f007acf5858 ax:0 si:5637f8b17070 di:ffffffffff600000 [1961351.533773] exe[202865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5579790757f9 cs:33 sp:7fdd43827858 ax:0 si:5579790ce070 di:ffffffffff600000 [1961369.573658] exe[195032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5631ce9897f9 cs:33 sp:7f3d2cd0f858 ax:0 si:5631ce9e2070 di:ffffffffff600000 [1961661.063048] exe[39585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5642c4cdf7f9 cs:33 sp:7f0587303858 ax:0 si:5642c4d38070 di:ffffffffff600000 [1961774.797503] exe[207025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648e3f2d7f9 cs:33 sp:7f180588c858 ax:0 si:5648e3f86070 di:ffffffffff600000 [1961774.874781] exe[207338] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648e3f2d7f9 cs:33 sp:7f180588c858 ax:0 si:5648e3f86070 di:ffffffffff600000 [1961774.985663] exe[207025] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5648e3f2d7f9 cs:33 sp:7f180588c858 ax:0 si:5648e3f86070 di:ffffffffff600000 [1962037.273856] exe[230652] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca6e3a858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962037.372634] exe[230645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca69dd858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962037.393799] exe[230645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca69dd858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962037.414193] exe[230645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca69dd858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962037.434147] exe[230645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca69dd858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962037.454461] exe[230593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca69dd858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962037.475226] exe[230593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca69dd858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962037.496219] exe[230573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca69dd858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962037.519520] exe[230573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca69dd858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962037.539947] exe[230573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5602d445c7f9 cs:33 sp:7faca69dd858 ax:0 si:5602d44b5097 di:ffffffffff600000 [1962056.797909] warn_bad_vsyscall: 74 callbacks suppressed [1962056.797912] exe[225245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962056.886381] exe[228985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962056.888833] exe[185048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740ca858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962056.974288] exe[230582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962057.623189] exe[185437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962057.694001] exe[203492] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962057.719327] exe[196659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740a9858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962058.491036] exe[196530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740ca858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962058.560622] exe[183702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962059.362323] exe[224918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962061.858536] warn_bad_vsyscall: 26 callbacks suppressed [1962061.858539] exe[231806] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962061.983769] exe[231783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962062.058413] exe[230131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962062.173928] exe[231866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740a9858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962062.247630] exe[230286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962062.273041] exe[230227] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740a9858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962062.396631] exe[230131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962062.476244] exe[231757] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962062.555334] exe[196670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962062.641093] exe[230129] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962067.242890] warn_bad_vsyscall: 137 callbacks suppressed [1962067.242894] exe[231798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962067.318384] exe[181845] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962067.404426] exe[183719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962067.527958] exe[230649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962067.607561] exe[232120] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962067.638953] exe[230604] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962067.738154] exe[202929] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962067.789266] exe[230649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962067.969146] exe[224715] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962068.051493] exe[181741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962072.267963] warn_bad_vsyscall: 77 callbacks suppressed [1962072.267966] exe[232325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962072.354147] exe[231796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962072.462510] exe[230971] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740ca858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962072.577722] exe[196701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962072.650590] exe[232414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962072.755941] exe[231796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962072.833975] exe[230186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962072.904264] exe[230193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962072.975986] exe[230148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962073.058796] exe[230522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962077.970797] warn_bad_vsyscall: 97 callbacks suppressed [1962077.970800] exe[224796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3070 di:ffffffffff600000 [1962078.054398] exe[224692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962078.185892] exe[202955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962078.277754] exe[230293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962078.358837] exe[232414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962078.432906] exe[232364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962078.504950] exe[232663] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3097 di:ffffffffff600000 [1962081.372993] exe[230416] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962081.440931] exe[230293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962084.387970] exe[232125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962084.465093] exe[232248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962087.409292] exe[231039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962087.412933] exe[230297] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740ca858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962087.533293] exe[230242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962087.657258] exe[231822] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962087.750737] exe[232128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962087.773878] exe[232337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962088.225349] exe[230339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962088.569702] exe[233285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962089.406408] warn_bad_vsyscall: 8 callbacks suppressed [1962089.406412] exe[233116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962089.495779] exe[233231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962089.497466] exe[233134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740ca858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962089.627611] exe[233223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962089.661318] exe[233206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962089.746697] exe[230242] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962090.519733] exe[196300] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962090.626660] exe[232303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962090.631570] exe[230160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740ca858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962090.999819] exe[231442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962094.413484] warn_bad_vsyscall: 109 callbacks suppressed [1962094.413488] exe[233125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962094.501769] exe[233544] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962094.579181] exe[233237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962094.651975] exe[233547] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962094.652173] exe[233222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740ca858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962094.769601] exe[232437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962094.819749] exe[230408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962094.988064] exe[233231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962095.068068] exe[233522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1962095.147106] exe[232433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072198a7f9 cs:33 sp:7fea740eb858 ax:0 si:5607219e3062 di:ffffffffff600000 [1963826.032647] warn_bad_vsyscall: 107 callbacks suppressed [1963826.032651] exe[268752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c81e397f9 cs:33 sp:7fb46af10858 ax:0 si:562c81e92070 di:ffffffffff600000 [1963826.129599] exe[270141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c81e397f9 cs:33 sp:7fb46af10858 ax:0 si:562c81e92070 di:ffffffffff600000 [1963826.131556] exe[270110] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c81e397f9 cs:33 sp:7fb46aeef858 ax:0 si:562c81e92070 di:ffffffffff600000 [1963826.246675] exe[268769] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c81e397f9 cs:33 sp:7fb46af10858 ax:0 si:562c81e92070 di:ffffffffff600000 [1963826.274278] exe[268307] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562c81e397f9 cs:33 sp:7fb46af10858 ax:0 si:562c81e92070 di:ffffffffff600000 [1963961.002631] potentially unexpected fatal signal 5. [1963961.007772] CPU: 80 PID: 274274 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1963961.018358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1963961.027899] RIP: 0033:0x7fffffffe062 [1963961.031830] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1963961.052307] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1963961.059229] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1963961.068064] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1963961.077091] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1963961.085921] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [1963961.094746] R13: 0000000000000022 R14: 000000c0004971e0 R15: 0000000000029e13 [1963961.103587] FS: 000000c000180090 GS: 0000000000000000 [1964296.281530] potentially unexpected fatal signal 5. [1964296.286683] CPU: 37 PID: 280054 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1964296.297179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1964296.306749] RIP: 0033:0x7fffffffe062 [1964296.310699] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1964296.329841] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1964296.335376] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1964296.344201] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1964296.351645] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1964296.360558] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1964296.369656] R13: 0000000000000022 R14: 000000c0004bd6c0 R15: 000000000002b4db [1964296.378481] FS: 000000c000130c90 GS: 0000000000000000 [1964296.520555] potentially unexpected fatal signal 5. [1964296.526708] CPU: 25 PID: 280046 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1964296.537297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1964296.547632] RIP: 0033:0x7fffffffe062 [1964296.551544] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1964296.572157] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1964296.579090] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1964296.587937] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1964296.596847] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1964296.605700] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [1964296.614523] R13: 0000000000000022 R14: 000000c0004bd6c0 R15: 000000000002b4db [1964296.623382] FS: 000000c000130c90 GS: 0000000000000000 [1964360.987247] potentially unexpected fatal signal 5. [1964360.992398] CPU: 77 PID: 260929 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1964361.002984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1964361.012618] RIP: 0033:0x7fffffffe062 [1964361.016567] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1964361.035653] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1964361.042586] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1964361.050038] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1964361.058860] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1964361.066501] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1964361.075355] R13: 0000000000000022 R14: 000000c0004b0ea0 R15: 000000000002c4c3 [1964361.084172] FS: 000000c000130890 GS: 0000000000000000 [1964361.124972] potentially unexpected fatal signal 5. [1964361.130473] CPU: 87 PID: 231767 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1964361.141001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1964361.151951] RIP: 0033:0x7fffffffe062 [1964361.157173] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1964361.176280] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1964361.183206] RAX: 0000000000045227 RBX: 0000000000000000 RCX: 00007fffffffe05a [1964361.190685] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [1964361.199506] RBP: 000000c00013de38 R08: 000000c0042cd4b0 R09: 0000000000000000 [1964361.208333] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1964361.215868] R13: 0000000000000022 R14: 000000c0004b0ea0 R15: 000000000002c4c3 [1964361.224711] FS: 000000c000130890 GS: 0000000000000000 [1964361.255099] potentially unexpected fatal signal 5. [1964361.260338] CPU: 84 PID: 283159 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1964361.272226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1964361.283111] RIP: 0033:0x7fffffffe062 [1964361.288418] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1964361.308857] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1964361.315758] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1964361.323231] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1964361.332140] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1964361.339594] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1964361.347035] R13: 0000000000000036 R14: 000000c000183d40 R15: 000000000002c4bf [1964361.355944] FS: 0000000001ff7f10 GS: 0000000000000000 [1964361.769124] potentially unexpected fatal signal 5. [1964361.774342] CPU: 37 PID: 183752 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1964361.784961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1964361.794528] RIP: 0033:0x7fffffffe062 [1964361.798441] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1964361.817692] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1964361.824653] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1964361.833565] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1964361.841014] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1964361.849864] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1964361.857429] R13: 0000000000000022 R14: 000000c0004b0ea0 R15: 000000000002c4c3 [1964361.864898] FS: 000000c000130890 GS: 0000000000000000 [1964400.019103] potentially unexpected fatal signal 5. [1964400.024215] CPU: 51 PID: 184721 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1964400.034754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1964400.044288] RIP: 0033:0x7fffffffe062 [1964400.048183] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1964400.067372] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1964400.072935] RAX: 0000000000045dd7 RBX: 0000000000000000 RCX: 00007fffffffe05a [1964400.080388] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [1964400.087927] RBP: 000000c00018fe38 R08: 000000c0006b04c0 R09: 0000000000000000 [1964400.096777] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1964400.106055] R13: 0000000000000036 R14: 000000c0004cf1e0 R15: 000000000002d0fa [1964400.113536] FS: 000000c000180490 GS: 0000000000000000 [1964588.667727] exe[293748] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1964588.778756] exe[303865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1964588.807289] exe[303865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1964588.834143] exe[303865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1964588.863581] exe[296589] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1964588.895122] exe[303682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1964588.924785] exe[293684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1964588.952565] exe[293684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1964588.979153] exe[293684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1964589.006145] exe[293684] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aeede923ca cs:33 sp:7f0019ca7ee8 ax:12 si:ffffffffff600000 di:55aeedefeff2 [1965858.973219] warn_bad_vsyscall: 25 callbacks suppressed [1965858.973223] exe[297169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe97ee8 ax:0 si:20001040 di:ffffffffff600000 [1965859.095707] exe[341718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe76ee8 ax:0 si:20001040 di:ffffffffff600000 [1965859.115086] exe[341718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe76ee8 ax:0 si:20001040 di:ffffffffff600000 [1965859.135938] exe[341718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe76ee8 ax:0 si:20001040 di:ffffffffff600000 [1965859.163756] exe[341718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe76ee8 ax:0 si:20001040 di:ffffffffff600000 [1965859.186661] exe[341718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe76ee8 ax:0 si:20001040 di:ffffffffff600000 [1965859.209841] exe[341718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe76ee8 ax:0 si:20001040 di:ffffffffff600000 [1965859.230561] exe[341718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe76ee8 ax:0 si:20001040 di:ffffffffff600000 [1965859.251207] exe[341718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe76ee8 ax:0 si:20001040 di:ffffffffff600000 [1965859.271360] exe[341718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628cc0667f9 cs:33 sp:7faaafe76ee8 ax:0 si:20001040 di:ffffffffff600000 [1965890.223383] warn_bad_vsyscall: 89 callbacks suppressed [1965890.223386] exe[332422] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d9c3807f9 cs:33 sp:7f28aa475858 ax:0 si:559d9c3d9070 di:ffffffffff600000 [1966191.343934] potentially unexpected fatal signal 11. [1966191.349149] CPU: 59 PID: 346233 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1966191.359648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1966191.369190] RIP: 0033:0x5653367d1ae7 [1966191.373094] Code: 00 00 e9 8f e7 ff ff ba 01 00 00 00 e9 a9 ee ff ff 66 90 41 57 41 56 41 55 49 89 d5 41 54 55 53 48 89 fb 48 81 ec 18 05 00 00 <48> 89 74 24 08 89 4c 24 48 64 48 8b 04 25 28 00 00 00 48 89 84 24 [1966191.384508] potentially unexpected fatal signal 5. [1966191.393574] RSP: 002b:00007f764fc58c90 EFLAGS: 00010206 [1966191.400039] CPU: 46 PID: 347282 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1966191.400041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1966191.400045] RIP: 0033:0x7fffffffe062 [1966191.400048] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1966191.400049] RSP: 002b:000000c0007bbcb0 EFLAGS: 00000297 [1966191.400051] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1966191.400051] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 00005627b7200000 [1966191.400052] RBP: 000000c0007bbd40 R08: 0000000000000000 R09: 0000000000000000 [1966191.400053] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0007bbbd8 [1966191.400055] R13: 000000c000580000 R14: 000000c0005824e0 R15: 00000000000547a5 [1966191.406968] RAX: 00007f764fc59500 RBX: 00007f764fc591f0 RCX: 0000000000000000 [1966191.406970] RDX: 00007f764fc59370 RSI: 00005653368533d8 RDI: 00007f764fc591f0 [1966191.406971] RBP: 00007f764fc592e0 R08: 0000000000000000 R09: 0000000000000000 [1966191.406974] R10: 0000000000001000 R11: 0000000000000293 R12: 00005653368533d8 [1966191.418832] FS: 00007fc7997fa6c0 GS: 0000000000000000 [1966191.540911] R13: 00007f764fc59370 R14: 0000000000000000 R15: 00007f764fc591f0 [1966191.549764] FS: 0000565337458480 GS: 0000000000000000 [1966367.647792] potentially unexpected fatal signal 5. [1966367.652925] CPU: 65 PID: 355476 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1966367.663783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1966367.673415] RIP: 0033:0x7fffffffe062 [1966367.677360] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1966367.697827] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1966367.704768] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1966367.713576] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1966367.722430] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1966367.731353] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1966367.740182] R13: 0000000000000006 R14: 000000c000167ba0 R15: 0000000000046032 [1966367.749005] FS: 000000c000130890 GS: 0000000000000000 [1966373.736520] potentially unexpected fatal signal 5. [1966373.741664] CPU: 46 PID: 306895 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1966373.752170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1966373.762010] RIP: 0033:0x7fffffffe062 [1966373.766105] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1966373.785203] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1966373.792134] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1966373.800994] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1966373.809829] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1966373.818658] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [1966373.827473] R13: 0000000000000006 R14: 000000c0001701a0 R15: 000000000004603b [1966373.836379] FS: 0000000001ff7f10 GS: 0000000000000000 [1967498.436646] potentially unexpected fatal signal 5. [1967498.441773] CPU: 19 PID: 366670 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1967498.452387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1967498.461996] RIP: 0033:0x7fffffffe062 [1967498.466053] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1967498.486533] RSP: 002b:000000c000737cb0 EFLAGS: 00000297 [1967498.493478] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1967498.502368] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1967498.511216] RBP: 000000c000737d40 R08: 0000000000000000 R09: 0000000000000000 [1967498.518705] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000737bf8 [1967498.527565] R13: 0000000002a7dd40 R14: 000000c0004d8820 R15: 0000000000055685 [1967498.536401] FS: 0000000003d9f3c0 GS: 0000000000000000 [1968787.081494] exe[439442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb58027ee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1968787.135943] exe[411352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb573feee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1968787.156283] exe[439438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb573feee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1968787.176693] exe[440639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb573feee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1968787.197244] exe[439440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb573feee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1968787.216912] exe[440639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb573feee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1968787.237787] exe[439438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb573feee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1968787.258470] exe[411352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb573feee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1968787.279532] exe[439442] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb573feee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1968787.300127] exe[439438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6b836d3ca cs:33 sp:7ecb573feee8 ax:12 si:ffffffffff600000 di:55d6b83d9ff2 [1969782.200904] warn_bad_vsyscall: 57 callbacks suppressed [1969782.200907] exe[372259] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e9c3f07f9 cs:33 sp:7f365f1feee8 ax:0 si:200009c0 di:ffffffffff600000 [1969782.356531] exe[431221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e9c3f07f9 cs:33 sp:7f365f19bee8 ax:0 si:200009c0 di:ffffffffff600000 [1969782.862576] exe[473744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e9c3f07f9 cs:33 sp:7f365f1bcee8 ax:0 si:200009c0 di:ffffffffff600000 [1970292.461498] potentially unexpected fatal signal 5. [1970292.466642] CPU: 21 PID: 440589 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1970292.477172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1970292.486689] RIP: 0033:0x7fffffffe062 [1970292.490555] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1970292.509626] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1970292.515161] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1970292.522652] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1970292.530111] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1970292.537556] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1970292.546534] R13: 0000000000000022 R14: 000000c00019ad00 R15: 000000000005a101 [1970292.555347] FS: 00000000022d2550 GS: 0000000000000000 [1970293.194324] potentially unexpected fatal signal 5. [1970293.199460] CPU: 85 PID: 435712 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1970293.209947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1970293.219581] RIP: 0033:0x7fffffffe062 [1970293.223471] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1970293.242646] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1970293.248226] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1970293.255698] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1970293.263156] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1970293.270582] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1970293.279447] R13: 0000000000000022 R14: 000000c00019ad00 R15: 000000000005a101 [1970293.288421] FS: 00000000022d2550 GS: 0000000000000000 [1970304.056676] potentially unexpected fatal signal 5. [1970304.061919] CPU: 87 PID: 481680 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1970304.072454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1970304.082079] RIP: 0033:0x7fffffffe062 [1970304.085962] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1970304.105198] RSP: 002b:000000c00050fd98 EFLAGS: 00000297 [1970304.112109] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1970304.119569] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1970304.127016] RBP: 000000c00050fe38 R08: 0000000000000000 R09: 0000000000000000 [1970304.134456] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00050fe20 [1970304.143295] R13: 0000000000000034 R14: 000000c000160d00 R15: 000000000005a61c [1970304.152109] FS: 0000000001ff7f10 GS: 0000000000000000 [1970509.599316] potentially unexpected fatal signal 5. [1970509.604442] CPU: 33 PID: 394420 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1970509.614958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1970509.624695] RIP: 0033:0x7fffffffe062 [1970509.628754] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1970509.647873] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [1970509.654795] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1970509.663628] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1970509.671180] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [1970509.680034] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00058fe20 [1970509.687538] R13: 0000000000000034 R14: 000000c0001b5040 R15: 000000000005febf [1970509.695023] FS: 000000c000580090 GS: 0000000000000000 [1970510.062944] potentially unexpected fatal signal 5. [1970510.068056] CPU: 2 PID: 498606 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1970510.078486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1970510.088024] RIP: 0033:0x7fffffffe062 [1970510.091900] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1970510.111109] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [1970510.116643] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1970510.124096] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1970510.131545] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [1970510.140458] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00058fe20 [1970510.147906] R13: 0000000000000034 R14: 000000c0001b5040 R15: 000000000005febf [1970510.155351] FS: 000000c000580090 GS: 0000000000000000 [1972539.863379] exe[561485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b15507f9 cs:33 sp:7ff7c4a27858 ax:0 si:5566b15a9062 di:ffffffffff600000 [1972539.969403] exe[553650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b15507f9 cs:33 sp:7ff7c4a27858 ax:0 si:5566b15a9062 di:ffffffffff600000 [1972540.065983] exe[554006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566b15507f9 cs:33 sp:7ff7c4a27858 ax:0 si:5566b15a9062 di:ffffffffff600000 [1972691.697698] exe[547155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b796d07f9 cs:33 sp:7f72f7ae5ee8 ax:0 si:20001180 di:ffffffffff600000 [1972691.820907] exe[548426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b796d07f9 cs:33 sp:7f72f7ae5ee8 ax:0 si:20001180 di:ffffffffff600000 [1972691.974767] exe[492094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563b796d07f9 cs:33 sp:7f72f7ae5ee8 ax:0 si:20001180 di:ffffffffff600000 [1972987.152379] exe[584339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1972987.931080] exe[577704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1972987.963402] exe[534427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1972987.992975] exe[563443] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1972988.024168] exe[577623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1972988.055014] exe[577623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1972988.084235] exe[577623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1972988.116555] exe[533816] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1972988.147376] exe[577623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1972988.177565] exe[577623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f9869087f9 cs:33 sp:7fb3477f9ee8 ax:0 si:20001700 di:ffffffffff600000 [1973674.772261] warn_bad_vsyscall: 45 callbacks suppressed [1973674.772264] exe[537749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a692457f9 cs:33 sp:7f5edbdfe858 ax:0 si:561a6929e062 di:ffffffffff600000 [1973674.819775] exe[503084] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a692457f9 cs:33 sp:7f5edbdfe858 ax:0 si:561a6929e062 di:ffffffffff600000 [1973674.877672] exe[521160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561a692457f9 cs:33 sp:7f5edbdfe858 ax:0 si:561a6929e062 di:ffffffffff600000 [1973675.410277] exe[537282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973675.456937] exe[537224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973675.515517] exe[537153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973675.572981] exe[501697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973675.620515] exe[506138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973675.668250] exe[506138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973675.721883] exe[501113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973679.963811] warn_bad_vsyscall: 97 callbacks suppressed [1973679.963814] exe[500940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973680.019913] exe[537739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973680.058639] exe[537175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973680.102584] exe[537743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973680.150727] exe[538434] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973680.964721] exe[538425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973680.988885] exe[521270] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b251858 ax:0 si:56378e050062 di:ffffffffff600000 [1973681.041887] exe[506138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973681.041963] exe[501027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973681.118348] exe[538256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.305850] warn_bad_vsyscall: 70 callbacks suppressed [1973685.305853] exe[538256] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.372955] exe[549851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.393098] exe[549851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.414479] exe[538672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.434924] exe[538672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.456269] exe[538672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.476246] exe[538672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.497412] exe[538672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.517952] exe[538672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973685.538209] exe[538672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973690.558276] warn_bad_vsyscall: 59 callbacks suppressed [1973690.558280] exe[501696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973691.373620] exe[538672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973691.419059] exe[538425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973692.230106] exe[501081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973692.309646] exe[521067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973692.336872] exe[521067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973692.408420] exe[506138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973692.502190] exe[501168] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050097 di:ffffffffff600000 [1973692.558069] exe[502883] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050097 di:ffffffffff600000 [1973692.560941] exe[537749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050097 di:ffffffffff600000 [1973695.582279] warn_bad_vsyscall: 194 callbacks suppressed [1973695.582282] exe[538263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973695.607553] exe[538263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973695.628157] exe[500966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973695.649188] exe[500966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973695.668640] exe[500966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973695.689510] exe[537224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973695.710288] exe[537224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973695.734034] exe[537224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973695.754171] exe[537224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973695.773437] exe[537224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.593060] warn_bad_vsyscall: 309 callbacks suppressed [1973700.593063] exe[537282] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.619875] exe[501081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.678669] exe[537739] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b293858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.730809] exe[537268] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.788236] exe[521063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.808703] exe[538658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.863389] exe[502882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.886777] exe[502882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.938503] exe[501168] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973700.984974] exe[501133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56378dff77f9 cs:33 sp:7f867b2b4858 ax:0 si:56378e050062 di:ffffffffff600000 [1973904.200103] potentially unexpected fatal signal 5. [1973904.205556] CPU: 51 PID: 485909 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1973904.216070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1973904.225745] RIP: 0033:0x7fffffffe062 [1973904.229664] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1973904.250229] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1973904.257170] RAX: 0000000000091d3e RBX: 0000000000000000 RCX: 00007fffffffe05a [1973904.265988] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [1973904.273437] RBP: 000000c000193e38 R08: 000000c0044aa010 R09: 0000000000000000 [1973904.280862] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1973904.289685] R13: 0000000000000022 R14: 000000c000500ea0 R15: 00000000000758e3 [1973904.297154] FS: 000000c000180090 GS: 0000000000000000 [1973914.595923] potentially unexpected fatal signal 5. [1973914.601059] CPU: 78 PID: 597655 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1973914.611568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1973914.621119] RIP: 0033:0x7fffffffe062 [1973914.624976] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1973914.644207] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1973914.646506] potentially unexpected fatal signal 5. [1973914.649763] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1973914.654965] CPU: 28 PID: 546991 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1973914.654966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1973914.654969] RIP: 0033:0x7fffffffe062 [1973914.654971] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1973914.663825] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1973914.663826] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1973914.663826] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1973914.663827] R13: 0000000000000036 R14: 000000c00015f380 R15: 0000000000075c7e [1973914.663827] FS: 000000c000130490 GS: 0000000000000000 [1973914.745358] potentially unexpected fatal signal 5. [1973914.749194] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1973914.749196] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1973914.749196] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1973914.749197] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1973914.749197] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1973914.749198] R13: 0000000000000036 R14: 000000c00015f380 R15: 0000000000075c7e [1973914.749198] FS: 000000c000130490 GS: 0000000000000000 [1973914.806882] CPU: 61 PID: 597658 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1973914.817378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1973914.828316] RIP: 0033:0x7fffffffe062 [1973914.833602] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1973914.854168] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1973914.861086] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1973914.868537] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1973914.875973] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1973914.883425] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1973914.892246] R13: 0000000000000036 R14: 000000c00015f380 R15: 0000000000075c7e [1973914.901087] FS: 000000c000130490 GS: 0000000000000000 [1974119.913050] potentially unexpected fatal signal 5. [1974119.918282] CPU: 16 PID: 610153 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1974119.928828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1974119.938357] RIP: 0033:0x7fffffffe062 [1974119.942253] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1974119.961554] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1974119.968451] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1974119.975917] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1974119.983367] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1974119.992211] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1974120.001035] R13: 0000000000000022 R14: 000000c00021fa00 R15: 000000000007a025 [1974120.009899] FS: 00000000022d2550 GS: 0000000000000000 [1974120.384995] potentially unexpected fatal signal 5. [1974120.390119] CPU: 49 PID: 610139 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1974120.400613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1974120.410182] RIP: 0033:0x7fffffffe062 [1974120.414094] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1974120.434560] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1974120.441479] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1974120.448945] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1974120.456384] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1974120.465205] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1974120.474044] R13: 0000000000000022 R14: 000000c00021fa00 R15: 000000000007a025 [1974120.482952] FS: 00000000022d2550 GS: 0000000000000000 [1974884.471022] warn_bad_vsyscall: 51 callbacks suppressed [1974884.471025] exe[656606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558a31387f9 cs:33 sp:7f43ab685858 ax:0 si:5558a3191062 di:ffffffffff600000 [1974884.924846] exe[657468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558a31387f9 cs:33 sp:7f43ab664858 ax:0 si:5558a3191062 di:ffffffffff600000 [1974884.992235] exe[649895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558a31387f9 cs:33 sp:7f43ab664858 ax:0 si:5558a3191062 di:ffffffffff600000 [1975147.349214] potentially unexpected fatal signal 5. [1975147.354347] CPU: 15 PID: 654550 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1975147.364862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1975147.374434] RIP: 0033:0x7fffffffe062 [1975147.378393] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1975147.398862] RSP: 002b:000000c000535cb0 EFLAGS: 00000297 [1975147.405899] RAX: 00000000000a1e8e RBX: 0000000000000000 RCX: 00007fffffffe05a [1975147.414751] RDX: 0000000000000000 RSI: 000000c000536000 RDI: 0000000000012f00 [1975147.423591] RBP: 000000c000535d40 R08: 000000c0001b4880 R09: 0000000000000000 [1975147.432411] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000535bd8 [1975147.441237] R13: 00000000028a6180 R14: 000000c000582d00 R15: 000000000009dfd2 [1975147.450074] FS: 0000000003f933c0 GS: 0000000000000000 [1975645.582756] exe[691698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a95477f9 cs:33 sp:7f76fc138858 ax:0 si:55d6a95a0062 di:ffffffffff600000 [1975645.669761] exe[698325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a95477f9 cs:33 sp:7f76fc117858 ax:0 si:55d6a95a0062 di:ffffffffff600000 [1975645.746965] exe[696860] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a95477f9 cs:33 sp:7f76fc138858 ax:0 si:55d6a95a0062 di:ffffffffff600000 [1975645.799847] exe[695805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d6a95477f9 cs:33 sp:7f76fc138858 ax:0 si:55d6a95a0062 di:ffffffffff600000 [1975829.891131] exe[668571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f2e4fd7f9 cs:33 sp:7f73bdd7eee8 ax:0 si:20000280 di:ffffffffff600000 [1975829.945930] exe[691505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f2e4fd7f9 cs:33 sp:7f73bdd5dee8 ax:0 si:20000280 di:ffffffffff600000 [1975830.011425] exe[691512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f2e4fd7f9 cs:33 sp:7f73bdd7eee8 ax:0 si:20000280 di:ffffffffff600000 [1975830.034924] exe[691533] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559f2e4fd7f9 cs:33 sp:7f73bdd7eee8 ax:0 si:20000280 di:ffffffffff600000 [1976374.795698] exe[684964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55750def27f9 cs:33 sp:7f9c61a4cee8 ax:0 si:20002a00 di:ffffffffff600000 [1976374.883519] exe[693444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55750def27f9 cs:33 sp:7f9c61a2bee8 ax:0 si:20002a00 di:ffffffffff600000 [1976374.963330] exe[656821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55750def27f9 cs:33 sp:7f9c61a4cee8 ax:0 si:20002a00 di:ffffffffff600000 [1976385.620532] exe[670956] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55977b48d3ca cs:33 sp:7f346a231ee8 ax:12 si:ffffffffff600000 di:55977b4f9ff2 [1976385.673015] exe[711713] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55977b48d3ca cs:33 sp:7f346a231ee8 ax:12 si:ffffffffff600000 di:55977b4f9ff2 [1976385.714804] exe[699105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55977b48d3ca cs:33 sp:7f346a231ee8 ax:12 si:ffffffffff600000 di:55977b4f9ff2 [1977160.614157] exe[665096] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e43347f9 cs:33 sp:7f61ccb42ee8 ax:0 si:200003c0 di:ffffffffff600000 [1977160.686738] exe[696023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e43347f9 cs:33 sp:7f61ccb00ee8 ax:0 si:200003c0 di:ffffffffff600000 [1977160.763068] exe[696023] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d0e43347f9 cs:33 sp:7f61ccb21ee8 ax:0 si:200003c0 di:ffffffffff600000 [1977452.071884] exe[677057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55977b4917f9 cs:33 sp:7f346a231ee8 ax:0 si:0 di:ffffffffff600000 [1977452.110809] exe[683990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55977b4917f9 cs:33 sp:7f346a231ee8 ax:0 si:0 di:ffffffffff600000 [1977452.152086] exe[692439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55977b4917f9 cs:33 sp:7f34695feee8 ax:0 si:0 di:ffffffffff600000 [1978753.106000] exe[716791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cdc8197f9 cs:33 sp:7fc9642f0858 ax:0 si:560cdc872097 di:ffffffffff600000 [1978754.315267] exe[707907] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cdc8197f9 cs:33 sp:7fc9642cf858 ax:0 si:560cdc872062 di:ffffffffff600000 [1978755.024569] exe[675047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cdc8197f9 cs:33 sp:7fc9642ae858 ax:0 si:560cdc872097 di:ffffffffff600000 [1978942.231563] exe[763740] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1978942.280945] exe[770435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1978942.330025] exe[773593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1978942.595522] exe[763049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1978942.638824] exe[765522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1978942.684520] exe[765522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1978942.730549] exe[770435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1978942.788314] exe[765522] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1978942.842215] exe[763065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1978942.891044] exe[763029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5565349803ca cs:33 sp:7f47b67aeee8 ax:12 si:ffffffffff600000 di:5565349ecff2 [1979026.792766] potentially unexpected fatal signal 11. [1979026.797984] CPU: 83 PID: 781381 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1979026.808475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1979026.818098] RIP: 0033:0x563605ab97d3 [1979026.821983] Code: Unable to access opcode bytes at RIP 0x563605ab97a9. [1979026.828887] RSP: 002b:00007f6af5963440 EFLAGS: 00010202 [1979026.834476] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000563605ab9b4d [1979026.843323] RDX: 0000000000000000 RSI: 0000000000000018 RDI: 000056360670c760 [1979026.852185] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [1979026.861078] R10: 000056360670c750 R11: 0000000000000246 R12: 0000000000000000 [1979026.869922] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [1979026.878780] FS: 000056360670c480 GS: 0000000000000000 [1980143.725751] warn_bad_vsyscall: 3 callbacks suppressed [1980143.725754] exe[807950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67ef0ee8 ax:0 si:20000780 di:ffffffffff600000 [1980144.533906] exe[809065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67eaeee8 ax:0 si:20000780 di:ffffffffff600000 [1980144.583396] exe[855767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67eaeee8 ax:0 si:20000780 di:ffffffffff600000 [1980144.604989] exe[855767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67eaeee8 ax:0 si:20000780 di:ffffffffff600000 [1980144.629355] exe[855767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67eaeee8 ax:0 si:20000780 di:ffffffffff600000 [1980144.650574] exe[855767] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67eaeee8 ax:0 si:20000780 di:ffffffffff600000 [1980144.671977] exe[855040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67eaeee8 ax:0 si:20000780 di:ffffffffff600000 [1980144.701736] exe[807031] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67eaeee8 ax:0 si:20000780 di:ffffffffff600000 [1980144.723928] exe[807198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67eaeee8 ax:0 si:20000780 di:ffffffffff600000 [1980144.745841] exe[807198] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe7d6db7f9 cs:33 sp:7f0b67eaeee8 ax:0 si:20000780 di:ffffffffff600000 [1980157.481061] warn_bad_vsyscall: 57 callbacks suppressed [1980157.481064] exe[855761] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cdf148a3ca cs:33 sp:7fb248b23ee8 ax:12 si:ffffffffff600000 di:55cdf14f6ff2 [1980160.627684] exe[833298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565512ef53ca cs:33 sp:7ebade5feee8 ax:12 si:ffffffffff600000 di:565512f61ff2 [1980182.971827] exe[848886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55710c71a3ca cs:33 sp:7fb31ad4aee8 ax:12 si:ffffffffff600000 di:55710c786ff2 [1980192.230363] exe[861618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580319e83ca cs:33 sp:7ff56de35ee8 ax:12 si:ffffffffff600000 di:558031a54ff2 [1980222.064474] exe[842603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0d83e63ca cs:33 sp:7f1b66995ee8 ax:12 si:ffffffffff600000 di:55e0d8452ff2 [1980311.383982] exe[836326] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55559016b3ca cs:33 sp:7ee84d4beee8 ax:12 si:ffffffffff600000 di:5555901d7ff2 [1980311.808033] exe[863506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc89bc13ca cs:33 sp:7f00179ceee8 ax:12 si:ffffffffff600000 di:55fc89c2dff2 [1980320.553067] exe[865063] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56347043a3ca cs:33 sp:7f64c8b0bee8 ax:12 si:ffffffffff600000 di:5634704a6ff2 [1980353.014771] exe[857936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b71da613ca cs:33 sp:7f3d4ea54ee8 ax:12 si:ffffffffff600000 di:55b71dacdff2 [1980362.936942] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a20f1e13ca cs:33 sp:7ec235f03ee8 ax:12 si:ffffffffff600000 di:55a20f24dff2 [1980369.217009] exe[863078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e01e2783ca cs:33 sp:7f474c7f3ee8 ax:12 si:ffffffffff600000 di:55e01e2e4ff2 [1980432.626443] exe[836280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5606b15b43ca cs:33 sp:7fc7bb700ee8 ax:12 si:ffffffffff600000 di:5606b1620ff2 [1980474.209969] exe[867735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fb5d2c3ca cs:33 sp:7fec38af3ee8 ax:12 si:ffffffffff600000 di:555fb5d98ff2 [1980638.856622] exe[871303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31b8923ca cs:33 sp:7f0c28c2fee8 ax:12 si:ffffffffff600000 di:55c31b8feff2 [1980813.751131] exe[870171] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560073e5f3ca cs:33 sp:7eef64e27ee8 ax:12 si:ffffffffff600000 di:560073ecbff2 [1981406.967930] exe[837988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6139837f9 cs:33 sp:7fd7eb5b2858 ax:0 si:55c6139dc062 di:ffffffffff600000 [1981407.053349] exe[837979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6139837f9 cs:33 sp:7fd7eb5b2858 ax:0 si:55c6139dc062 di:ffffffffff600000 [1981407.099161] exe[826423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6139837f9 cs:33 sp:7fd7eb570858 ax:0 si:55c6139dc062 di:ffffffffff600000 [1981407.201549] exe[838393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c6139837f9 cs:33 sp:7fd7eb5b2858 ax:0 si:55c6139dc062 di:ffffffffff600000 [1981609.108714] exe[884669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d97ffd67f9 cs:33 sp:7f96eb85c858 ax:0 si:55d98002f062 di:ffffffffff600000 [1981609.207539] exe[884719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d97ffd67f9 cs:33 sp:7f96eb85c858 ax:0 si:55d98002f062 di:ffffffffff600000 [1981609.311354] exe[886974] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d97ffd67f9 cs:33 sp:7f96eb85c858 ax:0 si:55d98002f062 di:ffffffffff600000 [1982146.757116] exe[870252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa12cbb3ca cs:33 sp:7fb7481f2ee8 ax:12 si:ffffffffff600000 di:55aa12d27ff2 [1982146.937071] exe[876514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa12cbb3ca cs:33 sp:7fb7481f2ee8 ax:12 si:ffffffffff600000 di:55aa12d27ff2 [1982146.938681] exe[874978] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa12cbb3ca cs:33 sp:7fb7481d1ee8 ax:12 si:ffffffffff600000 di:55aa12d27ff2 [1982147.067788] exe[839375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa12cbb3ca cs:33 sp:7fb7481f2ee8 ax:12 si:ffffffffff600000 di:55aa12d27ff2 [1982147.129581] exe[866249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aa12cbb3ca cs:33 sp:7fb7481b0ee8 ax:12 si:ffffffffff600000 di:55aa12d27ff2 [1982344.249677] exe[826468] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072e17d7f9 cs:33 sp:7f20f1de7858 ax:0 si:56072e1d6070 di:ffffffffff600000 [1982344.347744] exe[826356] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072e17d7f9 cs:33 sp:7f20f1de7858 ax:0 si:56072e1d6070 di:ffffffffff600000 [1982344.391204] exe[826900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072e17d7f9 cs:33 sp:7f20f1de7858 ax:0 si:56072e1d6070 di:ffffffffff600000 [1982345.176887] exe[826915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072e17d7f9 cs:33 sp:7f20f1de7858 ax:0 si:56072e1d6070 di:ffffffffff600000 [1982345.176961] exe[828595] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56072e17d7f9 cs:33 sp:7f20f1dc6858 ax:0 si:56072e1d6070 di:ffffffffff600000 [1983029.214886] potentially unexpected fatal signal 5. [1983029.220034] CPU: 56 PID: 905454 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1983029.230531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1983029.240099] RIP: 0033:0x7fffffffe062 [1983029.244009] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1983029.263322] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1983029.268881] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1983029.277720] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1983029.285188] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1983029.292637] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1983029.300098] R13: 0000000000000022 R14: 000000c000157860 R15: 00000000000c523d [1983029.308933] FS: 00000000022d2550 GS: 0000000000000000 [1983029.500585] potentially unexpected fatal signal 5. [1983029.506345] CPU: 12 PID: 905446 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1983029.518229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1983029.529157] RIP: 0033:0x7fffffffe062 [1983029.533030] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1983029.547943] potentially unexpected fatal signal 5. [1983029.549412] potentially unexpected fatal signal 5. [1983029.549416] CPU: 77 PID: 825826 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1983029.549417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1983029.549421] RIP: 0033:0x7fffffffe062 [1983029.549423] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1983029.549424] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1983029.549426] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1983029.549426] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1983029.549427] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1983029.549427] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1983029.549428] R13: 0000000000000022 R14: 000000c0001b2340 R15: 00000000000c524a [1983029.549429] FS: 00000000022d2550 GS: 0000000000000000 [1983029.550560] potentially unexpected fatal signal 5. [1983029.550564] CPU: 91 PID: 905456 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1983029.550565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1983029.550568] RIP: 0033:0x7fffffffe062 [1983029.550571] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1983029.550572] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1983029.550573] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1983029.550574] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1983029.550575] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1983029.550576] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1983029.550576] R13: 0000000000000022 R14: 000000c0001b2340 R15: 00000000000c524a [1983029.550577] FS: 00000000022d2550 GS: 0000000000000000 [1983029.552226] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1983029.558665] CPU: 31 PID: 865616 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1983029.558666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1983029.558669] RIP: 0033:0x7fffffffe062 [1983029.558671] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1983029.558674] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1983029.565165] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1983029.565166] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1983029.565167] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1983029.565168] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1983029.565169] R13: 0000000000000022 R14: 000000c0001b2340 R15: 00000000000c524a [1983029.565170] FS: 00000000022d2550 GS: 0000000000000000 [1983029.721729] potentially unexpected fatal signal 5. [1983029.730041] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1983029.730043] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1983029.730044] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1983029.730044] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1983029.730045] R13: 0000000000000022 R14: 000000c0001b2340 R15: 00000000000c524a [1983029.730047] FS: 00000000022d2550 GS: 0000000000000000 [1983029.921006] CPU: 25 PID: 905439 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1983029.931505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1983029.942432] RIP: 0033:0x7fffffffe062 [1983029.947784] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1983029.968283] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1983029.975294] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1983029.984113] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1983029.993022] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1983030.000488] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1983030.007953] R13: 0000000000000022 R14: 000000c000157860 R15: 00000000000c523d [1983030.015417] FS: 00000000022d2550 GS: 0000000000000000 [1983247.451344] exe[879493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2f59858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983247.595637] exe[879401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2ef6858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983248.088260] exe[876378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2f38858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983248.118940] exe[876378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2f38858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983248.149646] exe[868890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2f38858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983248.178944] exe[868127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2f38858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983248.209631] exe[868127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2f38858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983248.236662] exe[868127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2f38858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983248.263895] exe[873917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2f38858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983248.292601] exe[873917] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc781097f9 cs:33 sp:7f10a2f38858 ax:0 si:55dc78162062 di:ffffffffff600000 [1983271.595443] warn_bad_vsyscall: 57 callbacks suppressed [1983271.595446] exe[886185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983271.730801] exe[879386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983271.867978] exe[893968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983271.991260] exe[869237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983272.131675] exe[879440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983272.273709] exe[869206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983272.393221] exe[886247] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983272.520840] exe[882230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983272.633980] exe[879371] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983272.742015] exe[895918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983277.094485] warn_bad_vsyscall: 40 callbacks suppressed [1983277.094489] exe[868890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983277.987388] exe[901912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983279.146838] exe[879847] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983279.270473] exe[895918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983279.387192] exe[873840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983279.504515] exe[901495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983279.608932] exe[902706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983279.700785] exe[868137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983279.810436] exe[869237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983279.920764] exe[893968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.135587] warn_bad_vsyscall: 49 callbacks suppressed [1983282.135590] exe[894576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.239599] exe[896482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.337388] exe[882367] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.364426] exe[879284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.393931] exe[879440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.421332] exe[879440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.449663] exe[879284] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.477398] exe[879357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.506075] exe[882004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983282.531648] exe[882004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983287.157726] warn_bad_vsyscall: 105 callbacks suppressed [1983287.157729] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983287.258965] exe[879298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983287.303259] exe[902709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983287.704356] exe[879267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983287.828141] exe[886185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983287.828154] exe[901557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983287.976760] exe[882230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983288.105222] exe[894531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983288.240125] exe[868890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983288.340723] exe[879298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983292.301449] warn_bad_vsyscall: 126 callbacks suppressed [1983292.301452] exe[873840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983292.418514] exe[894531] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983292.454873] exe[896493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd062ec858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983292.564970] exe[879413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983292.674489] exe[879493] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983292.779591] exe[894642] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983292.812940] exe[894580] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983292.915392] exe[882230] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983293.050156] exe[879401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983293.179669] exe[879871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0630d858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983297.410798] warn_bad_vsyscall: 130 callbacks suppressed [1983297.410801] exe[894611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983297.529175] exe[903130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983297.637305] exe[879871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983297.674756] exe[900726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983297.781774] exe[894566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983297.884422] exe[879401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983297.926905] exe[895918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983298.054687] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983298.156548] exe[894518] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983298.256295] exe[882004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983302.419228] warn_bad_vsyscall: 182 callbacks suppressed [1983302.419231] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983302.450521] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983302.478459] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983302.505185] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983302.534656] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983302.561430] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983302.589943] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983302.615613] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983302.642373] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983302.666986] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983307.493845] warn_bad_vsyscall: 168 callbacks suppressed [1983307.493848] exe[896484] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983307.604997] exe[878151] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983307.712710] exe[894591] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983307.808474] exe[895351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0630d858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983307.923719] exe[883682] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983308.018274] exe[895355] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d070 di:ffffffffff600000 [1983308.117733] exe[896559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d070 di:ffffffffff600000 [1983308.218577] exe[901459] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d070 di:ffffffffff600000 [1983308.325537] exe[893964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d070 di:ffffffffff600000 [1983308.462631] exe[896479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d070 di:ffffffffff600000 [1983312.546759] warn_bad_vsyscall: 49 callbacks suppressed [1983312.546763] exe[869236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983312.655807] exe[894481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983312.662984] exe[902735] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983312.774833] exe[873840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983313.062547] exe[869236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983313.189219] exe[900760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983313.227758] exe[871600] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983313.338356] exe[894481] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983313.449423] exe[894494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983313.555802] exe[893964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d097 di:ffffffffff600000 [1983437.322707] warn_bad_vsyscall: 1 callbacks suppressed [1983437.322711] exe[909059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56518c09d3ca cs:33 sp:7fb42fbf1ee8 ax:12 si:ffffffffff600000 di:56518c109ff2 [1983446.495527] exe[869193] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983446.594263] exe[868127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983446.631134] exe[893750] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0632e858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1983446.752583] exe[894524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ec7c4447f9 cs:33 sp:7fdd0634f858 ax:0 si:55ec7c49d062 di:ffffffffff600000 [1984795.973211] exe[962248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2bb97d7f9 cs:33 sp:7f5e6c479858 ax:0 si:55e2bb9d6070 di:ffffffffff600000 [1984796.031502] exe[962029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2bb97d7f9 cs:33 sp:7f5e6c479858 ax:0 si:55e2bb9d6070 di:ffffffffff600000 [1984796.727046] exe[961975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2bb97d7f9 cs:33 sp:7f5e6c479858 ax:0 si:55e2bb9d6070 di:ffffffffff600000 [1985493.240197] exe[947132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c120256af1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10000000 [1985494.110008] exe[947132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c120256af1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10000000 [1985494.130511] exe[977657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c120256af1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10000000 [1985494.999877] exe[977661] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c120256af1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:10000000 [1985711.149966] exe[971969] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e45dfc7f9 cs:33 sp:7f6c957fd858 ax:0 si:555e45e55062 di:ffffffffff600000 [1985711.586919] exe[939361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e45dfc7f9 cs:33 sp:7f6c957fd858 ax:0 si:555e45e55062 di:ffffffffff600000 [1985711.664362] exe[939361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555e45dfc7f9 cs:33 sp:7f6c957fd858 ax:0 si:555e45e55062 di:ffffffffff600000 [1986171.737849] exe[954095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56478f5397f9 cs:33 sp:7ef1eb9a7858 ax:0 si:56478f592097 di:ffffffffff600000 [1986171.881510] exe[985207] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56478f5397f9 cs:33 sp:7ef1eb9a7858 ax:0 si:56478f592097 di:ffffffffff600000 [1986172.054870] exe[954526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56478f5397f9 cs:33 sp:7ef1eb9a7858 ax:0 si:56478f592097 di:ffffffffff600000 [1986172.056843] exe[954290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56478f5397f9 cs:33 sp:7ef1eb986858 ax:0 si:56478f592097 di:ffffffffff600000 [1986998.630420] exe[15420] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55786cc213ca cs:33 sp:7f36d2e58ee8 ax:12 si:ffffffffff600000 di:55786cc8dff2 [1986998.680675] exe[8312] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55786cc213ca cs:33 sp:7f36d2e58ee8 ax:12 si:ffffffffff600000 di:55786cc8dff2 [1986998.757665] exe[16142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55786cc213ca cs:33 sp:7f36d2e58ee8 ax:12 si:ffffffffff600000 di:55786cc8dff2 [1987040.933480] exe[12573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9d63a7f9 cs:33 sp:7f126e676858 ax:0 si:55eb9d693062 di:ffffffffff600000 [1987041.082816] exe[17061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9d63a7f9 cs:33 sp:7f126e676858 ax:0 si:55eb9d693062 di:ffffffffff600000 [1987041.259835] exe[17041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb9d63a7f9 cs:33 sp:7f126e655858 ax:0 si:55eb9d693062 di:ffffffffff600000 [1987070.602039] exe[995429] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2cdf177f9 cs:33 sp:7f74d56b7ee8 ax:0 si:20003480 di:ffffffffff600000 [1987070.682779] exe[995627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2cdf177f9 cs:33 sp:7f74d56b7ee8 ax:0 si:20003480 di:ffffffffff600000 [1987070.803017] exe[993159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2cdf177f9 cs:33 sp:7f74d56b7ee8 ax:0 si:20003480 di:ffffffffff600000 [1988342.278626] exe[49826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55786cc213ca cs:33 sp:7f36d2e58ee8 ax:12 si:ffffffffff600000 di:55786cc8dff2 [1988342.378639] exe[42180] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55786cc213ca cs:33 sp:7f36d2e37ee8 ax:12 si:ffffffffff600000 di:55786cc8dff2 [1988342.379743] exe[40728] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55786cc213ca cs:33 sp:7f36d2e58ee8 ax:12 si:ffffffffff600000 di:55786cc8dff2 [1988342.539018] exe[43332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55786cc213ca cs:33 sp:7f36d2e58ee8 ax:12 si:ffffffffff600000 di:55786cc8dff2 [1988401.965311] exe[59861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2e259e7f9 cs:33 sp:7f8f14ae5ee8 ax:0 si:0 di:ffffffffff600000 [1988429.823635] exe[24755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf80d807f9 cs:33 sp:7ec4bf856ee8 ax:0 si:20000a80 di:ffffffffff600000 [1988429.982538] exe[24766] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf80d807f9 cs:33 sp:7ec4bf835ee8 ax:0 si:20000a80 di:ffffffffff600000 [1988430.108943] exe[24755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf80d807f9 cs:33 sp:7ec4bf835ee8 ax:0 si:20000a80 di:ffffffffff600000 [1988475.851167] exe[55861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cabf6307f9 cs:33 sp:7f0a5f6e4ee8 ax:0 si:200004c0 di:ffffffffff600000 [1988475.967509] exe[55861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cabf6307f9 cs:33 sp:7f0a5f6e4ee8 ax:0 si:200004c0 di:ffffffffff600000 [1988478.855054] exe[55868] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cabf6307f9 cs:33 sp:7f0a5f6e4ee8 ax:0 si:200004c0 di:ffffffffff600000 [1988546.106092] exe[59705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7b1eac7f9 cs:33 sp:7f7e0b220858 ax:0 si:55f7b1f05062 di:ffffffffff600000 [1988546.177060] exe[13094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7b1eac7f9 cs:33 sp:7f7e0adfe858 ax:0 si:55f7b1f05062 di:ffffffffff600000 [1988546.246654] exe[59710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7b1eac7f9 cs:33 sp:7f7e0b220858 ax:0 si:55f7b1f05062 di:ffffffffff600000 [1988546.271028] exe[61555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7b1eac7f9 cs:33 sp:7f7e0addd858 ax:0 si:55f7b1f05062 di:ffffffffff600000 [1988554.934883] exe[62623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e7f0bb7f9 cs:33 sp:7f265f326ee8 ax:0 si:20002840 di:ffffffffff600000 [1988555.032868] exe[58506] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e7f0bb7f9 cs:33 sp:7f265f326ee8 ax:0 si:20002840 di:ffffffffff600000 [1988555.135773] exe[58668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e7f0bb7f9 cs:33 sp:7f265f326ee8 ax:0 si:20002840 di:ffffffffff600000 [1988590.273473] exe[877853] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560073e637f9 cs:33 sp:7eef64e27ee8 ax:0 si:0 di:ffffffffff600000 [1988720.547997] exe[67709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a31e8817f9 cs:33 sp:7eeaabce3ee8 ax:0 si:0 di:ffffffffff600000 [1988795.484132] exe[64958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c30b187f9 cs:33 sp:7f54a1c5fee8 ax:0 si:0 di:ffffffffff600000 [1988825.386587] exe[48897] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572c3e687f9 cs:33 sp:7f5bcabfeee8 ax:0 si:0 di:ffffffffff600000 [1988827.498558] exe[56126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e7e75c7f9 cs:33 sp:7f32c4638ee8 ax:0 si:0 di:ffffffffff600000 [1988850.082281] exe[3774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75f7a07f9 cs:33 sp:7eb9d4df4ee8 ax:0 si:0 di:ffffffffff600000 [1988856.345768] exe[54645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bd00f7f9 cs:33 sp:7f649727aee8 ax:0 si:0 di:ffffffffff600000 [1988863.902100] exe[30884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557693b917f9 cs:33 sp:7f1ee7f3dee8 ax:0 si:0 di:ffffffffff600000 [1988894.191398] exe[64746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556ae10077f9 cs:33 sp:7efc23393ee8 ax:0 si:0 di:ffffffffff600000 [1988922.694862] exe[48425] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555fb5d307f9 cs:33 sp:7fec38af3ee8 ax:0 si:0 di:ffffffffff600000 [1988972.494484] exe[36776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d2b3917f9 cs:33 sp:7f19276b1ee8 ax:0 si:0 di:ffffffffff600000 [1989028.432202] exe[63611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc03de57f9 cs:33 sp:7f40f0dc8ee8 ax:0 si:0 di:ffffffffff600000 [1989034.215723] exe[44165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d016f77f9 cs:33 sp:7ed141d2bee8 ax:0 si:0 di:ffffffffff600000 [1989082.735978] exe[993730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56347043e7f9 cs:33 sp:7f64c8b0bee8 ax:0 si:0 di:ffffffffff600000 [1989137.620671] exe[50159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560bbb6167f9 cs:33 sp:7f129413d858 ax:0 si:560bbb66f070 di:ffffffffff600000 [1989137.764534] exe[55119] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560bbb6167f9 cs:33 sp:7f129411c858 ax:0 si:560bbb66f070 di:ffffffffff600000 [1989138.547529] exe[47324] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560bbb6167f9 cs:33 sp:7f129411c858 ax:0 si:560bbb66f070 di:ffffffffff600000 [1989190.605568] exe[74009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c31b8967f9 cs:33 sp:7f0c28c2fee8 ax:0 si:0 di:ffffffffff600000 [1989247.559115] exe[44711] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56335c97a7f9 cs:33 sp:7eccc6d6f858 ax:0 si:56335c9d3062 di:ffffffffff600000 [1989247.717791] exe[44172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56335c97a7f9 cs:33 sp:7eccc6d4e858 ax:0 si:56335c9d3062 di:ffffffffff600000 [1989247.844104] exe[53876] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56335c97a7f9 cs:33 sp:7eccc6d6f858 ax:0 si:56335c9d3062 di:ffffffffff600000 [1990296.404187] potentially unexpected fatal signal 5. [1990296.409418] CPU: 81 PID: 95443 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1990296.419838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1990296.424891] potentially unexpected fatal signal 5. [1990296.429368] RIP: 0033:0x7fffffffe062 [1990296.434492] CPU: 84 PID: 95444 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1990296.438349] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1990296.438350] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1990296.438352] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1990296.438352] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1990296.438353] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1990296.438353] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1990296.438354] R13: 0000000000000022 R14: 000000c000580d00 R15: 00000000000f2bd3 [1990296.438355] FS: 00000000022d2550 GS: 0000000000000000 [1990296.516327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1990296.526047] RIP: 0033:0x7fffffffe062 [1990296.531328] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1990296.551841] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1990296.558785] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1990296.566323] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1990296.575163] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1990296.584076] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1990296.591546] R13: 0000000000000022 R14: 000000c000007520 R15: 00000000000f2bd2 [1990296.600376] FS: 000000c000130890 GS: 0000000000000000 [1991360.728975] exe[142348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564473b553ca cs:33 sp:7eb2f44a9ee8 ax:12 si:ffffffffff600000 di:564473bc1ff2 [1991360.804981] exe[142348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564473b553ca cs:33 sp:7eb2f44a9ee8 ax:12 si:ffffffffff600000 di:564473bc1ff2 [1991360.877589] exe[142325] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564473b553ca cs:33 sp:7eb2f44a9ee8 ax:12 si:ffffffffff600000 di:564473bc1ff2 [1991545.259614] exe[154287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4065ca7f9 cs:33 sp:7f1b7abd3858 ax:0 si:55f406623070 di:ffffffffff600000 [1991545.352642] exe[148117] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4065ca7f9 cs:33 sp:7f1b7abd3858 ax:0 si:55f406623070 di:ffffffffff600000 [1991545.457977] exe[153756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f4065ca7f9 cs:33 sp:7f1b7abd3858 ax:0 si:55f406623070 di:ffffffffff600000 [1991996.810327] exe[158330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ae20da7f9 cs:33 sp:7f60d4837858 ax:0 si:558ae2133070 di:ffffffffff600000 [1991996.903082] exe[159321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ae20da7f9 cs:33 sp:7f60d43fe858 ax:0 si:558ae2133070 di:ffffffffff600000 [1991996.999368] exe[158329] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558ae20da7f9 cs:33 sp:7f60d43fe858 ax:0 si:558ae2133070 di:ffffffffff600000 [1992346.083193] exe[107393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56238c7b67f9 cs:33 sp:7f2782ba9858 ax:0 si:56238c80f070 di:ffffffffff600000 [1992346.157828] exe[150406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56238c7b67f9 cs:33 sp:7f2782ba9858 ax:0 si:56238c80f070 di:ffffffffff600000 [1992346.228749] exe[150406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56238c7b67f9 cs:33 sp:7f2782ba9858 ax:0 si:56238c80f070 di:ffffffffff600000 [1992346.256923] exe[129435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56238c7b67f9 cs:33 sp:7f2782ba9858 ax:0 si:56238c80f070 di:ffffffffff600000 [1993658.324110] exe[102890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f51eeee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993658.493886] exe[102866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f5149ee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993658.514349] exe[102866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f5149ee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993658.536490] exe[102866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f5149ee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993658.558828] exe[102866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f5149ee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993658.580261] exe[102866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f5149ee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993658.600565] exe[102866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f5149ee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993658.621673] exe[102866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f5149ee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993658.642771] exe[102866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f5149ee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993658.664783] exe[102866] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f401d083ca cs:33 sp:7f66f5149ee8 ax:12 si:ffffffffff600000 di:55f401d74ff2 [1993862.229620] potentially unexpected fatal signal 5. [1993862.234753] CPU: 87 PID: 191888 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.245266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.254827] RIP: 0033:0x7fffffffe062 [1993862.258730] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.261727] potentially unexpected fatal signal 5. [1993862.279313] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1993862.284395] CPU: 83 PID: 207677 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.284397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.284400] RIP: 0033:0x7fffffffe062 [1993862.284403] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.303322] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1993862.303324] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1993862.303325] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1993862.303326] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1993862.303326] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1993862.303326] R13: 0000000000000022 R14: 000000c00015c4e0 R15: 0000000000016778 [1993862.303327] FS: 00000000022d2550 GS: 0000000000000000 [1993862.392815] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1993862.400297] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1993862.409099] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1993862.416546] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1993862.420317] potentially unexpected fatal signal 5. [1993862.425382] R13: 0000000000000022 R14: 000000c00015c4e0 R15: 0000000000016778 [1993862.430487] CPU: 20 PID: 184660 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.430490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.439301] FS: 00000000022d2550 GS: 0000000000000000 [1993862.469270] RIP: 0033:0x7fffffffe062 [1993862.474550] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.490154] potentially unexpected fatal signal 5. [1993862.490258] potentially unexpected fatal signal 5. [1993862.490262] CPU: 42 PID: 116834 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.490263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.490268] RIP: 0033:0x7fffffffe062 [1993862.490272] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.490273] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1993862.490275] RAX: 0000000000032b90 RBX: 0000000000000000 RCX: 00007fffffffe05a [1993862.490276] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [1993862.490277] RBP: 000000c00013de38 R08: 000000c0083d4e20 R09: 0000000000000000 [1993862.490277] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1993862.490278] R13: 0000000000000022 R14: 000000c0001a71e0 R15: 00000000000167af [1993862.490279] FS: 000000c000180090 GS: 0000000000000000 [1993862.495019] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1993862.501499] CPU: 47 PID: 95982 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.501500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.501504] RIP: 0033:0x7fffffffe062 [1993862.501507] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.507966] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1993862.507967] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1993862.507968] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1993862.507969] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1993862.507969] R13: 0000000000000022 R14: 000000c0001a71e0 R15: 00000000000167af [1993862.507970] FS: 000000c000180090 GS: 0000000000000000 [1993862.551926] potentially unexpected fatal signal 5. [1993862.556567] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1993862.563494] CPU: 40 PID: 94284 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.563495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.563501] RIP: 0033:0x7fffffffe062 [1993862.571019] RAX: 0000000000032b8f RBX: 0000000000000000 RCX: 00007fffffffe05a [1993862.571020] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [1993862.571021] RBP: 000000c00013de38 R08: 000000c0044a2970 R09: 0000000000000000 [1993862.571021] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1993862.571022] R13: 0000000000000022 R14: 000000c0001a71e0 R15: 00000000000167af [1993862.571022] FS: 000000c000180090 GS: 0000000000000000 [1993862.713701] potentially unexpected fatal signal 5. [1993862.715652] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.715654] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1993862.716114] potentially unexpected fatal signal 5. [1993862.716117] CPU: 91 PID: 100415 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.716118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.716122] RIP: 0033:0x7fffffffe062 [1993862.716124] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.716125] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1993862.716127] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1993862.716128] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1993862.716128] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1993862.716129] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [1993862.716130] R13: 0000000000000032 R14: 000000c00017c4e0 R15: 000000000001675a [1993862.716131] FS: 000000c000130490 GS: 0000000000000000 [1993862.727438] CPU: 26 PID: 153426 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.737065] RAX: 0000000000032b5d RBX: 0000000000000000 RCX: 00007fffffffe05a [1993862.740954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.740958] RIP: 0033:0x7fffffffe062 [1993862.740961] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.740962] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1993862.740963] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1993862.740964] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1993862.740965] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1993862.740965] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1993862.740966] R13: 0000000000000022 R14: 000000c00015c4e0 R15: 0000000000016778 [1993862.740967] FS: 00000000022d2550 GS: 0000000000000000 [1993862.904473] potentially unexpected fatal signal 5. [1993862.907177] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [1993862.907180] RBP: 000000c000193e38 R08: 000000c001a6b0f0 R09: 0000000000000000 [1993862.914743] CPU: 74 PID: 187953 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.921626] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1993862.921627] R13: 0000000000000022 R14: 000000c00015c4e0 R15: 0000000000016778 [1993862.921627] FS: 00000000022d2550 GS: 0000000000000000 [1993862.924878] potentially unexpected fatal signal 5. [1993862.933587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.941163] CPU: 80 PID: 94305 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993862.941164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993862.941168] RIP: 0033:0x7fffffffe062 [1993862.941170] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.941171] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1993862.941172] RAX: 0000000000032b6f RBX: 0000000000000000 RCX: 00007fffffffe05a [1993862.941175] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [1993862.952087] RIP: 0033:0x7fffffffe062 [1993862.952090] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993862.952092] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1993862.957609] RBP: 000000c000193e38 R08: 000000c001adaa60 R09: 0000000000000000 [1993862.957609] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1993862.957610] R13: 0000000000000022 R14: 000000c00015c4e0 R15: 0000000000016778 [1993862.957611] FS: 00000000022d2550 GS: 0000000000000000 [1993863.226647] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1993863.234199] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1993863.243012] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1993863.251964] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1993863.260778] R13: 0000000000000022 R14: 000000c0001a71e0 R15: 00000000000167af [1993863.269798] FS: 000000c000180090 GS: 0000000000000000 [1993888.960683] warn_bad_vsyscall: 57 callbacks suppressed [1993888.960686] exe[209743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640260737f9 cs:33 sp:7fbb40b5d858 ax:0 si:5640260cc097 di:ffffffffff600000 [1993889.032638] exe[210628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640260737f9 cs:33 sp:7fbb40b5d858 ax:0 si:5640260cc097 di:ffffffffff600000 [1993889.131127] exe[210628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640260737f9 cs:33 sp:7fbb40b5d858 ax:0 si:5640260cc097 di:ffffffffff600000 [1993889.150140] exe[209467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5640260737f9 cs:33 sp:7fbb40b3c858 ax:0 si:5640260cc097 di:ffffffffff600000 [1993906.820717] potentially unexpected fatal signal 5. [1993906.825862] CPU: 71 PID: 211618 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1993906.836356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1993906.845910] RIP: 0033:0x7fffffffe062 [1993906.849880] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1993906.868954] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1993906.874488] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1993906.882057] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1993906.889521] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1993906.896973] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [1993906.904420] R13: 0000000000000022 R14: 000000c000183040 R15: 00000000000177d2 [1993906.911947] FS: 000000c000131090 GS: 0000000000000000 [1994000.472613] potentially unexpected fatal signal 5. [1994000.477728] CPU: 55 PID: 217530 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1994000.488205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1994000.497749] RIP: 0033:0x7fffffffe062 [1994000.501676] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1994000.520786] RSP: 002b:000000c0004e9d98 EFLAGS: 00000297 [1994000.527790] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1994000.535273] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1994000.544214] RBP: 000000c0004e9e38 R08: 0000000000000000 R09: 0000000000000000 [1994000.551862] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0004e9e20 [1994000.560668] R13: 0000000000000022 R14: 000000c000522680 R15: 0000000000018e9c [1994000.568201] FS: 00000000022d2550 GS: 0000000000000000 [1994069.451222] potentially unexpected fatal signal 5. [1994069.456343] CPU: 67 PID: 223495 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1994069.466844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1994069.476389] RIP: 0033:0x7fffffffe062 [1994069.480278] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1994069.499384] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1994069.504913] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1994069.512378] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1994069.521216] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1994069.528686] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1994069.537500] R13: 0000000000000034 R14: 000000c00015f1e0 R15: 000000000001a6cb [1994069.545006] FS: 0000000001ff7f10 GS: 0000000000000000 [1994419.521387] exe[222988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c24abd53ca cs:33 sp:7fb44e396ee8 ax:12 si:ffffffffff600000 di:55c24ac41ff2 [1994419.615731] exe[222963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c24abd53ca cs:33 sp:7fb44e396ee8 ax:12 si:ffffffffff600000 di:55c24ac41ff2 [1994419.718179] exe[222980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c24abd53ca cs:33 sp:7fb44e396ee8 ax:12 si:ffffffffff600000 di:55c24ac41ff2 [1994593.236898] exe[238263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c73aaee8 ax:0 si:20000780 di:ffffffffff600000 [1994593.662611] exe[251718] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c7368ee8 ax:0 si:20000780 di:ffffffffff600000 [1994593.798769] exe[250200] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c73aaee8 ax:0 si:20000780 di:ffffffffff600000 [1994593.825895] exe[252157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c73aaee8 ax:0 si:20000780 di:ffffffffff600000 [1994593.853653] exe[238149] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c73aaee8 ax:0 si:20000780 di:ffffffffff600000 [1994593.884269] exe[248881] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c73aaee8 ax:0 si:20000780 di:ffffffffff600000 [1994593.916793] exe[252157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c73aaee8 ax:0 si:20000780 di:ffffffffff600000 [1994593.946963] exe[252157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c73aaee8 ax:0 si:20000780 di:ffffffffff600000 [1994593.977391] exe[248571] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c73aaee8 ax:0 si:20000780 di:ffffffffff600000 [1994594.014531] exe[248564] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56343a4de7f9 cs:33 sp:7f09c73aaee8 ax:0 si:20000780 di:ffffffffff600000 [1995602.050186] warn_bad_vsyscall: 57 callbacks suppressed [1995602.050189] exe[273170] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7848c93ca cs:33 sp:7ec1766e8ee8 ax:12 si:ffffffffff600000 di:55a784935ff2 [1995602.791928] exe[276650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7848c93ca cs:33 sp:7ec1766e8ee8 ax:12 si:ffffffffff600000 di:55a784935ff2 [1995602.838117] exe[275126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7848c93ca cs:33 sp:7ec1766e8ee8 ax:12 si:ffffffffff600000 di:55a784935ff2 [1995899.292629] exe[248389] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bdbea83ca cs:33 sp:7f247fd8dee8 ax:12 si:ffffffffff600000 di:557bdbf14ff2 [1995899.407374] exe[213559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bdbea83ca cs:33 sp:7f247fd8dee8 ax:12 si:ffffffffff600000 di:557bdbf14ff2 [1995899.543656] exe[213559] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bdbea83ca cs:33 sp:7f247fd6cee8 ax:12 si:ffffffffff600000 di:557bdbf14ff2 [1996844.509285] exe[222944] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556618a693ca cs:33 sp:7fbcd2f8bee8 ax:12 si:ffffffffff600000 di:556618ad5ff2 [1996844.626923] exe[222979] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556618a693ca cs:33 sp:7fbcd2f8bee8 ax:12 si:ffffffffff600000 di:556618ad5ff2 [1996844.630297] exe[223283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556618a693ca cs:33 sp:7fbcd2f6aee8 ax:12 si:ffffffffff600000 di:556618ad5ff2 [1996844.765034] exe[249006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556618a693ca cs:33 sp:7fbcd2f8bee8 ax:12 si:ffffffffff600000 di:556618ad5ff2 [1996844.802609] exe[249006] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556618a693ca cs:33 sp:7fbcd2f6aee8 ax:12 si:ffffffffff600000 di:556618ad5ff2 [1997473.306288] potentially unexpected fatal signal 5. [1997473.311436] CPU: 76 PID: 299707 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1997473.321986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1997473.331541] RIP: 0033:0x7fffffffe062 [1997473.335551] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1997473.356236] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [1997473.363142] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1997473.371974] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1997473.380810] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [1997473.389640] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [1997473.398492] R13: 000000000000003e R14: 000000c0004ec4e0 R15: 0000000000032e62 [1997473.407423] FS: 0000000001ff7f10 GS: 0000000000000000 [1997474.784674] potentially unexpected fatal signal 5. [1997474.789840] CPU: 42 PID: 270051 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1997474.800548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1997474.810201] RIP: 0033:0x7fffffffe062 [1997474.814135] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1997474.815107] potentially unexpected fatal signal 5. [1997474.833237] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1997474.833239] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1997474.833240] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1997474.833240] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1997474.833241] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [1997474.833242] R13: 0000000000000022 R14: 000000c000506340 R15: 0000000000032ebe [1997474.833242] FS: 000000c000180090 GS: 0000000000000000 [1997474.888412] CPU: 85 PID: 299804 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1997474.900348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1997474.911278] RIP: 0033:0x7fffffffe062 [1997474.916612] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1997474.937292] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [1997474.944234] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1997474.951679] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1997474.959155] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [1997474.967984] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [1997474.975444] R13: 0000000000000022 R14: 000000c000506340 R15: 0000000000032ebe [1997474.982911] FS: 000000c000180090 GS: 0000000000000000 [1997518.481481] potentially unexpected fatal signal 5. [1997518.486644] CPU: 82 PID: 234370 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1997518.492622] potentially unexpected fatal signal 5. [1997518.497397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1997518.502482] CPU: 32 PID: 303763 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1997518.512000] RIP: 0033:0x7fffffffe062 [1997518.522493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1997518.522495] RIP: 0033:0x7fffffffe062 [1997518.522498] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1997518.522499] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1997518.522500] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1997518.522501] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1997518.522501] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1997518.522502] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1997518.522503] R13: 000000000000001e R14: 000000c0001a8820 R15: 0000000000033c9b [1997518.522504] FS: 00000000022d2550 GS: 0000000000000000 [1997518.611573] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1997518.630800] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1997518.637685] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1997518.646533] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1997518.655371] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1997518.664210] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [1997518.673053] R13: 000000000000001e R14: 000000c0001a8820 R15: 0000000000033c9b [1997518.681986] FS: 00000000022d2550 GS: 0000000000000000 [1997679.378973] potentially unexpected fatal signal 5. [1997679.384114] CPU: 35 PID: 259343 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [1997679.394611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [1997679.404217] RIP: 0033:0x7fffffffe062 [1997679.408107] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [1997679.427237] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [1997679.433334] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [1997679.440862] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [1997679.449772] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [1997679.458633] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [1997679.466173] R13: 0000000000000036 R14: 000000c0001a9380 R15: 0000000000036d76 [1997679.473632] FS: 000000c000130c90 GS: 0000000000000000 [1997979.870017] exe[313693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e686db43ca cs:33 sp:7fa1038a1ee8 ax:12 si:ffffffffff600000 di:55e686e20ff2 [1997979.994857] exe[324158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e686db43ca cs:33 sp:7fa1038a1ee8 ax:12 si:ffffffffff600000 di:55e686e20ff2 [1997979.994963] exe[335988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e686db43ca cs:33 sp:7fa103880ee8 ax:12 si:ffffffffff600000 di:55e686e20ff2 [1997980.143158] exe[335988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e686db43ca cs:33 sp:7fa1038a1ee8 ax:12 si:ffffffffff600000 di:55e686e20ff2 [1998973.809275] exe[373083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5ba9293ca cs:33 sp:7f922eef8ee8 ax:12 si:ffffffffff600000 di:55e5ba995ff2 [1998973.897710] exe[324432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5ba9293ca cs:33 sp:7f922ee95ee8 ax:12 si:ffffffffff600000 di:55e5ba995ff2 [1998974.045323] exe[326945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e5ba9293ca cs:33 sp:7f922eef8ee8 ax:12 si:ffffffffff600000 di:55e5ba995ff2 [1999061.809643] exe[336411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88f5583ca cs:33 sp:7fa696ed7ee8 ax:12 si:ffffffffff600000 di:55c88f5c4ff2 [1999061.949752] exe[336426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88f5583ca cs:33 sp:7fa696e95ee8 ax:12 si:ffffffffff600000 di:55c88f5c4ff2 [1999062.095848] exe[369721] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c88f5583ca cs:33 sp:7fa696ed7ee8 ax:12 si:ffffffffff600000 di:55c88f5c4ff2 [1999644.147495] exe[369688] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0464f67f9 cs:33 sp:7fba9cc3a858 ax:0 si:55e04654f062 di:ffffffffff600000 [1999644.357323] exe[382319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0464f67f9 cs:33 sp:7fba9cc3a858 ax:0 si:55e04654f062 di:ffffffffff600000 [1999646.960330] exe[372710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0464f67f9 cs:33 sp:7fba9cc3a858 ax:0 si:55e04654f062 di:ffffffffff600000 [1999903.776992] exe[383008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c075a6e7f9 cs:33 sp:7fe5ffec8ee8 ax:0 si:20000040 di:ffffffffff600000 [1999904.035606] exe[367770] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c075a6e7f9 cs:33 sp:7fe5ffec8ee8 ax:0 si:20000040 di:ffffffffff600000 [1999904.555659] exe[382503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c075a6e7f9 cs:33 sp:7fe5ffec8ee8 ax:0 si:20000040 di:ffffffffff600000 [2000104.322177] exe[292435] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623a93913ca cs:33 sp:7ebc2df0dee8 ax:12 si:ffffffffff600000 di:5623a93fdff2 [2000104.484318] exe[314048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623a93913ca cs:33 sp:7ebc2df0dee8 ax:12 si:ffffffffff600000 di:5623a93fdff2 [2000104.681236] exe[381130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5623a93913ca cs:33 sp:7ebc2df0dee8 ax:12 si:ffffffffff600000 di:5623a93fdff2 [2001083.702445] potentially unexpected fatal signal 5. [2001083.707567] CPU: 76 PID: 332843 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2001083.718080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2001083.727617] RIP: 0033:0x7fffffffe062 [2001083.731485] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2001083.750549] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2001083.756126] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2001083.763607] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2001083.772443] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2001083.779888] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2001083.787333] R13: 000000000000003e R14: 000000c0004a29c0 R15: 0000000000049593 [2001083.794822] FS: 0000000001ff7f10 GS: 0000000000000000 [2001129.962355] potentially unexpected fatal signal 5. [2001129.967487] CPU: 41 PID: 431296 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2001129.978126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2001129.987747] RIP: 0033:0x7fffffffe062 [2001129.991655] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2001130.010727] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2001130.016506] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2001130.023946] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2001130.032753] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2001130.040289] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2001130.047821] R13: 0000000000000022 R14: 000000c0001829c0 R15: 000000000004a6dd [2001130.055251] FS: 000000c000130490 GS: 0000000000000000 [2001130.073951] potentially unexpected fatal signal 5. [2001130.079912] CPU: 36 PID: 431332 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2001130.090432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2001130.101561] RIP: 0033:0x7fffffffe062 [2001130.106816] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2001130.127905] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2001130.134794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2001130.142712] potentially unexpected fatal signal 5. [2001130.143706] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2001130.148817] CPU: 27 PID: 431347 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2001130.157624] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2001130.157625] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2001130.157626] R13: 0000000000000022 R14: 000000c0001829c0 R15: 000000000004a6dd [2001130.157627] FS: 000000c000130490 GS: 0000000000000000 [2001130.198753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2001130.208370] RIP: 0033:0x7fffffffe062 [2001130.213605] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2001130.232710] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2001130.239697] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2001130.248526] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2001130.257363] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2001130.266164] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2001130.273709] R13: 0000000000000022 R14: 000000c0001829c0 R15: 000000000004a6dd [2001130.282631] FS: 000000c000130490 GS: 0000000000000000 [2001130.330567] potentially unexpected fatal signal 5. [2001130.336451] CPU: 83 PID: 431294 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2001130.347031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2001130.356559] RIP: 0033:0x7fffffffe062 [2001130.361819] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2001130.382275] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2001130.387795] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2001130.395407] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2001130.404302] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2001130.413160] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2001130.420586] R13: 0000000000000022 R14: 000000c0001829c0 R15: 000000000004a6dd [2001130.428024] FS: 000000c000130490 GS: 0000000000000000 [2001174.800287] exe[405184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f850387f9 cs:33 sp:7f174b7bf858 ax:0 si:556f85091097 di:ffffffffff600000 [2001175.700218] exe[405186] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f850387f9 cs:33 sp:7f174b7bf858 ax:0 si:556f85091097 di:ffffffffff600000 [2001176.620681] exe[396797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556f850387f9 cs:33 sp:7f174b7bf858 ax:0 si:556f85091097 di:ffffffffff600000 [2001290.971215] potentially unexpected fatal signal 5. [2001290.976337] CPU: 54 PID: 381677 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2001290.986871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2001290.996397] RIP: 0033:0x7fffffffe062 [2001291.000261] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2001291.019410] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [2001291.024950] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2001291.032431] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2001291.039883] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [2001291.048745] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00058fe20 [2001291.056194] R13: 0000000000000034 R14: 000000c000007a00 R15: 000000000004d886 [2001291.065028] FS: 000000c000130890 GS: 0000000000000000 [2001291.535262] potentially unexpected fatal signal 5. [2001291.540379] CPU: 15 PID: 358471 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2001291.551017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2001291.560544] RIP: 0033:0x7fffffffe062 [2001291.564508] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2001291.583692] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [2001291.589251] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2001291.596700] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2001291.604158] RBP: 000000c00058fe38 R08: 0000000000000000 R09: 0000000000000000 [2001291.611600] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00058fe20 [2001291.620592] R13: 0000000000000034 R14: 000000c000007a00 R15: 000000000004d886 [2001291.629442] FS: 000000c000130890 GS: 0000000000000000 [2002298.492158] exe[461996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002298.564077] exe[461996] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002298.622945] exe[467852] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002310.865218] exe[445067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002310.930019] exe[482647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002310.998243] exe[455650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002311.078511] exe[482665] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002311.170536] exe[487072] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002311.249805] exe[479080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002311.336571] exe[455650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002311.426986] exe[482697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002311.490659] exe[450503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002311.554090] exe[451906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eab17d97f9 cs:33 sp:7f5568b42858 ax:0 si:55eab1832070 di:ffffffffff600000 [2002409.494210] warn_bad_vsyscall: 3 callbacks suppressed [2002409.494213] exe[482635] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4062 di:ffffffffff600000 [2002409.595282] exe[482703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4062 di:ffffffffff600000 [2002409.596094] exe[450424] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4062 di:ffffffffff600000 [2002409.753003] exe[450158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4062 di:ffffffffff600000 [2002409.845993] exe[450166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4097 di:ffffffffff600000 [2002409.989063] exe[445884] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4097 di:ffffffffff600000 [2002410.134463] exe[479056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4097 di:ffffffffff600000 [2002410.217328] exe[450418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4097 di:ffffffffff600000 [2002410.281577] exe[450166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4097 di:ffffffffff600000 [2002410.353740] exe[461983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4097 di:ffffffffff600000 [2002414.495270] warn_bad_vsyscall: 101 callbacks suppressed [2002414.495273] exe[450182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002414.520595] exe[450182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002414.541694] exe[450182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002414.562310] exe[461983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002414.583241] exe[462625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002414.604081] exe[462625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002414.626830] exe[462625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002414.648412] exe[462625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002414.668532] exe[462625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002414.689148] exe[462625] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002419.524423] warn_bad_vsyscall: 159 callbacks suppressed [2002419.524426] exe[450182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4097 di:ffffffffff600000 [2002419.566547] exe[461980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4097 di:ffffffffff600000 [2002419.622329] exe[482939] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002419.712360] exe[482908] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002419.837746] exe[457927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002419.839140] exe[451923] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c27858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002419.936963] exe[476287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002420.033818] exe[457927] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002420.078735] exe[477128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002420.151642] exe[461980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002424.575262] warn_bad_vsyscall: 191 callbacks suppressed [2002424.575265] exe[445067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002424.697364] exe[450615] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002424.768318] exe[450675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb977fe858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002424.836135] exe[482697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4062 di:ffffffffff600000 [2002424.962061] exe[450146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4062 di:ffffffffff600000 [2002425.064656] exe[450512] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4062 di:ffffffffff600000 [2002425.164594] exe[445243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002425.250336] exe[450647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002425.274570] exe[450675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002425.365085] exe[450374] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2002740.279677] warn_bad_vsyscall: 143 callbacks suppressed [2002740.279680] exe[501026] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56228cdc17f9 cs:33 sp:7fbf85a63858 ax:0 si:56228ce1a070 di:ffffffffff600000 [2002748.625813] exe[499645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572b87fe7f9 cs:33 sp:7f346a879858 ax:0 si:5572b8857070 di:ffffffffff600000 [2002764.277578] exe[421104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d2f6d47f9 cs:33 sp:7eb11e1fe858 ax:0 si:559d2f72d070 di:ffffffffff600000 [2002773.940001] exe[491827] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a92d5f77f9 cs:33 sp:7fae5e1fe858 ax:0 si:55a92d650070 di:ffffffffff600000 [2002784.642068] exe[480904] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639d5ee47f9 cs:33 sp:7ee436f4d858 ax:0 si:5639d5f3d070 di:ffffffffff600000 [2002829.618439] exe[492430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb7942b7f9 cs:33 sp:7f8f2b083858 ax:0 si:55fb79484070 di:ffffffffff600000 [2002829.724454] exe[504221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb7942b7f9 cs:33 sp:7f8f2b083858 ax:0 si:55fb79484070 di:ffffffffff600000 [2002829.764204] exe[504245] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb7942b7f9 cs:33 sp:7f8f2b083858 ax:0 si:55fb79484070 di:ffffffffff600000 [2002829.887080] exe[492430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb7942b7f9 cs:33 sp:7f8f2b083858 ax:0 si:55fb79484070 di:ffffffffff600000 [2002829.897023] exe[485599] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fb7942b7f9 cs:33 sp:7f8f2b062858 ax:0 si:55fb79484070 di:ffffffffff600000 [2002908.789367] exe[459159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562149b197f9 cs:33 sp:7f1b7213d858 ax:0 si:562149b72062 di:ffffffffff600000 [2002908.879721] exe[498387] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562149b197f9 cs:33 sp:7f1b7211c858 ax:0 si:562149b72062 di:ffffffffff600000 [2002908.958610] exe[499781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562149b197f9 cs:33 sp:7f1b7211c858 ax:0 si:562149b72062 di:ffffffffff600000 [2003149.792903] exe[490116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bbd0f957f9 cs:33 sp:7fc550a52858 ax:0 si:55bbd0fee070 di:ffffffffff600000 [2003172.992071] exe[433854] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5645a01037f9 cs:33 sp:7ecb720f8858 ax:0 si:5645a015c070 di:ffffffffff600000 [2003220.014965] exe[516086] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561ba82da7f9 cs:33 sp:7f7249231858 ax:0 si:561ba8333070 di:ffffffffff600000 [2003233.430750] exe[471555] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563624db87f9 cs:33 sp:7fbca847e858 ax:0 si:563624e11070 di:ffffffffff600000 [2003261.923772] exe[494811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5586241ad7f9 cs:33 sp:7f82cdf62858 ax:0 si:558624206070 di:ffffffffff600000 [2003298.490652] exe[504641] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd737be7f9 cs:33 sp:7ebe4ccbfee8 ax:0 si:200034c0 di:ffffffffff600000 [2003298.644832] exe[504548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd737be7f9 cs:33 sp:7ebe4ccbfee8 ax:0 si:200034c0 di:ffffffffff600000 [2003298.809167] exe[489292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd737be7f9 cs:33 sp:7ebe4ccbfee8 ax:0 si:200034c0 di:ffffffffff600000 [2003298.851563] exe[489292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd737be7f9 cs:33 sp:7ebe4ccbfee8 ax:0 si:200034c0 di:ffffffffff600000 [2003377.783779] exe[518041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561edf7a87f9 cs:33 sp:7f2f9f332858 ax:0 si:561edf801070 di:ffffffffff600000 [2003397.872902] exe[459556] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be4ce0b7f9 cs:33 sp:7ead06dda858 ax:0 si:55be4ce64070 di:ffffffffff600000 [2003408.234694] exe[478608] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d403e967f9 cs:33 sp:7fe6e4a34858 ax:0 si:55d403eef070 di:ffffffffff600000 [2003467.964873] exe[521803] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652dfca87f9 cs:33 sp:7fa8ee06c858 ax:0 si:5652dfd01062 di:ffffffffff600000 [2003468.858299] exe[521458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652dfca87f9 cs:33 sp:7fa8ee06c858 ax:0 si:5652dfd01062 di:ffffffffff600000 [2003468.896922] exe[522074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652dfca87f9 cs:33 sp:7fa8ee02a858 ax:0 si:5652dfd01062 di:ffffffffff600000 [2003469.761931] exe[485011] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5652dfca87f9 cs:33 sp:7fa8ee04b858 ax:0 si:5652dfd01062 di:ffffffffff600000 [2003622.109844] exe[520127] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558c487957f9 cs:33 sp:7f291bdfe858 ax:0 si:558c487ee070 di:ffffffffff600000 [2004468.153326] exe[522274] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccfa0903ca cs:33 sp:7f45c6bfeee8 ax:12 si:ffffffffff600000 di:55ccfa0fcff2 [2004468.268700] exe[501945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccfa0903ca cs:33 sp:7f45c6bddee8 ax:12 si:ffffffffff600000 di:55ccfa0fcff2 [2004468.498243] exe[515497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ccfa0903ca cs:33 sp:7f45c6bfeee8 ax:12 si:ffffffffff600000 di:55ccfa0fcff2 [2004496.442819] exe[502437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572b87fe7f9 cs:33 sp:7f346a879858 ax:0 si:5572b8857097 di:ffffffffff600000 [2004496.573479] exe[496248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572b87fe7f9 cs:33 sp:7f346a858858 ax:0 si:5572b8857097 di:ffffffffff600000 [2004496.720240] exe[528212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572b87fe7f9 cs:33 sp:7f346a837858 ax:0 si:5572b8857097 di:ffffffffff600000 [2004740.587549] potentially unexpected fatal signal 5. [2004740.592674] CPU: 49 PID: 437644 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2004740.603230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2004740.612751] RIP: 0033:0x7fffffffe062 [2004740.616617] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2004740.635798] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2004740.641371] RAX: 0000000000083d51 RBX: 0000000000000000 RCX: 00007fffffffe05a [2004740.650318] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [2004740.659146] RBP: 000000c000193e38 R08: 000000c00640bb40 R09: 0000000000000000 [2004740.667959] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2004740.675404] R13: 0000000000000022 R14: 000000c00050eb60 R15: 0000000000069779 [2004740.682833] FS: 00000000022d2550 GS: 0000000000000000 [2004740.742853] potentially unexpected fatal signal 5. [2004740.748269] CPU: 57 PID: 446287 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2004740.758987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2004740.770106] RIP: 0033:0x7fffffffe062 [2004740.775337] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2004740.795880] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2004740.802785] RAX: 0000000000083d4b RBX: 0000000000000000 RCX: 00007fffffffe05a [2004740.809541] potentially unexpected fatal signal 5. [2004740.811682] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [2004740.818145] CPU: 17 PID: 511898 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2004740.818147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2004740.818152] RIP: 0033:0x7fffffffe062 [2004740.818155] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2004740.827027] RBP: 000000c000193e38 R08: 000000c001981960 R09: 0000000000000000 [2004740.827028] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2004740.827029] R13: 0000000000000022 R14: 000000c00050eb60 R15: 0000000000069779 [2004740.827030] FS: 00000000022d2550 GS: 0000000000000000 [2004740.895559] potentially unexpected fatal signal 5. [2004740.901447] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2004740.901448] RAX: 0000000000083d4f RBX: 0000000000000000 RCX: 00007fffffffe05a [2004740.901449] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [2004740.901449] RBP: 000000c000193e38 R08: 000000c006d2a4c0 R09: 0000000000000000 [2004740.901450] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [2004740.901451] R13: 0000000000000022 R14: 000000c00050eb60 R15: 0000000000069779 [2004740.901451] FS: 00000000022d2550 GS: 0000000000000000 [2004740.974135] CPU: 69 PID: 539970 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2004740.985157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2004740.994785] RIP: 0033:0x7fffffffe062 [2004741.000067] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2004741.019250] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2004741.026268] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2004741.035131] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2004741.044225] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2004741.053079] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [2004741.062019] R13: 0000000000000022 R14: 000000c00050eb60 R15: 0000000000069779 [2004741.069644] FS: 00000000022d2550 GS: 0000000000000000 [2004741.208069] potentially unexpected fatal signal 5. [2004741.213194] CPU: 54 PID: 516834 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2004741.224046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2004741.233838] RIP: 0033:0x7fffffffe062 [2004741.237708] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2004741.256951] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2004741.262573] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2004741.271497] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2004741.280323] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2004741.289202] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2004741.298008] R13: 0000000000000022 R14: 000000c00050eb60 R15: 0000000000069779 [2004741.306835] FS: 00000000022d2550 GS: 0000000000000000 [2004756.914903] exe[497491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2004757.007399] exe[497703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2004757.077508] exe[535440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2004757.104547] exe[535394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5635e838b7f9 cs:33 sp:7fcb97c48858 ax:0 si:5635e83e4070 di:ffffffffff600000 [2004888.975312] exe[539188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56454bae07f9 cs:33 sp:7fba5ae84858 ax:0 si:56454bb39070 di:ffffffffff600000 [2005188.503555] exe[499213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a03fd87f9 cs:33 sp:7eaae8c73858 ax:0 si:564a04031062 di:ffffffffff600000 [2005189.239892] exe[499213] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a03fd87f9 cs:33 sp:7eaae8c52858 ax:0 si:564a04031062 di:ffffffffff600000 [2005189.290784] exe[541220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564a03fd87f9 cs:33 sp:7eaae8c31858 ax:0 si:564a04031062 di:ffffffffff600000 [2005515.135289] exe[578585] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca314557f9 cs:33 sp:7fb66a5db858 ax:0 si:55ca314ae070 di:ffffffffff600000 [2005515.230220] exe[542548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca314557f9 cs:33 sp:7fb66a5db858 ax:0 si:55ca314ae070 di:ffffffffff600000 [2005515.378558] exe[536963] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca314557f9 cs:33 sp:7fb66a5db858 ax:0 si:55ca314ae070 di:ffffffffff600000 [2007398.226721] potentially unexpected fatal signal 5. [2007398.231857] CPU: 26 PID: 638093 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2007398.242391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2007398.251965] RIP: 0033:0x7fffffffe062 [2007398.255854] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2007398.274952] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2007398.280480] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2007398.287932] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2007398.295403] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2007398.302887] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2007398.310474] R13: 0000000000000034 R14: 000000c000157d40 R15: 00000000000936a0 [2007398.319307] FS: 0000000001ff7f10 GS: 0000000000000000 [2007407.735934] potentially unexpected fatal signal 5. [2007407.741070] CPU: 71 PID: 544785 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2007407.751691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2007407.761228] RIP: 0033:0x7fffffffe062 [2007407.765104] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2007407.784324] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2007407.791274] RAX: 000000000009bd74 RBX: 0000000000000000 RCX: 00007fffffffe05a [2007407.798722] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [2007407.807753] RBP: 000000c00013de38 R08: 000000c006896f10 R09: 0000000000000000 [2007407.816602] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2007407.825459] R13: 0000000000000022 R14: 000000c0004729c0 R15: 000000000008326d [2007407.832910] FS: 00000000022d2550 GS: 0000000000000000 [2007408.330130] potentially unexpected fatal signal 5. [2007408.335260] CPU: 38 PID: 558302 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2007408.345786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2007408.355320] RIP: 0033:0x7fffffffe062 [2007408.359216] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2007408.378315] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2007408.385213] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2007408.394026] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2007408.401460] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2007408.410313] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2007408.419142] R13: 0000000000000022 R14: 000000c0004729c0 R15: 000000000008326d [2007408.427964] FS: 00000000022d2550 GS: 0000000000000000 [2007411.366582] potentially unexpected fatal signal 5. [2007411.371710] CPU: 61 PID: 589317 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2007411.382204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2007411.391780] RIP: 0033:0x7fffffffe062 [2007411.395682] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2007411.416176] RSP: 002b:000000c00053bcb0 EFLAGS: 00000297 [2007411.423084] RAX: 000000000009bec5 RBX: 0000000000000000 RCX: 00007fffffffe05a [2007411.430534] RDX: 0000000000000000 RSI: 000000c00053c000 RDI: 0000000000012f00 [2007411.439379] RBP: 000000c00053bd40 R08: 000000c002291780 R09: 0000000000000000 [2007411.446926] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00053bbd8 [2007411.454370] R13: 00000000028a6180 R14: 000000c00023cb60 R15: 0000000000083594 [2007411.463240] FS: 0000000003fb43c0 GS: 0000000000000000 [2007439.957333] potentially unexpected fatal signal 5. [2007439.957521] potentially unexpected fatal signal 5. [2007439.962464] CPU: 24 PID: 639895 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2007439.962466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2007439.963588] potentially unexpected fatal signal 5. [2007439.963592] CPU: 46 PID: 641345 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2007439.963593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2007439.963597] RIP: 0033:0x7fffffffe062 [2007439.963601] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2007439.963602] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2007439.963604] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2007439.963605] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2007439.963605] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2007439.963606] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2007439.963607] R13: 0000000000000022 R14: 000000c0006461a0 R15: 000000000009c28e [2007439.963608] FS: 000000c000130890 GS: 0000000000000000 [2007439.965482] potentially unexpected fatal signal 5. [2007439.965485] CPU: 47 PID: 641340 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2007439.965486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2007439.965487] RIP: 0033:0x7fffffffe062 [2007439.965490] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2007439.965491] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2007439.965492] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2007439.965493] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2007439.965493] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2007439.965494] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2007439.965495] R13: 0000000000000022 R14: 000000c0006461a0 R15: 000000000009c28e [2007439.965496] FS: 000000c000130890 GS: 0000000000000000 [2007439.967560] CPU: 80 PID: 639918 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2007439.967561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2007439.967565] RIP: 0033:0x7fffffffe062 [2007439.967567] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2007439.967568] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2007439.967569] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2007439.967570] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2007439.967570] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2007439.967571] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2007439.967572] R13: 0000000000000022 R14: 000000c0006461a0 R15: 000000000009c28e [2007439.967573] FS: 000000c000130890 GS: 0000000000000000 [2007440.297798] RIP: 0033:0x7fffffffe062 [2007440.303106] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2007440.323617] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2007440.330568] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2007440.339424] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2007440.348274] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2007440.357149] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2007440.366034] R13: 0000000000000022 R14: 000000c0006461a0 R15: 000000000009c28e [2007440.374902] FS: 000000c000130890 GS: 0000000000000000 [2007466.269631] potentially unexpected fatal signal 5. [2007466.274752] CPU: 63 PID: 567643 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2007466.285330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2007466.294876] RIP: 0033:0x7fffffffe062 [2007466.298780] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2007466.317917] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2007466.326109] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2007466.334959] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2007466.343914] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2007466.352752] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2007466.361615] R13: 0000000000000036 R14: 000000c00015f040 R15: 0000000000086646 [2007466.370464] FS: 000000c000130890 GS: 0000000000000000 [2008568.421627] exe[719809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4b68887f9 cs:33 sp:7f27a9ce4858 ax:0 si:55b4b68e1070 di:ffffffffff600000 [2008569.245616] exe[669293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4b68887f9 cs:33 sp:7f27a9cc3858 ax:0 si:55b4b68e1070 di:ffffffffff600000 [2008569.329306] exe[673662] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4b68887f9 cs:33 sp:7f27a9ce4858 ax:0 si:55b4b68e1070 di:ffffffffff600000 [2008590.368817] potentially unexpected fatal signal 5. [2008590.373942] CPU: 61 PID: 655250 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2008590.384427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2008590.394151] RIP: 0033:0x7fffffffe062 [2008590.398142] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2008590.417290] RSP: 002b:000000c00065fcb0 EFLAGS: 00000297 [2008590.424308] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2008590.433498] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2008590.442310] RBP: 000000c00065fd40 R08: 0000000000000000 R09: 0000000000000000 [2008590.451151] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00065fbf8 [2008590.460090] R13: 000000c000139c00 R14: 000000c0002d4680 R15: 000000000009e80c [2008590.468964] FS: 00007fc3977fe6c0 GS: 0000000000000000 [2008809.620830] exe[727150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b82ad167f9 cs:33 sp:7f9ffbf9b858 ax:0 si:55b82ad6f062 di:ffffffffff600000 [2008809.736617] exe[725692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b82ad167f9 cs:33 sp:7f9ffbf7a858 ax:0 si:55b82ad6f062 di:ffffffffff600000 [2008809.829275] exe[726991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b82ad167f9 cs:33 sp:7f9ffbf7a858 ax:0 si:55b82ad6f062 di:ffffffffff600000 [2008904.644573] exe[668934] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4d62ac7f9 cs:33 sp:7f470f311858 ax:0 si:55d4d6305070 di:ffffffffff600000 [2008904.748364] exe[721685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4d62ac7f9 cs:33 sp:7f470f311858 ax:0 si:55d4d6305070 di:ffffffffff600000 [2008904.838106] exe[718732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4d62ac7f9 cs:33 sp:7f470f311858 ax:0 si:55d4d6305070 di:ffffffffff600000 [2009518.701734] exe[718664] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2009518.987792] exe[747413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2009519.036434] exe[748885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2009519.086986] exe[758391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2009519.122858] exe[747130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2009519.156788] exe[747130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2009519.196611] exe[750240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2009519.254697] exe[748885] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2009519.288402] exe[749169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2009519.328510] exe[749169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622b04237f9 cs:33 sp:7f1365e1fee8 ax:0 si:20002900 di:ffffffffff600000 [2010673.388452] warn_bad_vsyscall: 19 callbacks suppressed [2010673.388455] exe[705128] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f158167f9 cs:33 sp:7f1dfca40858 ax:0 si:555f1586f097 di:ffffffffff600000 [2010673.555430] exe[690645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f158167f9 cs:33 sp:7f1dfca40858 ax:0 si:555f1586f097 di:ffffffffff600000 [2010673.690802] exe[751509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555f158167f9 cs:33 sp:7f1dfca40858 ax:0 si:555f1586f097 di:ffffffffff600000 [2010990.365186] exe[792138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4b68843ca cs:33 sp:7f27a9ce4ee8 ax:12 si:ffffffffff600000 di:55b4b68f0ff2 [2010990.548615] exe[731108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4b68843ca cs:33 sp:7f27a9c81ee8 ax:12 si:ffffffffff600000 di:55b4b68f0ff2 [2010990.684610] exe[788572] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4b68843ca cs:33 sp:7f27a9ce4ee8 ax:12 si:ffffffffff600000 di:55b4b68f0ff2 [2011492.179765] potentially unexpected fatal signal 5. [2011492.184991] CPU: 44 PID: 771944 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2011492.195543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2011492.205226] RIP: 0033:0x7fffffffe062 [2011492.209123] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2011492.228375] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2011492.232663] potentially unexpected fatal signal 5. [2011492.235336] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2011492.241774] CPU: 20 PID: 807338 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2011492.241776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2011492.241779] RIP: 0033:0x7fffffffe062 [2011492.241782] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2011492.241783] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2011492.241784] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2011492.241784] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2011492.241785] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2011492.241786] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2011492.241786] R13: 000000000000002a R14: 000000c000515520 R15: 00000000000a24c8 [2011492.241787] FS: 000000c000131c90 GS: 0000000000000000 [2011492.345344] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2011492.352937] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2011492.361757] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2011492.370704] R13: 000000000000002a R14: 000000c000515520 R15: 00000000000a24c8 [2011492.379643] FS: 000000c000131c90 GS: 0000000000000000 [2011598.187231] potentially unexpected fatal signal 5. [2011598.192911] CPU: 71 PID: 725335 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2011598.203413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2011598.212994] RIP: 0033:0x7fffffffe062 [2011598.216910] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2011598.237476] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2011598.244777] RAX: 00000000000c7662 RBX: 0000000000000000 RCX: 00007fffffffe05a [2011598.252227] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2011598.259700] RBP: 000000c00018fe38 R08: 000000c006e0f870 R09: 0000000000000000 [2011598.267149] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2011598.274585] R13: 0000000000000022 R14: 000000c000495a00 R15: 00000000000a53af [2011598.283424] FS: 000000c000180c90 GS: 0000000000000000 [2011598.296008] potentially unexpected fatal signal 5. [2011598.301199] CPU: 46 PID: 816721 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2011598.313112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2011598.324015] RIP: 0033:0x7fffffffe062 [2011598.329304] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2011598.350205] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2011598.356005] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2011598.365040] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2011598.373890] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2011598.381452] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2011598.390302] R13: 0000000000000022 R14: 000000c000495a00 R15: 00000000000a53af [2011598.397750] FS: 000000c000180c90 GS: 0000000000000000 [2011598.568221] potentially unexpected fatal signal 5. [2011598.574304] CPU: 69 PID: 683104 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2011598.584993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2011598.595881] RIP: 0033:0x7fffffffe062 [2011598.599775] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2011598.619171] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2011598.626095] RAX: 00000000000c765d RBX: 0000000000000000 RCX: 00007fffffffe05a [2011598.633548] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2011598.641001] RBP: 000000c00018fe38 R08: 000000c00a050010 R09: 0000000000000000 [2011598.648544] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2011598.655993] R13: 0000000000000022 R14: 000000c000495a00 R15: 00000000000a53af [2011598.664991] FS: 000000c000180c90 GS: 0000000000000000 [2011599.087264] potentially unexpected fatal signal 5. [2011599.092395] CPU: 63 PID: 816754 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2011599.103027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2011599.112581] RIP: 0033:0x7fffffffe062 [2011599.116544] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2011599.135843] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2011599.141390] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2011599.150424] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2011599.159730] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2011599.168679] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2011599.177604] R13: 0000000000000006 R14: 000000c000501ba0 R15: 00000000000a54d6 [2011599.183433] potentially unexpected fatal signal 5. [2011599.186534] FS: 000000c000180090 GS: 0000000000000000 [2011599.191686] CPU: 78 PID: 679251 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2011599.210561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2011599.221511] RIP: 0033:0x7fffffffe062 [2011599.225435] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2011599.244516] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2011599.251445] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2011599.258994] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2011599.266438] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2011599.273863] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2011599.282849] R13: 0000000000000006 R14: 000000c000501ba0 R15: 00000000000a54d6 [2011599.290374] FS: 000000c000180090 GS: 0000000000000000 [2012319.323426] exe[850657] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555aa8dfe7f9 cs:33 sp:7f4cbb5a6858 ax:0 si:555aa8e57062 di:ffffffffff600000 [2012319.465210] exe[832357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555aa8dfe7f9 cs:33 sp:7f4cbb5a6858 ax:0 si:555aa8e57062 di:ffffffffff600000 [2012319.916695] exe[833782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555aa8dfe7f9 cs:33 sp:7f4cbb564858 ax:0 si:555aa8e57062 di:ffffffffff600000 [2012516.933898] exe[841038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca8c4097f9 cs:33 sp:7f289533f858 ax:0 si:55ca8c462097 di:ffffffffff600000 [2012517.057734] exe[864894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca8c4097f9 cs:33 sp:7f289533f858 ax:0 si:55ca8c462097 di:ffffffffff600000 [2012517.184940] exe[847706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca8c4097f9 cs:33 sp:7f289533f858 ax:0 si:55ca8c462097 di:ffffffffff600000 [2012517.251053] exe[847701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ca8c4097f9 cs:33 sp:7f28952fd858 ax:0 si:55ca8c462097 di:ffffffffff600000 [2013054.844997] exe[872727] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f77fe97f9 cs:33 sp:7f89614b0ee8 ax:0 si:20003540 di:ffffffffff600000 [2013055.042439] exe[870703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f77fe97f9 cs:33 sp:7f896148fee8 ax:0 si:20003540 di:ffffffffff600000 [2013055.249461] exe[873732] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f77fe97f9 cs:33 sp:7f89614b0ee8 ax:0 si:20003540 di:ffffffffff600000 [2013055.249848] exe[870703] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f77fe97f9 cs:33 sp:7f896148fee8 ax:0 si:20003540 di:ffffffffff600000 [2014100.544529] potentially unexpected fatal signal 5. [2014100.549862] CPU: 33 PID: 896442 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2014100.560359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2014100.569892] RIP: 0033:0x7fffffffe062 [2014100.573762] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2014100.592866] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2014100.598387] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2014100.605828] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2014100.613353] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2014100.620785] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2014100.628413] R13: 0000000000000022 R14: 000000c000183520 R15: 00000000000c409c [2014100.635873] FS: 00000000022d2550 GS: 0000000000000000 [2014100.636478] potentially unexpected fatal signal 5. [2014100.646579] CPU: 47 PID: 896445 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2014100.657098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2014100.668025] RIP: 0033:0x7fffffffe062 [2014100.672708] potentially unexpected fatal signal 5. [2014100.673278] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2014100.678394] CPU: 75 PID: 896444 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2014100.678396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2014100.678400] RIP: 0033:0x7fffffffe062 [2014100.678404] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2014100.685772] potentially unexpected fatal signal 5. [2014100.685776] CPU: 36 PID: 822162 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2014100.685777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2014100.685779] RIP: 0033:0x7fffffffe062 [2014100.685781] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2014100.685782] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2014100.685784] RAX: 00000000000dadbf RBX: 0000000000000000 RCX: 00007fffffffe05a [2014100.685784] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [2014100.685785] RBP: 000000c00013de38 R08: 000000c001da94b0 R09: 0000000000000000 [2014100.685785] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2014100.685786] R13: 0000000000000022 R14: 000000c000183520 R15: 00000000000c409c [2014100.685787] FS: 00000000022d2550 GS: 0000000000000000 [2014100.698861] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2014100.698863] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2014100.698864] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2014100.698865] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2014100.698865] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2014100.698866] R13: 0000000000000022 R14: 000000c000183520 R15: 00000000000c409c [2014100.698867] FS: 00000000022d2550 GS: 0000000000000000 [2014100.902212] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2014100.909200] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2014100.916634] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2014100.924160] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2014100.933042] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2014100.940488] R13: 0000000000000022 R14: 000000c000183520 R15: 00000000000c409c [2014100.947925] FS: 00000000022d2550 GS: 0000000000000000 [2014354.281962] potentially unexpected fatal signal 5. [2014354.287094] CPU: 84 PID: 825557 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2014354.298080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2014354.308170] RIP: 0033:0x7fffffffe062 [2014354.312117] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2014354.319992] potentially unexpected fatal signal 5. [2014354.332579] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2014354.337701] CPU: 42 PID: 833398 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2014354.337703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2014354.344645] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2014354.344646] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2014354.344647] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2014354.344648] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2014354.344648] R13: 0000000000000022 R14: 000000c0004c0ea0 R15: 00000000000c7a82 [2014354.344649] FS: 000000c000600090 GS: 0000000000000000 [2014354.418609] RIP: 0033:0x7fffffffe062 [2014354.423897] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2014354.444468] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2014354.451537] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2014354.460466] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2014354.469295] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2014354.478122] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2014354.486946] R13: 0000000000000022 R14: 000000c0004c0ea0 R15: 00000000000c7a82 [2014354.495762] FS: 000000c000600090 GS: 0000000000000000 [2014375.959510] potentially unexpected fatal signal 5. [2014375.959703] potentially unexpected fatal signal 11. [2014375.964760] CPU: 5 PID: 911652 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2014375.969932] CPU: 61 PID: 911100 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2014375.969933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2014375.969937] RIP: 0033:0x562b74408c80 [2014375.969939] Code: 41 54 55 53 48 81 ec f8 01 00 00 e8 4a dd ff ff 48 8b 05 63 fa c8 00 31 ff 48 89 05 52 fa c8 00 e8 85 15 ff ff e8 60 16 ff ff <4c> 8b 25 f9 7c 16 00 48 89 c3 4c 89 a4 24 08 01 00 00 e8 29 dc ff [2014375.969940] RSP: 002b:00007f91ff42f310 EFLAGS: 00010212 [2014375.969941] RAX: 0000000000003d95 RBX: 0000000000000003 RCX: 0000000000003a98 [2014375.969942] RDX: 00000000000002fd RSI: 00007f91ff42f2f0 RDI: 0000000000000000 [2014375.969943] RBP: 0000000000000001 R08: 000000002d9ab972 R09: 0000000000000020 [2014375.969943] R10: 00101a27ed26d938 R11: 00000000861c4e30 R12: 0000000000000000 [2014375.969944] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [2014375.969944] FS: 0000562b7509f480 GS: 0000000000000000 [2014376.086082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2014376.097064] RIP: 0033:0x7fffffffe062 [2014376.102352] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2014376.122876] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2014376.129888] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2014376.138755] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 000055b589600000 [2014376.147605] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2014376.156474] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2014376.165359] R13: 0000000000000034 R14: 000000c0001b1860 R15: 00000000000de26e [2014376.174227] FS: 0000000001ff7f10 GS: 0000000000000000 [2014859.539254] potentially unexpected fatal signal 5. [2014859.544531] CPU: 37 PID: 933692 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2014859.555042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2014859.564736] RIP: 0033:0x7fffffffe062 [2014859.568681] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2014859.588008] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2014859.594929] RAX: 0000558f73000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2014859.602553] RDX: 0000000000000001 RSI: 0000000000200000 RDI: 0000558f73000000 [2014859.611393] RBP: 000000c000193e38 R08: 0000000000000009 R09: 0000000008000000 [2014859.620332] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000193e20 [2014859.627815] R13: 0000000000000022 R14: 000000c00047f380 R15: 00000000000df8d9 [2014859.637149] FS: 00000000022d2550 GS: 0000000000000000 [2017215.824565] exe[1645] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4637d87f9 cs:33 sp:7f3dff7dbee8 ax:0 si:20000100 di:ffffffffff600000 [2017216.758502] exe[9654] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4637d87f9 cs:33 sp:7f3dff757ee8 ax:0 si:20000100 di:ffffffffff600000 [2017297.676998] exe[6162] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560e81777f9 cs:33 sp:7f33b3153858 ax:0 si:5560e81d0070 di:ffffffffff600000 [2017297.882621] exe[13013] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560e81777f9 cs:33 sp:7f33b3153858 ax:0 si:5560e81d0070 di:ffffffffff600000 [2017298.090985] exe[994670] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5560e81777f9 cs:33 sp:7f33b3132858 ax:0 si:5560e81d0070 di:ffffffffff600000 [2017611.011631] exe[944301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f49c4b07f9 cs:33 sp:7fba9cc2b858 ax:0 si:55f49c509062 di:ffffffffff600000 [2017611.104260] exe[941795] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f49c4b07f9 cs:33 sp:7fba9cc2b858 ax:0 si:55f49c509062 di:ffffffffff600000 [2017611.186268] exe[941167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f49c4b07f9 cs:33 sp:7fba9cc2b858 ax:0 si:55f49c509062 di:ffffffffff600000 [2017615.966635] exe[942460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.046504] exe[941390] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.125798] exe[941541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.194470] exe[942144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.293407] exe[941115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.383715] exe[941541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.457769] exe[940957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.523091] exe[941546] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.600871] exe[942433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.678034] exe[940947] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017616.774892] exe[941095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017693.566682] warn_bad_vsyscall: 15 callbacks suppressed [2017693.566686] exe[942398] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017693.659071] exe[942423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017693.742097] exe[941976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017693.942086] exe[941966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017694.090526] exe[941976] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568062 di:ffffffffff600000 [2017694.241481] exe[941148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76c1858 ax:0 si:559805568062 di:ffffffffff600000 [2017694.359478] exe[941568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017694.508562] exe[941841] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017694.531510] exe[941541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017694.561252] exe[941095] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017698.574075] warn_bad_vsyscall: 99 callbacks suppressed [2017698.574079] exe[941070] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017698.657293] exe[942423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017698.813733] exe[942157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017698.975431] exe[942157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017699.068807] exe[942460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017699.166387] exe[940959] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017699.367859] exe[941790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017699.443617] exe[941146] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017699.559969] exe[941789] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017699.651575] exe[942141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.575508] warn_bad_vsyscall: 104 callbacks suppressed [2017703.575511] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.602691] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.622400] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.641630] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.661445] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.682228] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.707102] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.727901] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.748549] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017703.770449] exe[941039] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017708.586792] warn_bad_vsyscall: 163 callbacks suppressed [2017708.586795] exe[941989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017708.614793] exe[941204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017708.635171] exe[941028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017708.655051] exe[941998] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017708.675683] exe[943392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017708.696626] exe[941028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017708.717159] exe[941028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017708.737418] exe[941028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017708.757367] exe[941028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017708.778028] exe[941028] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568070 di:ffffffffff600000 [2017714.314726] warn_bad_vsyscall: 179 callbacks suppressed [2017714.314729] exe[941054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017714.420393] exe[941438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017714.421860] exe[942412] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017714.534406] exe[941185] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017714.627517] exe[944327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017714.717374] exe[941009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017714.817288] exe[942123] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017714.878503] exe[942138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017714.933691] exe[941594] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017714.998740] exe[944295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017719.769022] warn_bad_vsyscall: 97 callbacks suppressed [2017719.769026] exe[942004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017720.314745] exe[941107] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7703858 ax:0 si:559805568062 di:ffffffffff600000 [2017720.408455] exe[941184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da767f858 ax:0 si:559805568062 di:ffffffffff600000 [2017721.653857] exe[941989] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017721.763299] exe[941568] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017721.867141] exe[941148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017722.004367] exe[942404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2017722.094036] exe[941184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568062 di:ffffffffff600000 [2017722.200240] exe[941204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da76e2858 ax:0 si:559805568062 di:ffffffffff600000 [2017723.308787] exe[942432] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55980550f7f9 cs:33 sp:7f1da7724858 ax:0 si:559805568062 di:ffffffffff600000 [2018233.771940] potentially unexpected fatal signal 5. [2018233.777191] CPU: 87 PID: 967295 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2018233.787690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2018233.797325] RIP: 0033:0x7fffffffe062 [2018233.801214] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2018233.820884] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [2018233.828324] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2018233.837222] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2018233.846310] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [2018233.855166] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [2018233.864007] R13: 0000000000000022 R14: 000000c000497a00 R15: 00000000000e172b [2018233.872924] FS: 00000000022d2550 GS: 0000000000000000 [2018233.931469] potentially unexpected fatal signal 5. [2018233.937901] CPU: 90 PID: 38323 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2018233.948317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2018233.959319] RIP: 0033:0x7fffffffe062 [2018233.964574] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2018233.965954] potentially unexpected fatal signal 5. [2018233.983664] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [2018233.988754] CPU: 87 PID: 38317 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2018233.988756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2018233.994287] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2018233.994288] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2018233.994288] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [2018233.994289] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [2018233.994289] R13: 0000000000000022 R14: 000000c000497a00 R15: 00000000000e172b [2018233.994290] FS: 00000000022d2550 GS: 0000000000000000 [2018234.059893] RIP: 0033:0x7fffffffe062 [2018234.065220] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2018234.085794] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [2018234.092691] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2018234.101495] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2018234.108938] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [2018234.117758] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [2018234.125193] R13: 0000000000000022 R14: 000000c000497a00 R15: 00000000000e172b [2018234.134027] FS: 00000000022d2550 GS: 0000000000000000 [2018234.281615] potentially unexpected fatal signal 5. [2018234.287473] CPU: 36 PID: 959154 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2018234.299377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2018234.310270] RIP: 0033:0x7fffffffe062 [2018234.314170] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2018234.320533] potentially unexpected fatal signal 5. [2018234.333535] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [2018234.339986] CPU: 85 PID: 962381 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2018234.339990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2018234.339995] RIP: 0033:0x7fffffffe062 [2018234.339998] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2018234.340000] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [2018234.345528] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2018234.345530] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2018234.352871] potentially unexpected fatal signal 5. [2018234.352874] CPU: 76 PID: 935549 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2018234.352875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2018234.352879] RIP: 0033:0x7fffffffe062 [2018234.352882] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2018234.352883] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [2018234.352884] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2018234.352885] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2018234.352886] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [2018234.352887] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [2018234.352888] R13: 0000000000000022 R14: 000000c000497a00 R15: 00000000000e172b [2018234.352889] FS: 00000000022d2550 GS: 0000000000000000 [2018234.356020] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2018234.356021] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2018234.356022] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [2018234.356022] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [2018234.356023] R13: 0000000000000022 R14: 000000c000497a00 R15: 00000000000e172b [2018234.356024] FS: 00000000022d2550 GS: 0000000000000000 [2018234.563484] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [2018234.570945] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [2018234.579792] R13: 0000000000000022 R14: 000000c000497a00 R15: 00000000000e172b [2018234.588633] FS: 00000000022d2550 GS: 0000000000000000 [2018591.509652] warn_bad_vsyscall: 13 callbacks suppressed [2018591.509655] exe[67414] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d6baaa7f9 cs:33 sp:7fd2f5e8c858 ax:0 si:558d6bb03097 di:ffffffffff600000 [2018592.323566] exe[67362] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d6baaa7f9 cs:33 sp:7fd2f5e6b858 ax:0 si:558d6bb03097 di:ffffffffff600000 [2021004.383136] exe[38701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a456e997f9 cs:33 sp:7f7b26b6a858 ax:0 si:55a456ef2062 di:ffffffffff600000 [2021004.526443] exe[122344] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a456e997f9 cs:33 sp:7f7b26b6a858 ax:0 si:55a456ef2062 di:ffffffffff600000 [2021007.403057] exe[37687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a456e997f9 cs:33 sp:7f7b26b6a858 ax:0 si:55a456ef2062 di:ffffffffff600000 [2021845.653059] potentially unexpected fatal signal 5. [2021845.658292] CPU: 11 PID: 136763 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2021845.668781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2021845.678302] RIP: 0033:0x7fffffffe062 [2021845.682176] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2021845.701442] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2021845.706991] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2021845.714493] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2021845.723324] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2021845.732166] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2021845.741053] R13: 0000000000000008 R14: 000000c0005149c0 R15: 00000000000096ad [2021845.749886] FS: 000000c000130890 GS: 0000000000000000 [2022101.530672] potentially unexpected fatal signal 5. [2022101.535819] CPU: 20 PID: 146886 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2022101.546325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2022101.555896] RIP: 0033:0x7fffffffe062 [2022101.559782] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2022101.578966] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2022101.584514] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2022101.592057] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2022101.600933] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2022101.608487] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2022101.617518] R13: 0000000000000030 R14: 000000c0005b5860 R15: 000000000000c8dc [2022101.626464] FS: 0000000001ff7f10 GS: 0000000000000000 [2022109.715180] potentially unexpected fatal signal 5. [2022109.720522] CPU: 71 PID: 147155 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2022109.731421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2022109.741055] RIP: 0033:0x7fffffffe062 [2022109.744968] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2022109.765549] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [2022109.772498] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2022109.779964] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2022109.788881] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [2022109.796322] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [2022109.800324] potentially unexpected fatal signal 5. [2022109.803752] R13: 0000000000000022 R14: 000000c000502ea0 R15: 000000000000cd8f [2022109.803753] FS: 00000000022d2550 GS: 0000000000000000 [2022109.808387] potentially unexpected fatal signal 5. [2022109.810338] CPU: 0 PID: 55700 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2022109.819135] CPU: 40 PID: 109591 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2022109.819137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2022109.819141] RIP: 0033:0x7fffffffe062 [2022109.819143] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2022109.819144] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2022109.819146] RAX: 0000000000023ed4 RBX: 0000000000000000 RCX: 00007fffffffe05a [2022109.819146] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [2022109.819147] RBP: 000000c000193e38 R08: 000000c00a0453c0 R09: 0000000000000000 [2022109.819147] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [2022109.819148] R13: 0000000000000022 R14: 000000c0004aab60 R15: 000000000000cd7f [2022109.819149] FS: 000000c000180090 GS: 0000000000000000 [2022109.850475] potentially unexpected fatal signal 5. [2022109.853608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2022109.863343] CPU: 69 PID: 147125 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2022109.863345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2022109.863349] RIP: 0033:0x7fffffffe062 [2022109.863351] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2022109.863352] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2022109.863354] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2022109.863354] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2022109.863355] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2022109.863355] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2022109.863356] R13: 0000000000000022 R14: 000000c0004aab60 R15: 000000000000cd7f [2022109.863356] FS: 000000c000180090 GS: 0000000000000000 [2022110.048811] RIP: 0033:0x7fffffffe062 [2022110.052675] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2022110.071974] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2022110.077720] RAX: 0000000000023ee0 RBX: 0000000000000000 RCX: 00007fffffffe05a [2022110.085199] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [2022110.094366] RBP: 000000c000193e38 R08: 000000c000db0c40 R09: 0000000000000000 [2022110.103195] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2022110.112030] R13: 0000000000000022 R14: 000000c0004aab60 R15: 000000000000cd7f [2022110.119507] FS: 000000c000180090 GS: 0000000000000000 [2022110.359804] potentially unexpected fatal signal 5. [2022110.365807] CPU: 78 PID: 147130 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2022110.376304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2022110.385845] RIP: 0033:0x7fffffffe062 [2022110.391101] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2022110.410365] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2022110.417297] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2022110.426115] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2022110.427956] potentially unexpected fatal signal 5. [2022110.433757] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2022110.438844] CPU: 77 PID: 118860 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2022110.438846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2022110.438848] RIP: 0033:0x7fffffffe062 [2022110.438850] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2022110.438852] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [2022110.446373] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2022110.446374] R13: 0000000000000024 R14: 000000c000500340 R15: 000000000000cd80 [2022110.446375] FS: 00000000022d2550 GS: 0000000000000000 [2022110.516322] potentially unexpected fatal signal 5. [2022110.521392] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2022110.521393] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2022110.521393] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [2022110.521394] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018de20 [2022110.521394] R13: 0000000000000022 R14: 000000c000502ea0 R15: 000000000000cd8f [2022110.521395] FS: 00000000022d2550 GS: 0000000000000000 [2022110.561913] potentially unexpected fatal signal 5. [2022110.568818] CPU: 88 PID: 147163 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2022110.568819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2022110.568824] RIP: 0033:0x7fffffffe062 [2022110.568826] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2022110.568828] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2022110.574389] CPU: 30 PID: 147153 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2022110.574390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2022110.574393] RIP: 0033:0x7fffffffe062 [2022110.574396] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2022110.574397] RSP: 002b:000000c00018dd98 EFLAGS: 00000297 [2022110.574398] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2022110.574399] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2022110.574399] RBP: 000000c00018de38 R08: 0000000000000000 R09: 0000000000000000 [2022110.574400] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018de20 [2022110.574400] R13: 0000000000000022 R14: 000000c000502ea0 R15: 000000000000cd8f [2022110.574401] FS: 00000000022d2550 GS: 0000000000000000 [2022110.721448] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2022110.728923] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2022110.737751] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2022110.745250] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2022110.754043] R13: 0000000000000024 R14: 000000c000500340 R15: 000000000000cd80 [2022110.761502] FS: 00000000022d2550 GS: 0000000000000000 [2023731.091931] exe[154949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ef1858 ax:0 si:55acce072070 di:ffffffffff600000 [2023731.130539] exe[201798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ef1858 ax:0 si:55acce072070 di:ffffffffff600000 [2023731.175032] exe[201798] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ef1858 ax:0 si:55acce072070 di:ffffffffff600000 [2023731.196459] exe[154949] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ef1858 ax:0 si:55acce072070 di:ffffffffff600000 [2024008.358253] exe[163281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024008.496841] exe[187349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024008.533440] exe[185037] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024008.567324] exe[187349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024008.595105] exe[185273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024008.621434] exe[185273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024008.653413] exe[187349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024008.684612] exe[187349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024008.714562] exe[189968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024008.742638] exe[189968] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc32f37f9 cs:33 sp:7f92e59db858 ax:0 si:557bc334c070 di:ffffffffff600000 [2024121.134854] warn_bad_vsyscall: 57 callbacks suppressed [2024121.134857] exe[201305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650e6a863ca cs:33 sp:7fe380ce1ee8 ax:12 si:ffffffffff600000 di:5650e6af2ff2 [2024121.339047] exe[201305] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650e6a863ca cs:33 sp:7fe380cc0ee8 ax:12 si:ffffffffff600000 di:5650e6af2ff2 [2025077.483457] exe[149321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ef1858 ax:0 si:55acce072070 di:ffffffffff600000 [2025077.521741] exe[210911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ef1858 ax:0 si:55acce072070 di:ffffffffff600000 [2025077.578007] exe[183158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ed0858 ax:0 si:55acce072070 di:ffffffffff600000 [2025077.597921] exe[183158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ed0858 ax:0 si:55acce072070 di:ffffffffff600000 [2025077.617715] exe[183158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ed0858 ax:0 si:55acce072070 di:ffffffffff600000 [2025077.637032] exe[183158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ed0858 ax:0 si:55acce072070 di:ffffffffff600000 [2025077.656250] exe[183158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ed0858 ax:0 si:55acce072070 di:ffffffffff600000 [2025077.676533] exe[183158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ed0858 ax:0 si:55acce072070 di:ffffffffff600000 [2025077.697115] exe[183158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ed0858 ax:0 si:55acce072070 di:ffffffffff600000 [2025077.717356] exe[183158] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55acce0197f9 cs:33 sp:7f60b3ed0858 ax:0 si:55acce072070 di:ffffffffff600000 [2025456.429539] potentially unexpected fatal signal 5. [2025456.434658] CPU: 36 PID: 183544 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025456.445154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025456.454685] RIP: 0033:0x7fffffffe062 [2025456.458613] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025456.479260] RSP: 002b:000000c000613d98 EFLAGS: 00000297 [2025456.485008] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025456.492550] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2025456.501449] RBP: 000000c000613e38 R08: 0000000000000000 R09: 0000000000000000 [2025456.510923] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000613e20 [2025456.518384] R13: 000000000000001e R14: 000000c00046b6c0 R15: 00000000000217e3 [2025456.527212] FS: 000000c000180090 GS: 0000000000000000 [2025456.854253] potentially unexpected fatal signal 5. [2025456.859368] CPU: 89 PID: 230093 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025456.869932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025456.879476] RIP: 0033:0x7fffffffe062 [2025456.883389] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025456.902468] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2025456.909406] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025456.916847] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2025456.925689] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2025456.933147] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2025456.940608] R13: 0000000000000022 R14: 000000c0001836c0 R15: 00000000000217dd [2025456.948037] FS: 000000c000504090 GS: 0000000000000000 [2025519.860168] potentially unexpected fatal signal 5. [2025519.865446] CPU: 95 PID: 232719 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025519.875969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025519.885515] RIP: 0033:0x7fffffffe062 [2025519.889413] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025519.908727] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2025519.915919] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025519.924752] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2025519.933686] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2025519.942614] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2025519.951467] R13: 000000000000001e R14: 000000c0005b9860 R15: 00000000000226b9 [2025519.960313] FS: 000000c000180090 GS: 0000000000000000 [2025720.863461] potentially unexpected fatal signal 5. [2025720.868598] CPU: 80 PID: 155645 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025720.876111] potentially unexpected fatal signal 5. [2025720.879227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025720.884275] CPU: 34 PID: 153738 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025720.893902] RIP: 0033:0x7fffffffe062 [2025720.893905] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025720.893905] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025720.893907] RAX: 000000000003ab7f RBX: 0000000000000000 RCX: 00007fffffffe05a [2025720.893907] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2025720.893908] RBP: 000000c00018fe38 R08: 000000c002faed30 R09: 0000000000000000 [2025720.893908] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2025720.893909] R13: 000000000000003e R14: 000000c0004a71e0 R15: 000000000002453f [2025720.893911] FS: 00000000022d2550 GS: 0000000000000000 [2025720.904412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025720.904415] RIP: 0033:0x7fffffffe062 [2025720.904417] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025720.904418] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025720.904419] RAX: 000000000003ab86 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025720.904419] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2025720.904420] RBP: 000000c00018fe38 R08: 000000c0016562e0 R09: 0000000000000000 [2025720.904420] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2025720.904421] R13: 000000000000003e R14: 000000c0004a71e0 R15: 000000000002453f [2025720.904421] FS: 00000000022d2550 GS: 0000000000000000 [2025721.125870] potentially unexpected fatal signal 5. [2025721.131626] CPU: 38 PID: 189130 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025721.143513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025721.153063] RIP: 0033:0x7fffffffe062 [2025721.158333] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025721.174916] potentially unexpected fatal signal 5. [2025721.178899] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025721.183973] CPU: 89 PID: 161099 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025721.183975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025721.183977] RIP: 0033:0x7fffffffe062 [2025721.183979] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025721.183980] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025721.183982] RAX: 000000000003ab77 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025721.183982] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2025721.183983] RBP: 000000c00018fe38 R08: 000000c00a57d4b0 R09: 0000000000000000 [2025721.183983] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2025721.183984] R13: 000000000000003e R14: 000000c0004a71e0 R15: 000000000002453f [2025721.183984] FS: 00000000022d2550 GS: 0000000000000000 [2025721.200022] potentially unexpected fatal signal 5. [2025721.202561] potentially unexpected fatal signal 5. [2025721.202564] CPU: 43 PID: 172002 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025721.202565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025721.202567] RIP: 0033:0x7fffffffe062 [2025721.202569] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025721.202570] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025721.202571] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025721.202572] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2025721.202573] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2025721.202573] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2025721.202574] R13: 000000000000003e R14: 000000c0004a71e0 R15: 000000000002453f [2025721.202575] FS: 00000000022d2550 GS: 0000000000000000 [2025721.211067] CPU: 59 PID: 240549 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025721.216290] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025721.216291] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2025721.216292] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2025721.216292] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2025721.216293] R13: 000000000000003e R14: 000000c0004a71e0 R15: 000000000002453f [2025721.216294] FS: 00000000022d2550 GS: 0000000000000000 [2025721.268423] potentially unexpected fatal signal 5. [2025721.275068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025721.275074] RIP: 0033:0x7fffffffe062 [2025721.275077] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025721.275078] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025721.275080] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025721.275080] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2025721.275081] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2025721.275082] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2025721.275082] R13: 0000000000000022 R14: 000000c00021e340 R15: 0000000000024540 [2025721.275085] FS: 00000000022d2550 GS: 0000000000000000 [2025721.283903] CPU: 72 PID: 240506 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025721.283905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025721.283910] RIP: 0033:0x7fffffffe062 [2025721.283913] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025721.283914] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025721.283915] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025721.283916] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2025721.283917] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2025721.283917] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2025721.283920] R13: 000000000000003e R14: 000000c0004a71e0 R15: 000000000002453f [2025721.433461] potentially unexpected fatal signal 5. [2025721.434130] potentially unexpected fatal signal 5. [2025721.434135] CPU: 37 PID: 153825 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025721.434136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025721.434140] RIP: 0033:0x7fffffffe062 [2025721.434144] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025721.434145] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025721.434148] RAX: 000000000003ab7c RBX: 0000000000000000 RCX: 00007fffffffe05a [2025721.434149] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2025721.434149] RBP: 000000c00018fe38 R08: 000000c0032fc4c0 R09: 0000000000000000 [2025721.434150] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2025721.434151] R13: 000000000000003e R14: 000000c0004a71e0 R15: 000000000002453f [2025721.434152] FS: 00000000022d2550 GS: 0000000000000000 [2025721.438583] FS: 00000000022d2550 GS: 0000000000000000 [2025721.547358] potentially unexpected fatal signal 5. [2025721.549317] CPU: 11 PID: 200364 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025721.555084] CPU: 30 PID: 202129 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2025721.566956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025721.566960] RIP: 0033:0x7fffffffe062 [2025721.566963] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025721.566964] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025721.566966] RAX: 000000000003ab7b RBX: 0000000000000000 RCX: 00007fffffffe05a [2025721.566966] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2025721.566967] RBP: 000000c00018fe38 R08: 000000c00dbf06a0 R09: 0000000000000000 [2025721.566968] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2025721.566968] R13: 000000000000003e R14: 000000c0004a71e0 R15: 000000000002453f [2025721.566969] FS: 00000000022d2550 GS: 0000000000000000 [2025721.903858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2025721.914815] RIP: 0033:0x7fffffffe062 [2025721.920122] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2025721.940869] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2025721.947807] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2025721.956652] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2025721.965484] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2025721.974328] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2025721.983164] R13: 000000000000003e R14: 000000c0004a71e0 R15: 000000000002453f [2025721.991992] FS: 00000000022d2550 GS: 0000000000000000 [2028180.139517] potentially unexpected fatal signal 5. [2028180.144645] CPU: 1 PID: 333318 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2028180.155175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2028180.159256] potentially unexpected fatal signal 11. [2028180.164723] RIP: 0033:0x7fffffffe062 [2028180.169912] CPU: 5 PID: 343883 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2028180.169913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2028180.169918] RIP: 0033:0x5580d91b37b6 [2028180.169920] Code: ff 48 8d 35 1d 49 09 00 48 8b 94 24 c8 03 00 00 48 8d 3d 17 49 09 00 31 c0 e8 06 38 ff ff 66 0f 1f 44 00 00 48 89 fa 48 89 f8 <40> 88 3d 01 1f c9 00 48 d1 ea 80 25 f7 1e c9 00 01 83 e2 01 88 15 [2028180.169921] RSP: 002b:00007fff2b278538 EFLAGS: 00010287 [2028180.169922] RAX: 0000000000000780 RBX: 00000000ffffffff RCX: 00005580d91fb74d [2028180.169923] RDX: 0000000000000780 RSI: 00007fff2b2785a0 RDI: 0000000000000780 [2028180.169923] RBP: 00007fff2b27859c R08: 000000000000000a R09: 00007fff2b278287 [2028180.169924] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000032 [2028180.169924] R13: 0000000000072735 R14: 000000000007272d R15: 0000000000000001 [2028180.169925] FS: 00005580d9e4c480 GS: 0000000000000000 [2028180.272082] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2028180.291194] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2028180.298178] RAX: 000000000005795c RBX: 0000000000000000 RCX: 00007fffffffe05a [2028180.307007] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2028180.315841] RBP: 000000c00018fe38 R08: 000000c0007ca010 R09: 0000000000000000 [2028180.324680] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2028180.332150] R13: 0000000000000020 R14: 000000c000500680 R15: 00000000000515f9 [2028180.341003] FS: 000000c000130490 GS: 0000000000000000 [2028182.500227] potentially unexpected fatal signal 5. [2028182.505135] potentially unexpected fatal signal 5. [2028182.505347] CPU: 44 PID: 343574 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2028182.510557] CPU: 33 PID: 333260 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2028182.510558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2028182.510562] RIP: 0033:0x7fffffffe062 [2028182.510564] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2028182.510565] RSP: 002b:000000c000593d98 EFLAGS: 00000297 [2028182.510566] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2028182.510567] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2028182.510567] RBP: 000000c000593e38 R08: 0000000000000000 R09: 0000000000000000 [2028182.510568] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000593e20 [2028182.510568] R13: 0000000000000022 R14: 000000c000498b60 R15: 00000000000515be [2028182.510569] FS: 000000c000580090 GS: 0000000000000000 [2028182.614204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2028182.623762] RIP: 0033:0x7fffffffe062 [2028182.629031] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2028182.649507] RSP: 002b:000000c000593d98 EFLAGS: 00000297 [2028182.656462] RAX: 00007fa6a3ef3000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2028182.665379] RDX: 0000000000000005 RSI: 0000000000002000 RDI: 00007fa6a3ef3000 [2028182.674229] RBP: 000000c000593e38 R08: 0000000000000009 R09: 0000000000000000 [2028182.683081] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c000593e20 [2028182.691923] R13: 0000000000000022 R14: 000000c000498b60 R15: 00000000000515be [2028182.700756] FS: 000000c000580090 GS: 0000000000000000 [2028643.182150] warn_bad_vsyscall: 28 callbacks suppressed [2028643.182152] exe[396928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2fae9e7f9 cs:33 sp:7feac5b18ee8 ax:0 si:20000080 di:ffffffffff600000 [2028643.281288] exe[396925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f2fae9e7f9 cs:33 sp:7feac5b18ee8 ax:0 si:20000080 di:ffffffffff600000 [2029766.660438] exe[386487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa94e7f9 cs:33 sp:7fcf70020ee8 ax:0 si:200017c0 di:ffffffffff600000 [2029766.781664] exe[399627] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa94e7f9 cs:33 sp:7fcf70020ee8 ax:0 si:200017c0 di:ffffffffff600000 [2029766.869740] exe[371439] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fbaa94e7f9 cs:33 sp:7fcf70020ee8 ax:0 si:200017c0 di:ffffffffff600000 [2030074.975835] potentially unexpected fatal signal 11. [2030074.981125] CPU: 17 PID: 448474 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2030074.991621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2030075.001172] RIP: 0033:0x560afbe3ec80 [2030075.005073] Code: 41 54 55 53 48 81 ec f8 01 00 00 e8 4a dd ff ff 48 8b 05 63 fa c8 00 31 ff 48 89 05 52 fa c8 00 e8 85 15 ff ff e8 60 16 ff ff <4c> 8b 25 f9 7c 16 00 48 89 c3 4c 89 a4 24 08 01 00 00 e8 29 dc ff [2030075.024389] RSP: 002b:00007fbd7937a310 EFLAGS: 00010212 [2030075.029951] RAX: 0000000000003df5 RBX: 0000000000000003 RCX: 0000000000003a98 [2030075.038810] RDX: 000000000000035d RSI: 00007fbd7937a2f0 RDI: 0000000000000000 [2030075.047649] RBP: 0000000000000001 R08: 000000003357aedf R09: 0000000000000020 [2030075.056579] R10: 00103a48142bccd0 R11: 00000000861c4e40 R12: 0000000000000000 [2030075.065426] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [2030075.074319] FS: 0000560afcad5480 GS: 0000000000000000 [2030250.593063] potentially unexpected fatal signal 5. [2030250.597577] potentially unexpected fatal signal 5. [2030250.598221] CPU: 86 PID: 457637 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2030250.603404] CPU: 43 PID: 454616 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2030250.603405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2030250.603409] RIP: 0033:0x7fffffffe062 [2030250.603411] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2030250.603412] RSP: 002b:000000c0006cdcb0 EFLAGS: 00000297 [2030250.612799] potentially unexpected fatal signal 5. [2030250.612803] CPU: 79 PID: 455356 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2030250.612805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2030250.612817] RIP: 0033:0x7fffffffe062 [2030250.612819] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2030250.612821] RSP: 002b:000000c0006cdcb0 EFLAGS: 00000297 [2030250.612823] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2030250.612824] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2030250.612825] RBP: 000000c0006cdd40 R08: 0000000000000000 R09: 0000000000000000 [2030250.612825] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006cdbd8 [2030250.612826] R13: 000000c000180000 R14: 000000c000471d40 R15: 000000000006eb92 [2030250.612828] FS: 00007f8116ffd6c0 GS: 0000000000000000 [2030250.614080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2030250.614082] RIP: 0033:0x7fffffffe062 [2030250.614084] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2030250.614085] RSP: 002b:000000c0006cdcb0 EFLAGS: 00000297 [2030250.614086] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2030250.614087] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2030250.614088] RBP: 000000c0006cdd40 R08: 0000000000000000 R09: 0000000000000000 [2030250.614088] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006cdbd8 [2030250.614089] R13: 000000c000180000 R14: 000000c000471d40 R15: 000000000006eb92 [2030250.614091] FS: 00007f8116ffd6c0 GS: 0000000000000000 [2030250.620967] potentially unexpected fatal signal 5. [2030250.624737] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2030250.624738] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2030250.624739] RBP: 000000c0006cdd40 R08: 0000000000000000 R09: 0000000000000000 [2030250.624739] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006cdbd8 [2030250.624740] R13: 000000c000180000 R14: 000000c000471d40 R15: 000000000006eb92 [2030250.624742] FS: 00007f8116ffd6c0 GS: 0000000000000000 [2030250.634336] CPU: 36 PID: 460505 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2030250.634338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2030250.634340] RIP: 0033:0x7fffffffe062 [2030250.634343] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2030250.634344] RSP: 002b:000000c0006cdcb0 EFLAGS: 00000297 [2030250.634345] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2030250.634346] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2030250.634348] RBP: 000000c0006cdd40 R08: 0000000000000000 R09: 0000000000000000 [2030250.978927] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006cdbd8 [2030250.987788] R13: 000000c000180000 R14: 000000c000471d40 R15: 000000000006eb92 [2030250.996627] FS: 00007f8116ffd6c0 GS: 0000000000000000 [2030378.288400] potentially unexpected fatal signal 5. [2030378.293545] CPU: 79 PID: 467599 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2030378.304051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2030378.313595] RIP: 0033:0x7fffffffe062 [2030378.317496] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2030378.337297] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2030378.344259] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2030378.353148] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2030378.360609] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2030378.369441] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2030378.378332] R13: 0000000000000024 R14: 000000c0004709c0 R15: 00000000000589cf [2030378.387174] FS: 000000c000180c90 GS: 0000000000000000 [2030395.274940] potentially unexpected fatal signal 5. [2030395.280132] CPU: 66 PID: 434064 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2030395.290636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2030395.300214] RIP: 0033:0x7fffffffe062 [2030395.304153] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2030395.324941] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2030395.331882] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2030395.339381] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2030395.348232] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2030395.357298] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2030395.366182] R13: 0000000000000036 R14: 000000c000476340 R15: 000000000005b4bf [2030395.375075] FS: 000000c000130890 GS: 0000000000000000 [2030883.419196] potentially unexpected fatal signal 11. [2030883.424434] CPU: 85 PID: 479465 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2030883.434961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2030883.444516] RIP: 0033:0x5647cf265e29 [2030883.448451] Code: 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 48 3d 00 f0 ff ff 77 01 c3 48 c7 c2 b0 ff ff ff f7 d8 <64> 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 [2030883.467777] RSP: 002b:00007fcb69b55448 EFLAGS: 00010213 [2030883.474812] RAX: 0000000000000016 RBX: 00005647cf2af3b9 RCX: 00005647cf265e17 [2030883.483670] RDX: ffffffffffffffb0 RSI: 000000000000000a RDI: 00007fcb69b565c0 [2030883.492509] RBP: 00007fcb69b5659c R08: 000000000586de41 R09: 00000000000003a6 [2030883.501392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fcb69b565c0 [2030883.510253] R13: 00005647cf2af3b9 R14: 0000000000071c9f R15: 0000000000000001 [2030883.519196] FS: 00005647cfeb4480 GS: 0000000000000000 [2031089.387659] exe[518104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56133b9ec7f9 cs:33 sp:7fc70b76f858 ax:0 si:56133ba45070 di:ffffffffff600000 [2031089.463130] exe[518104] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56133b9ec7f9 cs:33 sp:7fc70b76f858 ax:0 si:56133ba45070 di:ffffffffff600000 [2031616.213748] exe[532516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2288993ca cs:33 sp:7f7e22e88ee8 ax:12 si:ffffffffff600000 di:55a228905ff2 [2031616.308671] exe[532529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2288993ca cs:33 sp:7f7e22e88ee8 ax:12 si:ffffffffff600000 di:55a228905ff2 [2031616.938316] exe[530674] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a2288993ca cs:33 sp:7f7e22e88ee8 ax:12 si:ffffffffff600000 di:55a228905ff2 [2033219.036400] exe[544502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556eca777f9 cs:33 sp:7ff23d6ed858 ax:0 si:5556ecad0070 di:ffffffffff600000 [2033219.167059] exe[545222] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556eca777f9 cs:33 sp:7ff23d6cc858 ax:0 si:5556ecad0070 di:ffffffffff600000 [2033219.730238] exe[489388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5556eca777f9 cs:33 sp:7ff23d6ed858 ax:0 si:5556ecad0070 di:ffffffffff600000 [2033668.404927] exe[544257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c335df7f9 cs:33 sp:7f7f4edd9858 ax:0 si:557c33638070 di:ffffffffff600000 [2033669.062565] exe[483945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c335df7f9 cs:33 sp:7f7f4edb8858 ax:0 si:557c33638070 di:ffffffffff600000 [2033669.177203] exe[483536] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557c335df7f9 cs:33 sp:7f7f4edd9858 ax:0 si:557c33638070 di:ffffffffff600000 [2033763.122475] exe[483624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617c7bf67f9 cs:33 sp:7f5c80485858 ax:0 si:5617c7c4f070 di:ffffffffff600000 [2033763.876144] exe[550132] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617c7bf67f9 cs:33 sp:7f5c80443858 ax:0 si:5617c7c4f070 di:ffffffffff600000 [2033764.004832] exe[484655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617c7bf67f9 cs:33 sp:7f5c80485858 ax:0 si:5617c7c4f070 di:ffffffffff600000 [2033764.007724] exe[521190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5617c7bf67f9 cs:33 sp:7f5c80464858 ax:0 si:5617c7c4f070 di:ffffffffff600000 [2034182.847737] potentially unexpected fatal signal 5. [2034182.852909] CPU: 9 PID: 577985 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2034182.863325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2034182.872896] RIP: 0033:0x7fffffffe062 [2034182.876828] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2034182.895955] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2034182.902845] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2034182.907319] potentially unexpected fatal signal 5. [2034182.911671] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2034182.916830] CPU: 26 PID: 517833 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2034182.916833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2034182.925635] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2034182.931042] potentially unexpected fatal signal 5. [2034182.931045] CPU: 7 PID: 577992 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2034182.931046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2034182.931048] RIP: 0033:0x7fffffffe062 [2034182.931050] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2034182.931051] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2034182.931053] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2034182.931053] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2034182.931054] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2034182.931054] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2034182.931055] R13: 0000000000000026 R14: 000000c000167860 R15: 0000000000075a1f [2034182.931056] FS: 000000c000130890 GS: 0000000000000000 [2034182.936116] RIP: 0033:0x7fffffffe062 [2034182.936120] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2034182.947126] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2034182.947127] R13: 000000000000002c R14: 000000c000682340 R15: 0000000000075a1b [2034182.947128] FS: 000000c000130490 GS: 0000000000000000 [2034183.004638] potentially unexpected fatal signal 5. [2034183.005384] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2034183.010973] CPU: 79 PID: 577987 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2034183.010975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2034183.010979] RIP: 0033:0x7fffffffe062 [2034183.010982] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2034183.010983] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2034183.010985] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2034183.010986] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2034183.010986] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2034183.010987] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2034183.010988] R13: 0000000000000026 R14: 000000c000167860 R15: 0000000000075a1f [2034183.010989] FS: 000000c000130890 GS: 0000000000000000 [2034183.211594] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2034183.219062] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2034183.227974] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2034183.236854] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2034183.245679] R13: 0000000000000026 R14: 000000c000167860 R15: 0000000000075a1f [2034183.254515] FS: 000000c000130890 GS: 0000000000000000 [2034406.997757] potentially unexpected fatal signal 5. [2034407.003021] CPU: 79 PID: 530049 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2034407.013621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2034407.023242] RIP: 0033:0x7fffffffe062 [2034407.027168] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2034407.032799] potentially unexpected fatal signal 5. [2034407.046269] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2034407.046271] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2034407.046272] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2034407.046273] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2034407.046273] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2034407.046274] R13: 0000000000000022 R14: 000000c000183d40 R15: 0000000000078aaa [2034407.046278] FS: 00000000022d2550 GS: 0000000000000000 [2034407.104022] CPU: 45 PID: 589977 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2034407.116074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2034407.127101] RIP: 0033:0x7fffffffe062 [2034407.132354] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2034407.152818] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2034407.159731] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2034407.168587] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2034407.177413] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2034407.186245] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2034407.195078] R13: 0000000000000022 R14: 000000c000183d40 R15: 0000000000078aaa [2034407.203920] FS: 00000000022d2550 GS: 0000000000000000 [2034440.618013] exe[525710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632436ab7f9 cs:33 sp:7fc157d01858 ax:0 si:563243704097 di:ffffffffff600000 [2034440.809276] exe[543602] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632436ab7f9 cs:33 sp:7fc157d01858 ax:0 si:563243704097 di:ffffffffff600000 [2034440.810429] exe[592983] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632436ab7f9 cs:33 sp:7fc157ce0858 ax:0 si:563243704097 di:ffffffffff600000 [2034441.229815] exe[542624] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5632436ab7f9 cs:33 sp:7fc157cbf858 ax:0 si:563243704097 di:ffffffffff600000 [2034517.868475] potentially unexpected fatal signal 5. [2034517.873608] CPU: 34 PID: 597031 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2034517.884104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2034517.893655] RIP: 0033:0x7fffffffe062 [2034517.897548] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2034517.915528] potentially unexpected fatal signal 5. [2034517.916679] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2034517.918058] potentially unexpected fatal signal 5. [2034517.918062] CPU: 90 PID: 532959 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2034517.918063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2034517.918067] RIP: 0033:0x7fffffffe062 [2034517.918069] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2034517.918070] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2034517.918072] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2034517.918072] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2034517.918073] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2034517.918074] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2034517.918075] R13: 000000000000001e R14: 000000c0001a1520 R15: 000000000007a62f [2034517.918076] FS: 000000c000580090 GS: 0000000000000000 [2034517.921791] CPU: 44 PID: 562297 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2034517.921793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2034517.921797] RIP: 0033:0x7fffffffe062 [2034517.921801] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2034517.928804] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2034517.928805] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2034517.928806] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2034517.928806] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2034517.928807] R13: 000000000000001e R14: 000000c0001a1520 R15: 000000000007a62f [2034517.928808] FS: 000000c000580090 GS: 0000000000000000 [2034518.124528] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2034518.130086] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2034518.138917] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2034518.147847] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2034518.155318] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2034518.164190] R13: 000000000000001e R14: 000000c0001a1520 R15: 000000000007a62f [2034518.173052] FS: 000000c000580090 GS: 0000000000000000 [2034980.945757] exe[582741] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56244f1177f9 cs:33 sp:7f46d2dcf858 ax:0 si:56244f170097 di:ffffffffff600000 [2034980.997365] exe[579365] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56244f1177f9 cs:33 sp:7f46d2dcf858 ax:0 si:56244f170097 di:ffffffffff600000 [2034981.786209] exe[579354] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56244f1177f9 cs:33 sp:7f46d2dae858 ax:0 si:56244f170097 di:ffffffffff600000 [2035346.431214] potentially unexpected fatal signal 5. [2035346.436431] CPU: 68 PID: 647284 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2035346.446954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2035346.456519] RIP: 0033:0x7fffffffe062 [2035346.460445] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2035346.479592] RSP: 002b:000000c000671cb0 EFLAGS: 00000297 [2035346.486549] RAX: 00005614ec6d6000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2035346.495427] RDX: 0000000000000001 RSI: 000000000012a000 RDI: 00005614ec6d6000 [2035346.504282] RBP: 000000c000671d40 R08: 0000000000000009 R09: 000000000c7d6000 [2035346.513094] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c000671bd8 [2035346.521977] R13: 000000c000180000 R14: 000000c0001a0d00 R15: 000000000009d8ee [2035346.530836] FS: 00007f314f7fe6c0 GS: 0000000000000000 [2035367.459309] potentially unexpected fatal signal 5. [2035367.464448] CPU: 34 PID: 650710 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2035367.474950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2035367.484525] RIP: 0033:0x7fffffffe062 [2035367.488424] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2035367.507584] RSP: 002b:000000c00053dcb0 EFLAGS: 00000297 [2035367.514515] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2035367.523451] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2035367.532287] RBP: 000000c00053dd40 R08: 0000000000000000 R09: 0000000000000000 [2035367.541138] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00053dbf8 [2035367.549987] R13: 0000000002a7dd40 R14: 000000c0004db380 R15: 000000000009a54c [2035367.558816] FS: 0000000003db33c0 GS: 0000000000000000 [2038027.623101] potentially unexpected fatal signal 5. [2038027.628304] CPU: 0 PID: 722048 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2038027.638767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2038027.648496] RIP: 0033:0x7fffffffe062 [2038027.652418] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2038027.671634] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2038027.677200] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2038027.684655] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2038027.693599] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2038027.702419] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2038027.709885] R13: 0000000000000034 R14: 000000c0004c9860 R15: 0000000000090968 [2038027.717345] FS: 000000c000130490 GS: 0000000000000000 [2038027.951222] potentially unexpected fatal signal 5. [2038027.951354] potentially unexpected fatal signal 5. [2038027.956443] CPU: 62 PID: 592257 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2038027.961593] CPU: 15 PID: 614747 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2038027.972090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2038027.983949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2038027.983954] RIP: 0033:0x7fffffffe062 [2038027.983956] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2038027.983957] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2038027.983958] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2038027.983959] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2038027.983959] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2038027.983960] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2038027.983960] R13: 0000000000000034 R14: 000000c0004c9860 R15: 0000000000090968 [2038027.983961] FS: 000000c000130490 GS: 0000000000000000 [2038028.083620] RIP: 0033:0x7fffffffe062 [2038028.089065] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2038028.109518] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2038028.116449] RAX: 00000000000b179b RBX: 0000000000000000 RCX: 00007fffffffe05a [2038028.125289] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2038028.134271] RBP: 000000c00018fe38 R08: 000000c0006301f0 R09: 0000000000000000 [2038028.143135] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2038028.151988] R13: 0000000000000034 R14: 000000c0004c9860 R15: 0000000000090968 [2038028.160946] FS: 000000c000130490 GS: 0000000000000000 [2039130.226122] potentially unexpected fatal signal 5. [2039130.231239] CPU: 40 PID: 715923 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2039130.241846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2039130.251472] RIP: 0033:0x7fffffffe062 [2039130.255424] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2039130.274625] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2039130.281560] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2039130.290520] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2039130.299445] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2039130.306877] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2039130.315895] R13: 0000000000000036 R14: 000000c000581380 R15: 00000000000a046d [2039130.323347] FS: 000000c000130c90 GS: 0000000000000000 [2039138.919456] potentially unexpected fatal signal 5. [2039138.924569] CPU: 31 PID: 750292 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2039138.924736] potentially unexpected fatal signal 5. [2039138.935066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2039138.940134] CPU: 45 PID: 751330 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2039138.940135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2039138.940139] RIP: 0033:0x7fffffffe062 [2039138.940141] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2039138.940145] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2039138.949675] RIP: 0033:0x7fffffffe062 [2039138.949678] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2039138.949681] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2039138.973644] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2039138.973646] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2039138.973647] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2039138.973648] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [2039138.973648] R13: 0000000000000022 R14: 000000c000167520 R15: 00000000000a068e [2039138.973649] FS: 00000000022d2550 GS: 0000000000000000 [2039139.044231] potentially unexpected fatal signal 5. [2039139.046661] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2039139.054211] CPU: 65 PID: 749328 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2039139.054212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2039139.054216] RIP: 0033:0x7fffffffe062 [2039139.054219] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2039139.063048] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2039139.063050] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2039139.063051] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2039139.063052] R13: 0000000000000022 R14: 000000c000167520 R15: 00000000000a068e [2039139.063053] FS: 00000000022d2550 GS: 0000000000000000 [2039139.151412] potentially unexpected fatal signal 5. [2039139.156809] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2039139.156811] RAX: 00000000000b76ed RBX: 0000000000000000 RCX: 00007fffffffe05a [2039139.156812] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [2039139.156812] RBP: 000000c000193e38 R08: 000000c0026ada50 R09: 0000000000000000 [2039139.156813] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2039139.156813] R13: 0000000000000022 R14: 000000c000167520 R15: 00000000000a068e [2039139.156814] FS: 00000000022d2550 GS: 0000000000000000 [2039139.228879] CPU: 84 PID: 751278 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2039139.239377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2039139.250283] RIP: 0033:0x7fffffffe062 [2039139.254163] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2039139.273261] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2039139.278787] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2039139.286265] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2039139.295082] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2039139.302536] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2039139.311366] R13: 0000000000000022 R14: 000000c000167520 R15: 00000000000a068e [2039139.318803] FS: 00000000022d2550 GS: 0000000000000000 [2039140.650450] potentially unexpected fatal signal 5. [2039140.655601] CPU: 21 PID: 701465 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2039140.666082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2039140.675604] RIP: 0033:0x7fffffffe062 [2039140.679476] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2039140.698755] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2039140.704308] RAX: 00000000000b7732 RBX: 0000000000000000 RCX: 00007fffffffe05a [2039140.713142] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2039140.720617] RBP: 000000c00018fe38 R08: 000000c0052a8010 R09: 0000000000000000 [2039140.729439] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2039140.736926] R13: 0000000000000022 R14: 000000c0001ae4e0 R15: 00000000000a08af [2039140.744376] FS: 000000c000580090 GS: 0000000000000000 [2040371.835548] exe[800286] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc0a48d7f9 cs:33 sp:7f72cc853858 ax:0 si:55cc0a4e6070 di:ffffffffff600000 [2040371.957837] exe[799440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc0a48d7f9 cs:33 sp:7f72cc832858 ax:0 si:55cc0a4e6070 di:ffffffffff600000 [2040372.091342] exe[799293] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cc0a48d7f9 cs:33 sp:7f72cc853858 ax:0 si:55cc0a4e6070 di:ffffffffff600000 [2040648.519235] potentially unexpected fatal signal 5. [2040648.524365] CPU: 27 PID: 797477 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2040648.534945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2040648.544491] RIP: 0033:0x7fffffffe062 [2040648.548381] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2040648.567468] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2040648.573089] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2040648.580662] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2040648.588226] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2040648.597027] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2040648.605905] R13: 0000000000000038 R14: 000000c000502340 R15: 00000000000b778d [2040648.614811] FS: 000000c000130490 GS: 0000000000000000 [2040654.523282] potentially unexpected fatal signal 5. [2040654.528428] CPU: 92 PID: 760441 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2040654.538954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2040654.548577] RIP: 0033:0x7fffffffe062 [2040654.552534] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2040654.571619] RSP: 002b:000000c000493d98 EFLAGS: 00000297 [2040654.577210] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2040654.584680] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2040654.593629] RBP: 000000c000493e38 R08: 0000000000000000 R09: 0000000000000000 [2040654.602465] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000493e20 [2040654.611298] R13: 0000000000000016 R14: 000000c0003001a0 R15: 00000000000b7794 [2040654.618770] FS: 0000000001ff7f10 GS: 0000000000000000 [2040672.926545] potentially unexpected fatal signal 5. [2040672.931705] CPU: 17 PID: 809848 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2040672.942274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2040672.951788] RIP: 0033:0x7fffffffe062 [2040672.955646] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2040672.974729] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2040672.980283] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2040672.987770] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2040672.995261] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2040673.004122] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2040673.011564] R13: 0000000000000032 R14: 000000c000516680 R15: 00000000000b1c9a [2040673.019041] FS: 000000c000180090 GS: 0000000000000000 [2040705.001816] potentially unexpected fatal signal 5. [2040705.006957] CPU: 55 PID: 811612 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2040705.017497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2040705.027021] RIP: 0033:0x7fffffffe062 [2040705.030898] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2040705.050008] RSP: 002b:000000c000519d98 EFLAGS: 00000297 [2040705.055556] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2040705.064387] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2040705.073218] RBP: 000000c000519e38 R08: 0000000000000000 R09: 0000000000000000 [2040705.082121] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000519e20 [2040705.089580] R13: 0000000000000006 R14: 000000c000583ba0 R15: 00000000000c5fc2 [2040705.098509] FS: 000000c00050c090 GS: 0000000000000000 [2040794.145378] potentially unexpected fatal signal 5. [2040794.150499] CPU: 0 PID: 817106 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2040794.161016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2040794.170561] RIP: 0033:0x7fffffffe062 [2040794.174475] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2040794.193569] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2040794.199119] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2040794.207993] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2040794.216796] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2040794.224331] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2040794.233189] R13: 000000000000003e R14: 000000c000580680 R15: 00000000000ba744 [2040794.242024] FS: 000000c000130890 GS: 0000000000000000 [2042304.587036] exe[888048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c813b57f9 cs:33 sp:7ef5d8bd0858 ax:0 si:560c8140e097 di:ffffffffff600000 [2042304.704547] exe[851248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c813b57f9 cs:33 sp:7ef5d8bd0858 ax:0 si:560c8140e097 di:ffffffffff600000 [2042304.795330] exe[851240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c813b57f9 cs:33 sp:7ef5d8bd0858 ax:0 si:560c8140e097 di:ffffffffff600000 [2042304.947211] exe[876319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560c813b57f9 cs:33 sp:7ef5d8bd0858 ax:0 si:560c8140e097 di:ffffffffff600000 [2042321.054729] exe[850233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042321.248040] exe[888153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042321.575572] exe[850255] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042321.797474] exe[850233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042321.985516] exe[869671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042322.166130] exe[866397] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042322.403903] exe[850233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042322.581996] exe[850709] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042322.867013] exe[888408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042322.984183] exe[856915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042326.544753] warn_bad_vsyscall: 49 callbacks suppressed [2042326.544756] exe[888314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042326.741984] exe[888314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042326.901276] exe[888080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042327.123405] exe[887248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042327.361817] exe[888080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042327.437421] exe[888036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042327.659360] exe[888314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042327.789827] exe[888036] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042327.907417] exe[888080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042327.913282] exe[888314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042331.647609] warn_bad_vsyscall: 75 callbacks suppressed [2042331.647612] exe[847030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042331.972238] exe[851058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042332.426128] exe[888060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042332.578510] exe[888040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042332.707782] exe[888040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042332.815568] exe[847033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042333.093093] exe[888458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042333.229183] exe[847030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042333.456299] exe[856965] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042333.786158] exe[847030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042336.769382] warn_bad_vsyscall: 15 callbacks suppressed [2042336.769385] exe[887248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042336.910748] exe[882749] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042337.093720] exe[851240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042337.185737] exe[869671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042337.391486] exe[851113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042337.497257] exe[876962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042337.681810] exe[851240] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042337.909814] exe[847047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042337.950857] exe[847033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042337.980487] exe[847048] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042342.510557] warn_bad_vsyscall: 86 callbacks suppressed [2042342.510560] exe[875075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042343.445249] exe[875059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042343.447904] exe[875372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec28858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042344.208519] exe[876962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042344.360067] exe[876009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042344.482653] exe[875503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042344.607706] exe[888050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042344.706042] exe[876009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042345.414984] exe[875075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042345.513933] exe[851058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042348.103575] warn_bad_vsyscall: 7 callbacks suppressed [2042348.103578] exe[876962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042348.225719] exe[875476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042348.277884] exe[875057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042349.021715] exe[875262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042349.923510] exe[888683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042350.039469] exe[875075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042350.143309] exe[851113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042350.146088] exe[876962] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042350.299647] exe[875503] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042350.427872] exe[875075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042353.377772] warn_bad_vsyscall: 13 callbacks suppressed [2042353.377776] exe[888497] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042353.506597] exe[875059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624b364c7f9 cs:33 sp:7ef8c35fe858 ax:0 si:5624b36a5062 di:ffffffffff600000 [2042353.607141] exe[888038] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042353.711827] exe[887249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042353.842063] exe[867392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042353.958048] exe[887785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042354.097900] exe[887321] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042354.250529] exe[850953] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042354.322902] exe[887320] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042354.461758] exe[875892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042358.514753] warn_bad_vsyscall: 61 callbacks suppressed [2042358.514756] exe[888860] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042358.754851] exe[891840] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042358.968908] exe[888033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042359.083359] exe[888529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042359.214184] exe[847027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042359.346361] exe[875372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042359.584435] exe[887249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042359.617908] exe[887249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042359.646779] exe[847030] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042359.693172] exe[847027] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042363.541902] warn_bad_vsyscall: 80 callbacks suppressed [2042363.541905] exe[888042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042363.864501] exe[888153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042364.135341] exe[888408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042364.266259] exe[888153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec28858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042364.599528] exe[888059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042364.787944] exe[888059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042365.225992] exe[888078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042365.499812] exe[847033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042365.729657] exe[847033] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042365.863876] exe[888060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042368.546966] warn_bad_vsyscall: 17 callbacks suppressed [2042368.546969] exe[875059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd070 di:ffffffffff600000 [2042368.701212] exe[875372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042368.842726] exe[875059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042368.877621] exe[875372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec28858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042369.004125] exe[888458] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042369.153407] exe[888044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042369.317388] exe[875078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042369.601680] exe[889313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042369.753154] exe[888153] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042369.874967] exe[875372] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042373.643953] warn_bad_vsyscall: 66 callbacks suppressed [2042373.643956] exe[888528] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042373.808648] exe[851112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042373.940350] exe[888181] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042374.082111] exe[888527] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042374.214701] exe[888050] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042374.345939] exe[858348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042374.474370] exe[858348] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042374.968367] exe[888047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042375.113617] exe[888067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042375.117251] exe[888042] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042378.730560] warn_bad_vsyscall: 30 callbacks suppressed [2042378.730564] exe[888080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec28858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042379.125144] exe[888061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042379.468488] exe[888061] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042379.587791] exe[888097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042379.620938] exe[888044] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042379.768963] exe[888190] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2042380.117281] exe[888067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042380.502823] exe[856914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec28858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042380.893904] exe[888078] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec28858 ax:0 si:564cebdcd097 di:ffffffffff600000 [2042381.049279] exe[888620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2043141.071259] warn_bad_vsyscall: 5 callbacks suppressed [2043141.071262] exe[888047] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2043141.455875] exe[888040] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec6a858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2043141.691083] exe[889313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cebd747f9 cs:33 sp:7ed15ec49858 ax:0 si:564cebdcd062 di:ffffffffff600000 [2044318.681158] potentially unexpected fatal signal 5. [2044318.686276] CPU: 21 PID: 940685 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044318.696855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044318.706490] RIP: 0033:0x7fffffffe062 [2044318.710375] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044318.729366] potentially unexpected fatal signal 5. [2044318.729466] RSP: 002b:000000c00001dcb0 EFLAGS: 00000297 [2044318.734702] CPU: 45 PID: 941332 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044318.734704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044318.734707] RIP: 0033:0x7fffffffe062 [2044318.734710] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044318.734714] RSP: 002b:000000c00001dcb0 EFLAGS: 00000297 [2044318.741648] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044318.741649] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044318.741650] RBP: 000000c00001dd40 R08: 0000000000000000 R09: 0000000000000000 [2044318.741651] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00001dbd8 [2044318.741651] R13: 000000c000138c00 R14: 000000c0002056c0 R15: 00000000000e56ed [2044318.741652] FS: 00007f08969886c0 GS: 0000000000000000 [2044318.843425] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044318.852329] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044318.861377] RBP: 000000c00001dd40 R08: 0000000000000000 R09: 0000000000000000 [2044318.870237] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00001dbd8 [2044318.879060] R13: 000000c000138c00 R14: 000000c0002056c0 R15: 00000000000e56ed [2044318.887913] FS: 00007f08969886c0 GS: 0000000000000000 [2044416.378307] potentially unexpected fatal signal 5. [2044416.383428] CPU: 5 PID: 943429 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044416.393861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044416.403398] RIP: 0033:0x7fffffffe062 [2044416.407303] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044416.426506] RSP: 002b:000000c000177cb0 EFLAGS: 00000297 [2044416.432157] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044416.441099] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044416.449962] RBP: 000000c000177d40 R08: 0000000000000000 R09: 0000000000000000 [2044416.458911] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000177bd8 [2044416.467830] R13: 00000000028a6180 R14: 000000c0002089c0 R15: 00000000000e6050 [2044416.476680] FS: 0000000004f263c0 GS: 0000000000000000 [2044680.930221] potentially unexpected fatal signal 5. [2044680.935344] CPU: 10 PID: 886442 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044680.945827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044680.955411] RIP: 0033:0x7fffffffe062 [2044680.959282] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044680.978457] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2044680.983994] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044680.991473] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044681.000288] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2044681.007757] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2044681.016642] R13: 0000000000000010 R14: 000000c0001b0820 R15: 00000000000c9c9b [2044681.024081] FS: 000000c000130490 GS: 0000000000000000 [2044681.316238] potentially unexpected fatal signal 5. [2044681.321379] CPU: 27 PID: 953097 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044681.331890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044681.341512] RIP: 0033:0x7fffffffe062 [2044681.345386] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044681.364568] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2044681.370139] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044681.378960] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044681.387813] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2044681.396722] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2044681.405561] R13: 0000000000000022 R14: 000000c000582680 R15: 00000000000c9ca6 [2044681.414394] FS: 000000c0004b8490 GS: 0000000000000000 [2044682.180962] potentially unexpected fatal signal 5. [2044682.186097] CPU: 78 PID: 836123 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044682.196606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044682.206219] RIP: 0033:0x7fffffffe062 [2044682.210117] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044682.229223] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2044682.234847] RAX: 00000000000e8b06 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044682.243669] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2044682.252499] RBP: 000000c00018fe38 R08: 000000c027d0ca60 R09: 0000000000000000 [2044682.259941] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2044682.268765] R13: 0000000000000022 R14: 000000c000582680 R15: 00000000000c9ca6 [2044682.276206] FS: 000000c0004b8490 GS: 0000000000000000 [2044682.660591] potentially unexpected fatal signal 5. [2044682.665718] CPU: 14 PID: 953091 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044682.676292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044682.685816] RIP: 0033:0x7fffffffe062 [2044682.689709] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044682.708830] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2044682.715791] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044682.724618] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044682.732068] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2044682.739610] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2044682.748461] R13: 0000000000000022 R14: 000000c000581040 R15: 00000000000c9ca5 [2044682.757378] FS: 000000c000131490 GS: 0000000000000000 [2044737.094545] potentially unexpected fatal signal 5. [2044737.099781] CPU: 72 PID: 959218 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044737.110276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044737.119833] RIP: 0033:0x7fffffffe062 [2044737.123906] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044737.143134] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2044737.150060] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044737.158875] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044737.167693] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2044737.176537] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2044737.185330] R13: 0000000000000022 R14: 000000c000508820 R15: 00000000000cb6a4 [2044737.194147] FS: 00000000022d2550 GS: 0000000000000000 [2044777.580102] potentially unexpected fatal signal 5. [2044777.585249] CPU: 50 PID: 963276 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044777.595740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044777.605300] RIP: 0033:0x7fffffffe062 [2044777.609178] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044777.628670] RSP: 002b:000000c0006e9cb0 EFLAGS: 00000297 [2044777.634255] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044777.643104] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044777.650577] RBP: 000000c0006e9d40 R08: 0000000000000000 R09: 0000000000000000 [2044777.659415] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006e9bd8 [2044777.668259] R13: 000000c000138c00 R14: 000000c000500340 R15: 00000000000e9cca [2044777.677073] FS: 00007f10890886c0 GS: 0000000000000000 [2044778.313078] potentially unexpected fatal signal 5. [2044778.318203] CPU: 41 PID: 963366 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044778.328689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044778.338220] RIP: 0033:0x7fffffffe062 [2044778.342100] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044778.361187] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2044778.366754] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044778.374200] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044778.383120] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2044778.391001] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2044778.398547] R13: 0000000000000022 R14: 000000c0004c5380 R15: 00000000000ccabd [2044778.406080] FS: 000000c0002d4890 GS: 0000000000000000 [2044778.512638] potentially unexpected fatal signal 5. [2044778.517796] CPU: 48 PID: 963347 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044778.529653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044778.540636] RIP: 0033:0x7fffffffe062 [2044778.545914] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044778.565001] RSP: 002b:000000c000527d98 EFLAGS: 00000297 [2044778.570535] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044778.577998] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044778.585431] RBP: 000000c000527e38 R08: 0000000000000000 R09: 0000000000000000 [2044778.592877] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000527e20 [2044778.600405] R13: 0000000000000022 R14: 000000c0004b49c0 R15: 00000000000ccab5 [2044778.607958] FS: 000000c000580090 GS: 0000000000000000 [2044778.868210] potentially unexpected fatal signal 5. [2044778.873356] CPU: 64 PID: 906454 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2044778.883997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2044778.893522] RIP: 0033:0x7fffffffe062 [2044778.897481] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2044778.918093] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2044778.923632] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2044778.931168] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2044778.938711] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2044778.946166] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2044778.953602] R13: 0000000000000022 R14: 000000c0004c5380 R15: 00000000000ccabd [2044778.961119] FS: 000000c0002d4890 GS: 0000000000000000 [2046046.169642] exe[22673] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e20a2437f9 cs:33 sp:7f3b0404cee8 ax:0 si:200031c0 di:ffffffffff600000 [2046046.299971] exe[989062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e20a2437f9 cs:33 sp:7f3b0404cee8 ax:0 si:200031c0 di:ffffffffff600000 [2046046.467266] exe[985359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e20a2437f9 cs:33 sp:7f3b0404cee8 ax:0 si:200031c0 di:ffffffffff600000 [2046083.681267] exe[979202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d717ad7f9 cs:33 sp:7fa54b8fc858 ax:0 si:560d71806097 di:ffffffffff600000 [2046084.533080] exe[979209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d717ad7f9 cs:33 sp:7fa54b8fc858 ax:0 si:560d71806097 di:ffffffffff600000 [2046085.389457] exe[985582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d717ad7f9 cs:33 sp:7fa54b8fc858 ax:0 si:560d71806097 di:ffffffffff600000 [2046085.389675] exe[985577] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560d717ad7f9 cs:33 sp:7fa54b8db858 ax:0 si:560d71806097 di:ffffffffff600000 [2046123.102486] exe[985582] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56249d2987f9 cs:33 sp:7f4817164858 ax:0 si:56249d2f1097 di:ffffffffff600000 [2046124.044082] exe[18056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56249d2987f9 cs:33 sp:7f4817164858 ax:0 si:56249d2f1097 di:ffffffffff600000 [2046124.889330] exe[12267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56249d2987f9 cs:33 sp:7f4817164858 ax:0 si:56249d2f1097 di:ffffffffff600000 [2046125.745115] exe[18055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56249d2987f9 cs:33 sp:7f4817164858 ax:0 si:56249d2f1062 di:ffffffffff600000 [2046126.603627] exe[980431] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56249d2987f9 cs:33 sp:7f4817164858 ax:0 si:56249d2f1062 di:ffffffffff600000 [2046127.463901] exe[12263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56249d2987f9 cs:33 sp:7f4817164858 ax:0 si:56249d2f1062 di:ffffffffff600000 [2046128.276564] exe[987609] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56249d2987f9 cs:33 sp:7f4817185858 ax:0 si:56249d2f1062 di:ffffffffff600000 [2046128.323549] exe[2065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56249d2987f9 cs:33 sp:7f4817185858 ax:0 si:56249d2f1062 di:ffffffffff600000 [2047102.308683] exe[31800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dfc2e47f9 cs:33 sp:7fcfd6ae7858 ax:0 si:562dfc33d062 di:ffffffffff600000 [2047102.468932] exe[996871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dfc2e47f9 cs:33 sp:7fcfd6ae7858 ax:0 si:562dfc33d062 di:ffffffffff600000 [2047102.607678] exe[996871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dfc2e47f9 cs:33 sp:7fcfd6ae7858 ax:0 si:562dfc33d062 di:ffffffffff600000 [2047102.627290] exe[32796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dfc2e47f9 cs:33 sp:7fcfd6ae7858 ax:0 si:562dfc33d062 di:ffffffffff600000 [2047102.647085] exe[32796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562dfc2e47f9 cs:33 sp:7fcfd6ae7858 ax:0 si:562dfc33d062 di:ffffffffff600000 [2047344.282649] exe[999408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f479858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047344.439558] exe[563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f458858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047344.468294] exe[987197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f458858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047344.500388] exe[987197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f458858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047344.529909] exe[987197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f458858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047344.557880] exe[563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f458858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047344.585194] exe[563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f458858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047344.612104] exe[563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f458858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047344.642090] exe[26618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f458858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047344.669109] exe[26618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d2738697f9 cs:33 sp:7f377f458858 ax:0 si:55d2738c2097 di:ffffffffff600000 [2047349.926735] warn_bad_vsyscall: 57 callbacks suppressed [2047349.926738] exe[999361] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047350.102916] exe[11418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047350.256559] exe[999175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047350.406465] exe[999327] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047350.547392] exe[999113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047350.654006] exe[999406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047350.758847] exe[26618] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047350.855224] exe[988271] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047350.956330] exe[999368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047351.064503] exe[999203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047354.947426] warn_bad_vsyscall: 36 callbacks suppressed [2047354.947429] exe[60295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047355.121338] exe[53832] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047355.262064] exe[4441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047356.689336] exe[997264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3dd858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047357.253259] exe[999393] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047357.253307] exe[986731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047357.518280] exe[999606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047357.726509] exe[986762] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047357.862409] exe[27350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047358.134515] exe[9029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047359.957135] warn_bad_vsyscall: 34 callbacks suppressed [2047359.957138] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047359.989383] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047360.014497] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047360.039810] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047360.068784] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047360.095670] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047360.126196] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047360.153828] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047360.180301] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047360.206257] exe[999303] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047364.979349] warn_bad_vsyscall: 56 callbacks suppressed [2047364.979352] exe[60639] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047365.126490] exe[1787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047365.219625] exe[999606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047365.322486] exe[60410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047365.436290] exe[1900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047365.473568] exe[30454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047365.580769] exe[37563] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047365.699164] exe[27447] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047365.803370] exe[50080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047365.912633] exe[999290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.084706] warn_bad_vsyscall: 66 callbacks suppressed [2047370.084709] exe[593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.197095] exe[999233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.238101] exe[999113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.282592] exe[1799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.310484] exe[1799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.345753] exe[1799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.379283] exe[999148] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.433807] exe[7175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.467146] exe[4142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047370.496191] exe[4142] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047375.182263] warn_bad_vsyscall: 128 callbacks suppressed [2047375.182266] exe[55113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047375.358869] exe[999203] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047375.525405] exe[999295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047375.756439] exe[1915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047375.882524] exe[15287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047376.013167] exe[27386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047376.124020] exe[1906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047376.321255] exe[9163] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047376.480772] exe[999188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047376.594081] exe[27386] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047380.188259] warn_bad_vsyscall: 31 callbacks suppressed [2047380.188262] exe[999357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047380.313302] exe[593] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047380.414116] exe[999075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047380.516752] exe[15287] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047380.709549] exe[1799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047380.863989] exe[54418] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047380.892735] exe[55228] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047380.930151] exe[61946] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047380.977360] exe[60611] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047381.007490] exe[54423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047385.254236] warn_bad_vsyscall: 119 callbacks suppressed [2047385.254239] exe[999392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db39b858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047385.368466] exe[27928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047385.490847] exe[11419] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047385.601372] exe[999290] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047385.605713] exe[1787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047385.757508] exe[996405] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047385.899231] exe[999357] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047386.057505] exe[9062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0097 di:ffffffffff600000 [2047386.176962] exe[55083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047386.296284] exe[60433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047390.272358] warn_bad_vsyscall: 101 callbacks suppressed [2047390.272361] exe[26846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047390.388241] exe[2202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047390.513793] exe[2098] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047390.623346] exe[999606] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047390.735812] exe[26226] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047390.842724] exe[54423] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047390.973236] exe[999188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047390.976089] exe[1900] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db3fe858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047391.090980] exe[54309] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047391.222324] exe[1787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556041a877f9 cs:33 sp:7f46db821858 ax:0 si:556041ae0062 di:ffffffffff600000 [2047672.416010] potentially unexpected fatal signal 5. [2047672.421257] CPU: 29 PID: 66475 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2047672.431904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2047672.441458] RIP: 0033:0x7fffffffe062 [2047672.445359] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2047672.464580] RSP: 002b:000000c00065bcb0 EFLAGS: 00000297 [2047672.471561] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2047672.480459] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2047672.489317] RBP: 000000c00065bd40 R08: 0000000000000000 R09: 0000000000000000 [2047672.496783] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00065bbd8 [2047672.504264] R13: 00000000028a6180 R14: 000000c0002a36c0 R15: 0000000000010346 [2047672.513131] FS: 000000000401b3c0 GS: 0000000000000000 [2047696.194290] potentially unexpected fatal signal 5. [2047696.199441] CPU: 21 PID: 68919 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2047696.209843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2047696.219396] RIP: 0033:0x7fffffffe062 [2047696.223271] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2047696.242353] RSP: 002b:000000c000641cb0 EFLAGS: 00000297 [2047696.247885] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2047696.255449] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2047696.262988] RBP: 000000c000641d40 R08: 0000000000000000 R09: 0000000000000000 [2047696.270439] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000641bd8 [2047696.279268] R13: 000000c000138c00 R14: 000000c000535d40 R15: 00000000000106cc [2047696.288110] FS: 00007fb4b24896c0 GS: 0000000000000000 [2047842.560913] potentially unexpected fatal signal 5. [2047842.566073] CPU: 9 PID: 73513 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2047842.576556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2047842.586358] RIP: 0033:0x7fffffffe062 [2047842.590251] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2047842.609615] RSP: 002b:000000c0006b7cb0 EFLAGS: 00000297 [2047842.616759] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2047842.625718] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2047842.634582] RBP: 000000c0006b7d40 R08: 0000000000000000 R09: 0000000000000000 [2047842.643667] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006b7bd8 [2047842.652712] R13: 000000c000138c00 R14: 000000c0002cfa00 R15: 00000000000119b4 [2047842.661639] FS: 00007f4ec7fff6c0 GS: 0000000000000000 [2047932.812672] potentially unexpected fatal signal 5. [2047932.817997] CPU: 16 PID: 74356 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2047932.828491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2047932.838185] RIP: 0033:0x7fffffffe062 [2047932.842084] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2047932.861371] RSP: 002b:000000c00066bcb0 EFLAGS: 00000297 [2047932.867442] RAX: 000000000001280d RBX: 0000000000000000 RCX: 00007fffffffe05a [2047932.874928] RDX: 0000000000000000 RSI: 000000c00066c000 RDI: 0000000000012f00 [2047932.882395] RBP: 000000c00066bd40 R08: 000000c000522100 R09: 0000000000000000 [2047932.891261] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00066bbd8 [2047932.900188] R13: 00000000028a6180 R14: 000000c0001bb860 R15: 0000000000012259 [2047932.909108] FS: 00000000040ca3c0 GS: 0000000000000000 [2048178.301251] potentially unexpected fatal signal 5. [2048178.306395] CPU: 49 PID: 84995 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2048178.319151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2048178.329112] RIP: 0033:0x7fffffffe062 [2048178.333021] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2048178.352317] RSP: 002b:000000c0006cfcb0 EFLAGS: 00000297 [2048178.357906] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2048178.365421] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2048178.374339] RBP: 000000c0006cfd40 R08: 0000000000000000 R09: 0000000000000000 [2048178.383430] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006cfbd8 [2048178.392287] R13: 000000c000138800 R14: 000000c0001b3a00 R15: 00000000000148ca [2048178.401151] FS: 00007f33a08896c0 GS: 0000000000000000 [2048291.370742] potentially unexpected fatal signal 5. [2048291.375893] CPU: 43 PID: 88700 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2048291.386346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2048291.395881] RIP: 0033:0x7fffffffe062 [2048291.399826] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2048291.418930] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2048291.420240] potentially unexpected fatal signal 5. [2048291.424477] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2048291.429570] potentially unexpected fatal signal 5. [2048291.429574] CPU: 50 PID: 19818 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2048291.429577] CPU: 15 PID: 954010 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2048291.429579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2048291.429580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2048291.429584] RIP: 0033:0x7fffffffe062 [2048291.429586] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2048291.429587] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2048291.429589] RAX: 0000000000015a7f RBX: 0000000000000000 RCX: 00007fffffffe05a [2048291.429589] RDX: 0000000000000000 RSI: 000000c000194000 RDI: 0000000000012f00 [2048291.429590] RBP: 000000c000193e38 R08: 000000c00075e6a0 R09: 0000000000000000 [2048291.429590] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [2048291.429591] R13: 0000000000000022 R14: 000000c0004c41a0 R15: 00000000000e8e23 [2048291.429592] FS: 000000c000130890 GS: 0000000000000000 [2048291.429596] RIP: 0033:0x7fffffffe062 [2048291.429599] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2048291.429600] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2048291.437051] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2048291.437052] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2048291.437053] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2048291.437054] R13: 0000000000000022 R14: 000000c0004c41a0 R15: 00000000000e8e23 [2048291.437055] FS: 000000c000130890 GS: 0000000000000000 [2048291.624705] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2048291.631353] potentially unexpected fatal signal 5. [2048291.632266] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2048291.637359] CPU: 15 PID: 47070 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2048291.637360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2048291.637365] RIP: 0033:0x7fffffffe062 [2048291.637367] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2048291.637368] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2048291.637370] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2048291.637371] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2048291.637371] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2048291.637372] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2048291.637372] R13: 000000000000003e R14: 000000c0004b4ea0 R15: 00000000000e8e25 [2048291.637373] FS: 000000c000130490 GS: 0000000000000000 [2048291.739177] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2048291.746732] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2048291.754187] R13: 000000000000003e R14: 000000c0004b4ea0 R15: 00000000000e8e25 [2048291.761617] FS: 000000c000130490 GS: 0000000000000000 [2048292.003183] potentially unexpected fatal signal 5. [2048292.008844] CPU: 65 PID: 45830 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2048292.020735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2048292.031665] RIP: 0033:0x7fffffffe062 [2048292.037003] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2048292.056112] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2048292.061652] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2048292.069670] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2048292.075972] potentially unexpected fatal signal 5. [2048292.078615] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2048292.083705] CPU: 67 PID: 34164 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2048292.083706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2048292.083708] RIP: 0033:0x7fffffffe062 [2048292.083710] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2048292.083711] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2048292.083712] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2048292.083713] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2048292.083713] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2048292.083714] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2048292.083714] R13: 000000000000003e R14: 000000c0004b4ea0 R15: 00000000000e8e25 [2048292.083715] FS: 000000c000130490 GS: 0000000000000000 [2048292.185809] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2048292.193277] R13: 000000000000003e R14: 000000c0004b4ea0 R15: 00000000000e8e25 [2048292.200723] FS: 000000c000130490 GS: 0000000000000000 [2048440.325828] potentially unexpected fatal signal 5. [2048440.330985] CPU: 80 PID: 104367 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2048440.341499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2048440.351037] RIP: 0033:0x7fffffffe062 [2048440.355021] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2048440.374225] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2048440.379755] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2048440.387220] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2048440.394687] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2048440.402170] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2048440.409742] R13: 000000000000003e R14: 000000c000502340 R15: 00000000000ee284 [2048440.417505] FS: 0000000001ff7f10 GS: 0000000000000000 [2048440.555022] potentially unexpected fatal signal 5. [2048440.560203] CPU: 55 PID: 975900 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2048440.570806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2048440.580354] RIP: 0033:0x7fffffffe062 [2048440.584249] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2048440.604719] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2048440.611948] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2048440.620780] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2048440.629738] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2048440.638592] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2048440.647423] R13: 0000000000000034 R14: 000000c000500ea0 R15: 00000000000ee275 [2048440.656298] FS: 000000c000181490 GS: 0000000000000000 [2048687.667720] warn_bad_vsyscall: 73 callbacks suppressed [2048687.667724] exe[107696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e388017f9 cs:33 sp:7ea3ad9bb858 ax:0 si:556e3885a070 di:ffffffffff600000 [2048688.508990] exe[109777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e388017f9 cs:33 sp:7ea3ad9bb858 ax:0 si:556e3885a070 di:ffffffffff600000 [2048689.497566] exe[109487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556e388017f9 cs:33 sp:7ea3ad9bb858 ax:0 si:556e3885a070 di:ffffffffff600000 [2049312.311540] potentially unexpected fatal signal 5. [2049312.316668] CPU: 39 PID: 140488 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2049312.327171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2049312.336712] RIP: 0033:0x7fffffffe062 [2049312.340653] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2049312.359776] RSP: 002b:000000c0006d1cb0 EFLAGS: 00000297 [2049312.366706] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2049312.375644] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2049312.384469] RBP: 000000c0006d1d40 R08: 0000000000000000 R09: 0000000000000000 [2049312.392026] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006d1bd8 [2049312.399589] R13: 000000c000180000 R14: 000000c000573380 R15: 00000000000219aa [2049312.408409] FS: 00007f95320876c0 GS: 0000000000000000 [2049359.521541] exe[153248] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049359.566526] exe[105861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049359.585914] exe[105861] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049359.606061] exe[105758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049359.626217] exe[105758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049359.647044] exe[132710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049359.667267] exe[105758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049359.687265] exe[105758] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049359.706514] exe[106482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049359.726366] exe[106482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559fb4b9d7f9 cs:33 sp:7f25a3737858 ax:0 si:559fb4bf6070 di:ffffffffff600000 [2049657.228581] warn_bad_vsyscall: 57 callbacks suppressed [2049657.228584] exe[129914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4e8c77f9 cs:33 sp:7f2eb86c5858 ax:0 si:55ad4e920062 di:ffffffffff600000 [2049657.666376] exe[93597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4e8c77f9 cs:33 sp:7f2eb86c5858 ax:0 si:55ad4e920062 di:ffffffffff600000 [2049658.280050] exe[103003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4e8c77f9 cs:33 sp:7f2eb86c5858 ax:0 si:55ad4e920062 di:ffffffffff600000 [2049819.457451] potentially unexpected fatal signal 5. [2049819.462663] CPU: 38 PID: 171443 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2049819.473181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2049819.482752] RIP: 0033:0x7fffffffe062 [2049819.486665] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2049819.505747] RSP: 002b:000000c000741cb0 EFLAGS: 00000297 [2049819.511378] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2049819.520218] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2049819.527841] RBP: 000000c000741d40 R08: 0000000000000000 R09: 0000000000000000 [2049819.536869] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000741bd8 [2049819.545733] R13: 00000000028a6180 R14: 000000c00057ab60 R15: 000000000002896b [2049819.554576] FS: 0000000003ae53c0 GS: 0000000000000000 [2050042.964495] exe[165381] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563aec18c7f9 cs:33 sp:7feb5cc42858 ax:0 si:563aec1e5097 di:ffffffffff600000 [2050043.162191] exe[171188] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563aec18c7f9 cs:33 sp:7feb5cc42858 ax:0 si:563aec1e5097 di:ffffffffff600000 [2050043.397631] exe[154118] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563aec18c7f9 cs:33 sp:7feb5cc42858 ax:0 si:563aec1e5097 di:ffffffffff600000 [2050065.852056] exe[118094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55934eaf23ca cs:33 sp:7f31b8914ee8 ax:12 si:ffffffffff600000 di:55934eb5eff2 [2050065.942569] exe[136786] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55934eaf23ca cs:33 sp:7f31b8914ee8 ax:12 si:ffffffffff600000 di:55934eb5eff2 [2050066.032555] exe[118094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55934eaf23ca cs:33 sp:7f31b8914ee8 ax:12 si:ffffffffff600000 di:55934eb5eff2 [2050282.606389] potentially unexpected fatal signal 5. [2050282.611664] CPU: 92 PID: 180270 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2050282.622278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2050282.631840] RIP: 0033:0x7fffffffe062 [2050282.635769] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2050282.654978] RSP: 002b:000000c000549cb0 EFLAGS: 00000297 [2050282.660571] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2050282.669422] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2050282.678430] RBP: 000000c000549d40 R08: 0000000000000000 R09: 0000000000000000 [2050282.687498] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000549bd8 [2050282.696312] R13: 00000000028a6180 R14: 000000c0001824e0 R15: 000000000002a205 [2050282.705371] FS: 0000000003c603c0 GS: 0000000000000000 [2050423.409873] exe[105892] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c18561d7f9 cs:33 sp:7fa9fc88f858 ax:0 si:55c185676062 di:ffffffffff600000 [2050423.456478] exe[114820] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c18561d7f9 cs:33 sp:7fa9fc88f858 ax:0 si:55c185676062 di:ffffffffff600000 [2050423.517267] exe[148911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c18561d7f9 cs:33 sp:7fa9fc88f858 ax:0 si:55c185676062 di:ffffffffff600000 [2050485.297648] exe[182530] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2168ee8 ax:0 si:20002e00 di:ffffffffff600000 [2050485.414520] exe[182529] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2168ee8 ax:0 si:20002e00 di:ffffffffff600000 [2050485.537599] exe[158262] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2105ee8 ax:0 si:20002e00 di:ffffffffff600000 [2050485.565896] exe[157756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2105ee8 ax:0 si:20002e00 di:ffffffffff600000 [2050485.598064] exe[174776] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2105ee8 ax:0 si:20002e00 di:ffffffffff600000 [2050485.630540] exe[162097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2105ee8 ax:0 si:20002e00 di:ffffffffff600000 [2050485.657724] exe[177467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2105ee8 ax:0 si:20002e00 di:ffffffffff600000 [2050485.693342] exe[157548] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2105ee8 ax:0 si:20002e00 di:ffffffffff600000 [2050485.723991] exe[157756] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2105ee8 ax:0 si:20002e00 di:ffffffffff600000 [2050485.753907] exe[178125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ef3c75b7f9 cs:33 sp:7f3ea2105ee8 ax:0 si:20002e00 di:ffffffffff600000 [2051902.368782] potentially unexpected fatal signal 5. [2051902.373915] CPU: 79 PID: 91971 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2051902.384325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2051902.393928] RIP: 0033:0x7fffffffe062 [2051902.397796] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2051902.416963] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2051902.422523] RAX: 0000000000033842 RBX: 0000000000000000 RCX: 00007fffffffe05a [2051902.429968] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [2051902.437442] RBP: 000000c00013de38 R08: 000000c001d61870 R09: 0000000000000000 [2051902.444904] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2051902.452366] R13: 0000000000000022 R14: 000000c00050a4e0 R15: 0000000000015c66 [2051902.459894] FS: 00000000022d2550 GS: 0000000000000000 [2051902.573638] potentially unexpected fatal signal 5. [2051902.579935] CPU: 30 PID: 136860 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2051902.590614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2051902.600266] RIP: 0033:0x7fffffffe062 [2051902.604143] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2051902.623245] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2051902.628830] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2051902.636334] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2051902.643919] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2051902.651404] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2051902.658878] R13: 000000000000003e R14: 000000c000493d40 R15: 0000000000015c35 [2051902.666414] FS: 0000000001ff7f10 GS: 0000000000000000 [2051903.227099] potentially unexpected fatal signal 5. [2051903.230136] potentially unexpected fatal signal 5. [2051903.232311] CPU: 48 PID: 160928 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2051903.237399] CPU: 0 PID: 122691 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2051903.237401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2051903.237406] RIP: 0033:0x7fffffffe062 [2051903.237408] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2051903.237409] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2051903.237411] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2051903.237412] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2051903.237413] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2051903.237414] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2051903.237414] R13: 0000000000000022 R14: 000000c00050a4e0 R15: 0000000000015c66 [2051903.237415] FS: 00000000022d2550 GS: 0000000000000000 [2051903.249534] potentially unexpected fatal signal 5. [2051903.258496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2051903.258499] RIP: 0033:0x7fffffffe062 [2051903.258502] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2051903.268162] CPU: 0 PID: 210959 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2051903.268163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2051903.268169] RIP: 0033:0x7fffffffe062 [2051903.268178] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2051903.272106] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2051903.291213] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2051903.304306] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2051903.304307] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2051903.304308] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2051903.304308] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2051903.304309] R13: 0000000000000022 R14: 000000c00050a4e0 R15: 0000000000015c66 [2051903.304310] FS: 00000000022d2550 GS: 0000000000000000 [2051903.480773] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2051903.488303] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2051903.497404] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2051903.504846] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2051903.512305] R13: 0000000000000022 R14: 000000c00050a4e0 R15: 0000000000015c66 [2051903.521130] FS: 00000000022d2550 GS: 0000000000000000 [2051999.820950] potentially unexpected fatal signal 5. [2051999.826099] CPU: 16 PID: 174639 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2051999.836686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2051999.846253] RIP: 0033:0x7fffffffe062 [2051999.850154] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2051999.869279] RSP: 002b:000000c00069bd98 EFLAGS: 00000297 [2051999.876213] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2051999.885167] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2051999.893985] RBP: 000000c00069be38 R08: 0000000000000000 R09: 0000000000000000 [2051999.901445] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00069be20 [2051999.910256] R13: 000000000000001e R14: 000000c000007a00 R15: 0000000000018498 [2051999.919259] FS: 00000000022d2550 GS: 0000000000000000 [2052051.709649] warn_bad_vsyscall: 25 callbacks suppressed [2052051.709653] exe[115467] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f17522bcee8 ax:0 si:20000140 di:ffffffffff600000 [2052051.880973] exe[115014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f175229bee8 ax:0 si:20000140 di:ffffffffff600000 [2052051.908594] exe[115014] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f175229bee8 ax:0 si:20000140 di:ffffffffff600000 [2052051.942284] exe[125781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f175229bee8 ax:0 si:20000140 di:ffffffffff600000 [2052051.974210] exe[141145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f175229bee8 ax:0 si:20000140 di:ffffffffff600000 [2052052.002707] exe[141145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f175229bee8 ax:0 si:20000140 di:ffffffffff600000 [2052052.031022] exe[137144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f175229bee8 ax:0 si:20000140 di:ffffffffff600000 [2052052.059718] exe[137144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f175229bee8 ax:0 si:20000140 di:ffffffffff600000 [2052052.086838] exe[137144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f175229bee8 ax:0 si:20000140 di:ffffffffff600000 [2052052.113210] exe[137144] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5566e1c6a7f9 cs:33 sp:7f175229bee8 ax:0 si:20000140 di:ffffffffff600000 [2054791.431919] warn_bad_vsyscall: 56 callbacks suppressed [2054791.431922] exe[300073] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650c58e83ca cs:33 sp:7ec8f3598ee8 ax:12 si:ffffffffff600000 di:5650c5954ff2 [2054794.401433] exe[300074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650c58e83ca cs:33 sp:7ec8f3598ee8 ax:12 si:ffffffffff600000 di:5650c5954ff2 [2054794.465543] exe[300074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5650c58e83ca cs:33 sp:7ec8f3598ee8 ax:12 si:ffffffffff600000 di:5650c5954ff2 [2054905.290274] exe[308364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1871c7f9 cs:33 sp:7eb9b67feee8 ax:0 si:200001c0 di:ffffffffff600000 [2054905.336390] exe[308369] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1871c7f9 cs:33 sp:7eb9b67feee8 ax:0 si:200001c0 di:ffffffffff600000 [2054905.391026] exe[299894] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1871c7f9 cs:33 sp:7eb9b67feee8 ax:0 si:200001c0 di:ffffffffff600000 [2054905.411337] exe[308364] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe1871c7f9 cs:33 sp:7eb9b67feee8 ax:0 si:200001c0 di:ffffffffff600000 [2055028.308258] exe[310862] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed7bc683ca cs:33 sp:7eabac1d4ee8 ax:12 si:ffffffffff600000 di:55ed7bcd4ff2 [2055029.155802] exe[310837] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed7bc683ca cs:33 sp:7eabac1d4ee8 ax:12 si:ffffffffff600000 di:55ed7bcd4ff2 [2055029.954185] exe[294501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed7bc683ca cs:33 sp:7eabac1d4ee8 ax:12 si:ffffffffff600000 di:55ed7bcd4ff2 [2055309.254245] exe[300410] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a1f0c7f9 cs:33 sp:7f6a409feee8 ax:0 si:20000140 di:ffffffffff600000 [2055309.356746] exe[299658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a1f0c7f9 cs:33 sp:7f6a409ddee8 ax:0 si:20000140 di:ffffffffff600000 [2055309.450825] exe[297080] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1a1f0c7f9 cs:33 sp:7f6a409feee8 ax:0 si:20000140 di:ffffffffff600000 [2055513.018889] potentially unexpected fatal signal 5. [2055513.024010] CPU: 0 PID: 227683 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2055513.034411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2055513.043950] RIP: 0033:0x7fffffffe062 [2055513.047812] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2055513.066911] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2055513.072484] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2055513.081313] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2055513.088742] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2055513.097675] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2055513.106529] R13: 0000000000000006 R14: 000000c0005ac340 R15: 00000000000339cc [2055513.115418] FS: 000000c000130890 GS: 0000000000000000 [2055513.133406] potentially unexpected fatal signal 5. [2055513.138555] CPU: 89 PID: 319939 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2055513.149185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2055513.158735] RIP: 0033:0x7fffffffe062 [2055513.162623] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2055513.181724] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2055513.188653] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2055513.197493] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2055513.204937] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2055513.212400] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2055513.221211] R13: 0000000000000016 R14: 000000c0004dcb60 R15: 00000000000339cd [2055513.228680] FS: 000000c000180090 GS: 0000000000000000 [2055513.933418] potentially unexpected fatal signal 5. [2055513.938556] CPU: 86 PID: 260724 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2055513.949072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2055513.958602] RIP: 0033:0x7fffffffe062 [2055513.962557] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2055513.983176] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2055513.990169] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2055513.997612] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2055514.006432] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2055514.013865] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2055514.021291] R13: 0000000000000022 R14: 000000c0005f6680 R15: 00000000000339d6 [2055514.030110] FS: 000000c000180090 GS: 0000000000000000 [2055586.778121] exe[297032] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2055586.915392] exe[236675] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2055587.006947] exe[234774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2055587.016159] exe[311301] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2055587.020804] exe[238054] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2055587.023265] exe[238062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2055587.025684] exe[237698] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2055587.029079] exe[235990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2055587.029254] exe[288007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2055587.029503] exe[234774] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559aedd6faf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:80020000 [2056119.497269] warn_bad_vsyscall: 57 callbacks suppressed [2056119.497272] exe[333676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56144aabdaf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30101000 [2056119.550566] exe[348985] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56144aabdaf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30101000 [2056119.628156] exe[333726] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56144aabdaf1 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:30101000 [2056333.486449] exe[334928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56315d2407f9 cs:33 sp:7fd6ec0ac858 ax:0 si:56315d299097 di:ffffffffff600000 [2056333.543387] exe[354914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56315d2407f9 cs:33 sp:7fd6ec0ac858 ax:0 si:56315d299097 di:ffffffffff600000 [2056334.314536] exe[361404] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56315d2407f9 cs:33 sp:7fd6ec0ac858 ax:0 si:56315d299097 di:ffffffffff600000 [2056334.314804] exe[334264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56315d2407f9 cs:33 sp:7fd6ec08b858 ax:0 si:56315d299097 di:ffffffffff600000 [2057139.024329] exe[383760] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4cda57f9 cs:33 sp:7f605be43858 ax:0 si:55ad4cdfe070 di:ffffffffff600000 [2057139.126607] exe[383773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4cda57f9 cs:33 sp:7f605be43858 ax:0 si:55ad4cdfe070 di:ffffffffff600000 [2057139.163408] exe[383773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4cda57f9 cs:33 sp:7f605be22858 ax:0 si:55ad4cdfe070 di:ffffffffff600000 [2057139.861359] exe[382901] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ad4cda57f9 cs:33 sp:7f605be22858 ax:0 si:55ad4cdfe070 di:ffffffffff600000 [2057141.020099] exe[373658] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f6da7c7f9 cs:33 sp:7fd045049858 ax:0 si:560f6dad5062 di:ffffffffff600000 [2057141.687163] exe[384931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f6da7c7f9 cs:33 sp:7fd045049858 ax:0 si:560f6dad5062 di:ffffffffff600000 [2057141.796710] exe[382280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f6da7c7f9 cs:33 sp:7fd045049858 ax:0 si:560f6dad5062 di:ffffffffff600000 [2057141.797271] exe[383263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f6da7c7f9 cs:33 sp:7fd045028858 ax:0 si:560f6dad5062 di:ffffffffff600000 [2057352.645658] potentially unexpected fatal signal 5. [2057352.651159] CPU: 86 PID: 388908 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2057352.661637] potentially unexpected fatal signal 5. [2057352.661641] CPU: 76 PID: 388907 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2057352.661642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2057352.661646] RIP: 0033:0x7fffffffe062 [2057352.661648] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2057352.661649] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2057352.661651] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2057352.661652] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2057352.661652] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2057352.661653] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c000193e20 [2057352.661654] R13: 0000000000000034 R14: 000000c0005011e0 R15: 000000000004711c [2057352.661654] FS: 0000000001ff7f10 GS: 0000000000000000 [2057352.762912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2057352.772590] RIP: 0033:0x7fffffffe062 [2057352.777990] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2057352.798726] RSP: 002b:000000c000193d98 EFLAGS: 00000297 [2057352.805777] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2057352.814632] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2057352.823495] RBP: 000000c000193e38 R08: 0000000000000000 R09: 0000000000000000 [2057352.830977] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000193e20 [2057352.839063] R13: 0000000000000034 R14: 000000c0005011e0 R15: 000000000004711c [2057352.846543] FS: 0000000001ff7f10 GS: 0000000000000000 [2057412.428494] exe[386218] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4044133ca cs:33 sp:7f2980387ee8 ax:12 si:ffffffffff600000 di:55e40447fff2 [2057412.524007] exe[388526] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4044133ca cs:33 sp:7f2980345ee8 ax:12 si:ffffffffff600000 di:55e40447fff2 [2057412.612081] exe[388392] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e4044133ca cs:33 sp:7f2980387ee8 ax:12 si:ffffffffff600000 di:55e40447fff2 [2058065.442118] potentially unexpected fatal signal 5. [2058065.447374] CPU: 61 PID: 394543 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2058065.458072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2058065.467644] RIP: 0033:0x7fffffffe062 [2058065.471533] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2058065.491012] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2058065.496584] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2058065.505400] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2058065.512938] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2058065.520415] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2058065.529222] R13: 0000000000000036 R14: 000000c00016f380 R15: 0000000000051399 [2058065.536659] FS: 000000c000181890 GS: 0000000000000000 [2058071.865841] potentially unexpected fatal signal 5. [2058071.870979] CPU: 17 PID: 401504 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2058071.881470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2058071.891189] RIP: 0033:0x7fffffffe062 [2058071.895101] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2058071.914176] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2058071.919708] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2058071.928610] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2058071.937439] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2058071.944878] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2058071.952318] R13: 000000000000003e R14: 000000c000581a00 R15: 00000000000513bc [2058071.959837] FS: 000000c000130890 GS: 0000000000000000 [2058072.202376] potentially unexpected fatal signal 5. [2058072.207516] CPU: 70 PID: 333567 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2058072.218030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2058072.228938] RIP: 0033:0x7fffffffe062 [2058072.231238] potentially unexpected fatal signal 5. [2058072.234290] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2058072.234294] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2058072.240793] CPU: 0 PID: 401507 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2058072.261320] RAX: 0000000000062077 RBX: 0000000000000000 RCX: 00007fffffffe05a [2058072.261321] RDX: 0000000000000000 RSI: 000000c00013e000 RDI: 0000000000012f00 [2058072.261322] RBP: 000000c00013de38 R08: 000000c0006794b0 R09: 0000000000000000 [2058072.261322] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2058072.261323] R13: 000000000000003e R14: 000000c000581a00 R15: 00000000000513bc [2058072.261323] FS: 000000c000130890 GS: 0000000000000000 [2058072.327929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2058072.338996] RIP: 0033:0x7fffffffe062 [2058072.344237] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2058072.363738] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2058072.370626] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2058072.378340] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2058072.387269] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2058072.396098] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2058072.404929] R13: 000000000000003e R14: 000000c000581a00 R15: 00000000000513bc [2058072.413757] FS: 000000c000130890 GS: 0000000000000000 [2058466.613431] potentially unexpected fatal signal 5. [2058466.618552] CPU: 5 PID: 427070 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2058466.629014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2058466.638575] RIP: 0033:0x7fffffffe062 [2058466.642467] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2058466.661554] RSP: 002b:000000c0004a1cb0 EFLAGS: 00000297 [2058466.667090] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2058466.674661] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2058466.683518] RBP: 000000c0004a1d40 R08: 0000000000000000 R09: 0000000000000000 [2058466.692369] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0004a1bd8 [2058466.701205] R13: 000000c00044a000 R14: 000000c00047aea0 R15: 00000000000625b8 [2058466.710043] FS: 00007efc0e8886c0 GS: 0000000000000000 [2058852.940024] exe[437008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9b611e3ca cs:33 sp:7f8ace060ee8 ax:12 si:ffffffffff600000 di:55c9b618aff2 [2058853.022455] exe[440942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9b611e3ca cs:33 sp:7f8ace060ee8 ax:12 si:ffffffffff600000 di:55c9b618aff2 [2058853.103484] exe[439640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c9b611e3ca cs:33 sp:7f8ace060ee8 ax:12 si:ffffffffff600000 di:55c9b618aff2 [2059123.897927] potentially unexpected fatal signal 5. [2059123.904901] CPU: 0 PID: 461092 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2059123.915505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2059123.925064] RIP: 0033:0x7fffffffe062 [2059123.928975] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2059123.948091] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2059123.953672] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2059123.962515] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2059123.971949] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2059123.979493] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2059123.986951] R13: 0000000000000024 R14: 000000c000483520 R15: 000000000004e341 [2059123.987496] potentially unexpected fatal signal 5. [2059123.994592] FS: 000000c000180c90 GS: 0000000000000000 [2059124.006890] CPU: 38 PID: 401006 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2059124.018834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2059124.029765] RIP: 0033:0x7fffffffe062 [2059124.033753] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2059124.052832] RSP: 002b:000000c00069bd98 EFLAGS: 00000297 [2059124.059763] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2059124.068600] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2059124.077647] RBP: 000000c00069be38 R08: 0000000000000000 R09: 0000000000000000 [2059124.085103] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00069be20 [2059124.092553] R13: 0000000000000022 R14: 000000c00050cd00 R15: 000000000004e322 [2059124.093363] potentially unexpected fatal signal 5. [2059124.099999] FS: 000000c000130490 GS: 0000000000000000 [2059124.112720] CPU: 42 PID: 461078 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2059124.123208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2059124.134154] RIP: 0033:0x7fffffffe062 [2059124.139516] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2059124.160081] RSP: 002b:000000c00069bd98 EFLAGS: 00000297 [2059124.167166] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2059124.174698] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2059124.183562] RBP: 000000c00069be38 R08: 0000000000000000 R09: 0000000000000000 [2059124.192486] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00069be20 [2059124.199949] R13: 0000000000000022 R14: 000000c00050cd00 R15: 000000000004e322 [2059124.208783] FS: 000000c000130490 GS: 0000000000000000 [2059221.036164] potentially unexpected fatal signal 5. [2059221.037198] potentially unexpected fatal signal 5. [2059221.041506] CPU: 45 PID: 468093 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2059221.046624] CPU: 81 PID: 468090 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2059221.046625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2059221.046629] RIP: 0033:0x7fffffffe062 [2059221.046635] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2059221.046636] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2059221.046638] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2059221.046641] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2059221.057461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2059221.057466] RIP: 0033:0x7fffffffe062 [2059221.057468] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2059221.057469] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2059221.057471] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2059221.057472] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2059221.057472] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2059221.057473] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00013de20 [2059221.057474] R13: 0000000000000022 R14: 000000c0005011e0 R15: 00000000000501db [2059221.057474] FS: 00000000022d2550 GS: 0000000000000000 [2059221.210855] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2059221.218330] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2059221.227199] R13: 0000000000000022 R14: 000000c0005011e0 R15: 00000000000501db [2059221.236015] FS: 00000000022d2550 GS: 0000000000000000 [2059668.322625] exe[448640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f533e3ca cs:33 sp:7f24b89cfee8 ax:12 si:ffffffffff600000 di:5637f53aaff2 [2059668.420124] exe[446938] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f533e3ca cs:33 sp:7f24b89cfee8 ax:12 si:ffffffffff600000 di:5637f53aaff2 [2059668.506670] exe[484388] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f533e3ca cs:33 sp:7f24b89cfee8 ax:12 si:ffffffffff600000 di:5637f53aaff2 [2060781.270159] exe[513082] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1eff53ca cs:33 sp:7fe4e53b9ee8 ax:12 si:ffffffffff600000 di:55eb1f061ff2 [2060781.386814] exe[445573] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1eff53ca cs:33 sp:7fe4e5398ee8 ax:12 si:ffffffffff600000 di:55eb1f061ff2 [2060784.217925] exe[459651] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55eb1eff53ca cs:33 sp:7fe4e53b9ee8 ax:12 si:ffffffffff600000 di:55eb1f061ff2 [2061444.824155] exe[511699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563a92413ca cs:33 sp:7fa0e319aee8 ax:12 si:ffffffffff600000 di:5563a92adff2 [2061444.949606] exe[437138] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563a92413ca cs:33 sp:7fa0e319aee8 ax:12 si:ffffffffff600000 di:5563a92adff2 [2061445.132102] exe[433882] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5563a92413ca cs:33 sp:7fa0e319aee8 ax:12 si:ffffffffff600000 di:5563a92adff2 [2061634.817492] exe[486805] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d7ff47f9 cs:33 sp:7fa9dedfe858 ax:0 si:5622d804d070 di:ffffffffff600000 [2061634.917529] exe[508705] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d7ff47f9 cs:33 sp:7fa9dedfe858 ax:0 si:5622d804d070 di:ffffffffff600000 [2061635.046723] exe[480650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5622d7ff47f9 cs:33 sp:7fa9dedfe858 ax:0 si:5622d804d070 di:ffffffffff600000 [2062100.207749] potentially unexpected fatal signal 5. [2062100.212904] CPU: 38 PID: 536906 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2062100.223591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2062100.233233] RIP: 0033:0x7fffffffe062 [2062100.237128] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2062100.256234] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2062100.261762] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2062100.270604] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2062100.278058] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2062100.286901] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2062100.294389] R13: 0000000000000034 R14: 000000c000183860 R15: 0000000000068864 [2062100.301842] FS: 000000c000130490 GS: 0000000000000000 [2062101.016548] potentially unexpected fatal signal 5. [2062101.021690] CPU: 91 PID: 536902 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2062101.032189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2062101.041824] RIP: 0033:0x7fffffffe062 [2062101.045789] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2062101.065059] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2062101.070601] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2062101.078075] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2062101.087001] RBP: 000000c00013de38 R08: 0000000000000000 R09: 0000000000000000 [2062101.095837] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00013de20 [2062101.103284] R13: 0000000000000020 R14: 000000c000182ea0 R15: 0000000000068862 [2062101.112126] FS: 000000c00050e490 GS: 0000000000000000 [2062370.826524] potentially unexpected fatal signal 5. [2062370.831664] CPU: 62 PID: 550925 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2062370.842241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2062370.851791] RIP: 0033:0x7fffffffe062 [2062370.855672] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2062370.874862] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2062370.880429] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2062370.887969] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2062370.896794] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2062370.905707] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2062370.913245] R13: 0000000000000036 R14: 000000c000481ba0 R15: 000000000006cc90 [2062370.920696] FS: 000000c000130490 GS: 0000000000000000 [2062831.353402] potentially unexpected fatal signal 5. [2062831.358550] CPU: 89 PID: 471449 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2062831.369046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2062831.378582] RIP: 0033:0x7fffffffe062 [2062831.382470] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2062831.401614] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2062831.408533] RAX: 000000000008bb33 RBX: 0000000000000000 RCX: 00007fffffffe05a [2062831.417377] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2062831.424818] RBP: 000000c00018fe38 R08: 000000c0006c95a0 R09: 0000000000000000 [2062831.433661] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2062831.442490] R13: 0000000000000022 R14: 000000c0004be340 R15: 00000000000727a3 [2062831.450009] FS: 000000c00050a090 GS: 0000000000000000 [2062990.420016] potentially unexpected fatal signal 5. [2062990.425129] CPU: 89 PID: 484974 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2062990.435624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2062990.445145] RIP: 0033:0x7fffffffe062 [2062990.449038] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2062990.468354] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2062990.473872] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2062990.482727] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2062990.490353] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2062990.499208] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2062990.506668] R13: 0000000000000036 R14: 000000c0003fd6c0 R15: 000000000007536c [2062990.515507] FS: 000000c000130890 GS: 0000000000000000 [2065612.267746] exe[563685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621842987f9 cs:33 sp:7f4d3dfac858 ax:0 si:5621842f1062 di:ffffffffff600000 [2065612.351101] exe[553415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621842987f9 cs:33 sp:7f4d3dfac858 ax:0 si:5621842f1062 di:ffffffffff600000 [2065612.437235] exe[553264] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621842987f9 cs:33 sp:7f4d3dfac858 ax:0 si:5621842f1062 di:ffffffffff600000 [2065612.468211] exe[553413] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5621842987f9 cs:33 sp:7f4d3dfac858 ax:0 si:5621842f1062 di:ffffffffff600000 [2065653.754089] exe[553339] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56398d2737f9 cs:33 sp:7fba719fe858 ax:0 si:56398d2cc070 di:ffffffffff600000 [2065653.831649] exe[563660] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56398d2737f9 cs:33 sp:7fba719fe858 ax:0 si:56398d2cc070 di:ffffffffff600000 [2065653.918039] exe[553263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56398d2737f9 cs:33 sp:7fba719fe858 ax:0 si:56398d2cc070 di:ffffffffff600000 [2065981.338414] potentially unexpected fatal signal 5. [2065981.343552] CPU: 94 PID: 571846 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2065981.354070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2065981.363665] RIP: 0033:0x7fffffffe062 [2065981.367548] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2065981.386696] RSP: 002b:000000c0005c5d98 EFLAGS: 00000297 [2065981.392283] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2065981.399739] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2065981.408586] RBP: 000000c0005c5e38 R08: 0000000000000000 R09: 0000000000000000 [2065981.417422] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0005c5e20 [2065981.426295] R13: 0000000000000036 R14: 000000c00047f380 R15: 000000000008696a [2065981.435126] FS: 0000000001ff7f10 GS: 0000000000000000 [2066000.728772] exe[653160] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643283287f9 cs:33 sp:7fd29e300858 ax:0 si:564328381097 di:ffffffffff600000 [2066000.871128] exe[653520] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5643283287f9 cs:33 sp:7fd29e2df858 ax:0 si:564328381097 di:ffffffffff600000 [2066680.442279] exe[635632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559573a977f9 cs:33 sp:7f3c81fe8ee8 ax:0 si:20000080 di:ffffffffff600000 [2066680.501643] exe[637257] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559573a977f9 cs:33 sp:7f3c81fe8ee8 ax:0 si:20000080 di:ffffffffff600000 [2066680.527028] exe[635630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559573a977f9 cs:33 sp:7f3c81fe8ee8 ax:0 si:20000080 di:ffffffffff600000 [2066681.294093] exe[664995] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559573a977f9 cs:33 sp:7f3c81fe8ee8 ax:0 si:20000080 di:ffffffffff600000 [2066681.319805] exe[637229] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559573a977f9 cs:33 sp:7f3c81fe8ee8 ax:0 si:20000080 di:ffffffffff600000 [2066872.665444] exe[653075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607a065c3ca cs:33 sp:7f044d10cee8 ax:12 si:ffffffffff600000 di:5607a06c8ff2 [2066872.768695] exe[690204] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607a065c3ca cs:33 sp:7f044d10cee8 ax:12 si:ffffffffff600000 di:5607a06c8ff2 [2066872.849779] exe[667821] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5607a065c3ca cs:33 sp:7f044d10cee8 ax:12 si:ffffffffff600000 di:5607a06c8ff2 [2068024.207259] exe[639212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9d186d3ca cs:33 sp:7fa7bda27ee8 ax:12 si:ffffffffff600000 di:55d9d18d9ff2 [2068024.340772] exe[638335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9d186d3ca cs:33 sp:7fa7bd5feee8 ax:12 si:ffffffffff600000 di:55d9d18d9ff2 [2068024.340862] exe[637516] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9d186d3ca cs:33 sp:7fa7bda27ee8 ax:12 si:ffffffffff600000 di:55d9d18d9ff2 [2068024.503836] exe[649630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d9d186d3ca cs:33 sp:7fa7bda27ee8 ax:12 si:ffffffffff600000 di:55d9d18d9ff2 [2068907.728836] potentially unexpected fatal signal 5. [2068907.733966] CPU: 85 PID: 730829 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2068907.744477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2068907.754036] RIP: 0033:0x7fffffffe062 [2068907.757920] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2068907.777050] RSP: 002b:000000c00001dcb0 EFLAGS: 00000297 [2068907.784010] RAX: 00007f3cc4e1d000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2068907.792845] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f3cc4e1d000 [2068907.801643] RBP: 000000c00001dd40 R08: 0000000000000009 R09: 00000000019a7000 [2068907.810499] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c00001dbd8 [2068907.819372] R13: 000000c000180000 R14: 000000c0001f4680 R15: 00000000000b2298 [2068907.828275] FS: 00007f063effd6c0 GS: 0000000000000000 [2069031.831839] potentially unexpected fatal signal 11. [2069031.837042] CPU: 29 PID: 734346 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2069031.847564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2069031.857110] RIP: 0033:0x559a86080688 [2069031.860993] Code: 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff 64 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 93 09 00 00 45 85 e4 79 05 64 45 89 75 00 48 8b 84 24 c8 00 00 [2069031.880309] RSP: 002b:00007f822d261440 EFLAGS: 00010202 [2069031.887265] RAX: 0000000000000016 RBX: 0000000000000000 RCX: 0000559a86080b13 [2069031.896084] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 [2069031.903537] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [2069031.912368] R10: 0000559a86cd3750 R11: 0000000000000246 R12: 0000000000000016 [2069031.919822] R13: ffffffffffffffb0 R14: 0000000000000061 R15: 0000000000000000 [2069031.928667] FS: 0000559a86cd3480 GS: 0000000000000000 [2069086.742177] potentially unexpected fatal signal 5. [2069086.747319] CPU: 85 PID: 736026 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2069086.757845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2069086.767443] RIP: 0033:0x7fffffffe062 [2069086.771411] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2069086.792018] RSP: 002b:000000c0006ffcb0 EFLAGS: 00000297 [2069086.798950] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2069086.807873] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00007f9c4260f000 [2069086.816725] RBP: 000000c0006ffd40 R08: 0000000000000000 R09: 0000000000000000 [2069086.825599] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0006ffbd8 [2069086.834440] R13: 000000c000138800 R14: 000000c000503040 R15: 00000000000b3813 [2069086.843311] FS: 00007f71612896c0 GS: 0000000000000000 [2069256.971037] potentially unexpected fatal signal 11. [2069256.976270] CPU: 59 PID: 740604 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2069256.986757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2069256.996272] RIP: 0033:0x55902e1ddfc3 [2069257.000133] Code: 3d a2 fb 13 00 e8 5d 29 ff ff ba 40 00 00 00 48 8d 35 71 10 16 00 bf f9 00 00 00 e8 87 47 04 00 48 83 f8 40 0f 85 ae 0b 00 00 <48> 8b 15 56 10 16 00 48 b8 ce fa ad eb fe 0f dc ba 48 39 c2 0f 85 [2069257.020655] RSP: 002b:00007f935bcea540 EFLAGS: 00010246 [2069257.026194] RAX: 0000000000000040 RBX: 00000000ffffffff RCX: 000055902e22274d [2069257.033761] RDX: 0000000000000040 RSI: 000055902e33f020 RDI: 00000000000000f9 [2069257.042583] RBP: 00007f935bcea59c R08: 000000000000000a R09: 00007f935bcea287 [2069257.051437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000032 [2069257.060314] R13: 000000000000aae7 R14: 000000000000aace R15: 000000000000000c [2069257.069130] FS: 000055902ee73480 GS: 0000000000000000 [2069439.965421] potentially unexpected fatal signal 11. [2069439.970714] CPU: 61 PID: 753653 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2069439.981220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2069439.990751] RIP: 0033:0x55b8efbd2688 [2069439.994634] Code: 84 e4 74 66 e8 89 04 00 00 41 89 c4 85 c0 0f 84 4e 01 00 00 49 c7 c5 b0 ff ff ff 64 45 8b 75 00 48 89 da 89 ee bf 02 00 00 00 93 09 00 00 45 85 e4 79 05 64 45 89 75 00 48 8b 84 24 c8 00 00 [2069440.014235] RSP: 002b:00007fc265b7d440 EFLAGS: 00010202 [2069440.019769] RAX: 0000000000000068 RBX: 0000000000000000 RCX: 000055b8efbd2b13 [2069440.027230] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 [2069440.034690] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [2069440.042214] R10: 000055b8f0825750 R11: 0000000000000246 R12: 0000000000000068 [2069440.049744] R13: ffffffffffffffb0 R14: 0000000000000061 R15: 0000000000000000 [2069440.058596] FS: 000055b8f0825480 GS: 0000000000000000 [2069487.304911] potentially unexpected fatal signal 5. [2069487.310149] CPU: 6 PID: 755978 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2069487.320815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2069487.330377] RIP: 0033:0x7fffffffe062 [2069487.334250] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2069487.353376] RSP: 002b:000000c0006bfcb0 EFLAGS: 00000297 [2069487.358959] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2069487.366430] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00007f2947f33000 [2069487.375291] RBP: 000000c0006bfd40 R08: 0000000000000000 R09: 0000000000000000 [2069487.384115] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0006bfbd8 [2069487.392991] R13: 00000000028a6180 R14: 000000c0002af1e0 R15: 00000000000b8361 [2069487.400468] FS: 00000000039663c0 GS: 0000000000000000 [2069597.774389] potentially unexpected fatal signal 5. [2069597.779514] CPU: 21 PID: 653743 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2069597.790001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2069597.799544] RIP: 0033:0x7fffffffe062 [2069597.803414] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2069597.822499] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2069597.828056] RAX: 00000000000b9d2a RBX: 0000000000000000 RCX: 00007fffffffe05a [2069597.836888] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2069597.845684] RBP: 000000c00018fe38 R08: 000000c00085e790 R09: 0000000000000000 [2069597.854508] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2069597.861950] R13: 0000000000000022 R14: 000000c000515860 R15: 000000000009f49f [2069597.869476] FS: 000000c000130490 GS: 0000000000000000 [2069598.207966] potentially unexpected fatal signal 5. [2069598.213075] CPU: 51 PID: 761128 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2069598.223597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2069598.233136] RIP: 0033:0x7fffffffe062 [2069598.237026] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2069598.256523] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2069598.262058] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2069598.269485] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2069598.276934] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2069598.284359] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2069598.291801] R13: 0000000000000022 R14: 000000c000515860 R15: 000000000009f49f [2069598.299251] FS: 000000c000130490 GS: 0000000000000000 [2069641.933612] potentially unexpected fatal signal 5. [2069641.938740] CPU: 41 PID: 764771 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2069641.949241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2069641.958616] potentially unexpected fatal signal 5. [2069641.958793] RIP: 0033:0x7fffffffe062 [2069641.963887] CPU: 35 PID: 764626 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2069641.963889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2069641.963893] RIP: 0033:0x7fffffffe062 [2069641.963897] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2069641.967804] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2069641.967805] RSP: 002b:000000c0001bbcb0 EFLAGS: 00000297 [2069641.967807] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2069641.967808] RDX: 0000000000000000 RSI: 0000000000004000 RDI: 00007f623b5e5000 [2069641.967809] RBP: 000000c0001bbd40 R08: 0000000000000000 R09: 0000000000000000 [2069641.967810] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c0001bbbd8 [2069641.967810] R13: 000000c000180000 R14: 000000c000582820 R15: 00000000000b9e97 [2069641.967811] FS: 00007fb926ffd6c0 GS: 0000000000000000 [2069642.089438] RSP: 002b:000000c0001bbcb0 EFLAGS: 00000297 [2069642.095036] RAX: 00000000000bab68 RBX: 0000000000000000 RCX: 00007fffffffe05a [2069642.103901] RDX: 0000000000000000 RSI: 000000c0001bc000 RDI: 0000000000012f00 [2069642.112761] RBP: 000000c0001bbd40 R08: 000000c0007f0790 R09: 0000000000000000 [2069642.121602] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c0001bbbd8 [2069642.130461] R13: 000000c000180000 R14: 000000c000582820 R15: 00000000000b9e97 [2069642.139309] FS: 00007fb926ffd6c0 GS: 0000000000000000 [2069888.245006] exe[707796] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d7f7987f9 cs:33 sp:7fcebdf87ee8 ax:0 si:20000040 di:ffffffffff600000 [2069888.343180] exe[710875] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d7f7987f9 cs:33 sp:7fcebdf87ee8 ax:0 si:20000040 di:ffffffffff600000 [2069888.433340] exe[739549] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d7f7987f9 cs:33 sp:7fcebdf87ee8 ax:0 si:20000040 di:ffffffffff600000 [2070053.537902] potentially unexpected fatal signal 5. [2070053.543020] CPU: 62 PID: 770385 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2070053.553516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2070053.563033] RIP: 0033:0x7fffffffe062 [2070053.566934] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2070053.571549] potentially unexpected fatal signal 5. [2070053.586105] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2070053.586108] RAX: 00000000000bed41 RBX: 0000000000000000 RCX: 00007fffffffe05a [2070053.586110] RDX: 0000000000000000 RSI: 000000c000190000 RDI: 0000000000012f00 [2070053.586111] RBP: 000000c00018fe38 R08: 000000c007959e10 R09: 0000000000000000 [2070053.586112] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2070053.586113] R13: 0000000000000022 R14: 000000c000501860 R15: 00000000000a46de [2070053.586114] FS: 000000c00051e090 GS: 0000000000000000 [2070053.645222] CPU: 81 PID: 690664 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2070053.657095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2070053.668020] RIP: 0033:0x7fffffffe062 [2070053.673294] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2070053.689911] potentially unexpected fatal signal 5. [2070053.693823] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2070053.698920] CPU: 6 PID: 781619 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2070053.698921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2070053.698925] RIP: 0033:0x7fffffffe062 [2070053.698928] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2070053.698929] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2070053.698930] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2070053.698931] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2070053.698931] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2070053.698932] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2070053.698933] R13: 0000000000000022 R14: 000000c000501860 R15: 00000000000a46de [2070053.698933] FS: 000000c00051e090 GS: 0000000000000000 [2070053.801815] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2070053.810638] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2070053.818120] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2070053.825588] R10: 0000000000000000 R11: 0000000000000206 R12: 000000c00018fe20 [2070053.834409] R13: 0000000000000022 R14: 000000c000501860 R15: 00000000000a46de [2070053.843230] FS: 000000c00051e090 GS: 0000000000000000 [2070054.167288] potentially unexpected fatal signal 5. [2070054.172458] CPU: 32 PID: 698258 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2070054.184527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2070054.195446] RIP: 0033:0x7fffffffe062 [2070054.200707] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2070054.222278] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2070054.229239] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2070054.238090] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2070054.246959] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2070054.255820] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2070054.264651] R13: 0000000000000022 R14: 000000c000501860 R15: 00000000000a46de [2070054.273517] FS: 000000c00051e090 GS: 0000000000000000 [2070703.946906] exe[709764] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070704.111665] exe[773283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070704.132222] exe[773283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070704.153070] exe[773283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070704.172803] exe[773283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070704.193964] exe[773283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070704.214418] exe[773283] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070704.234996] exe[809552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070704.255911] exe[809552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070704.276138] exe[809552] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5609e0a4e7f9 cs:33 sp:7f28c45fe858 ax:0 si:5609e0aa7070 di:ffffffffff600000 [2070972.830259] potentially unexpected fatal signal 5. [2070972.835425] CPU: 82 PID: 826403 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2070972.846040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2070972.855570] RIP: 0033:0x7fffffffe062 [2070972.859485] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2070972.878665] RSP: 002b:000000c00018fd98 EFLAGS: 00000297 [2070972.884234] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2070972.891681] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2070972.899603] RBP: 000000c00018fe38 R08: 0000000000000000 R09: 0000000000000000 [2070972.907077] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c00018fe20 [2070972.914577] R13: 000000000000003c R14: 000000c0003fb860 R15: 00000000000b5786 [2070972.923444] FS: 0000000001ff7f10 GS: 0000000000000000 [2071028.342443] potentially unexpected fatal signal 5. [2071028.344738] potentially unexpected fatal signal 11. [2071028.347594] CPU: 62 PID: 833217 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2071028.347597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2071028.353000] CPU: 0 PID: 833099 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2071028.353002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2071028.353007] RIP: 0033:0x558b8b599b4f [2071028.353010] Code: 25 10 00 00 00 be 18 00 00 00 48 8d b8 e0 02 00 00 66 48 0f 6e c7 66 0f 6c c0 0f 11 80 d8 02 00 00 b8 11 01 00 00 0f 05 89 d0 48 c7 c2 b0 ff ff ff f7 d8 64 89 02 ba ff ff ff ff 89 d0 c3 66 [2071028.353011] RSP: 002b:00007f7ba8bfd438 EFLAGS: 00010206 [2071028.353013] RAX: 000000000000050f RBX: 0000000000000000 RCX: 0000558b8b599b13 [2071028.353014] RDX: 000000000000050f RSI: 0000000000000000 RDI: 0000000001200011 [2071028.353014] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [2071028.353015] R10: 0000558b8c1ec750 R11: 0000000000000246 R12: 0000000000000001 [2071028.353015] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000 [2071028.353016] FS: 0000558b8c1ec480 GS: 0000000000000000 [2071028.469804] RIP: 0033:0x7fffffffe062 [2071028.473751] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2071028.494354] RSP: 002b:000000c0005b9cb0 EFLAGS: 00000297 [2071028.501413] RAX: 00007f77b87b0000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2071028.510436] RDX: 0000000000000003 RSI: 0000000000002000 RDI: 00007f77b87b0000 [2071028.519308] RBP: 000000c0005b9d40 R08: 0000000000000009 R09: 00000000045f7000 [2071028.526902] R10: 0000000000000011 R11: 0000000000000206 R12: 000000c0005b9bd8 [2071028.535855] R13: 000000c000203400 R14: 000000c000519ba0 R15: 00000000000ca7db [2071028.544751] FS: 00007fa49ffff6c0 GS: 0000000000000000 [2071113.572988] potentially unexpected fatal signal 5. [2071113.578236] CPU: 36 PID: 834473 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2071113.588779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2071113.598411] RIP: 0033:0x7fffffffe062 [2071113.602457] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2071113.623762] RSP: 002b:000000c00058fd98 EFLAGS: 00000297 [2071113.630691] RAX: 00007fc23fe17000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2071113.639535] RDX: 0000000000000003 RSI: 0000000000020000 RDI: 00007fc23fe17000 [2071113.647035] RBP: 000000c00058fe38 R08: 0000000000000009 R09: 000000000c4b1000 [2071113.655874] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00058fe20 [2071113.664721] R13: 0000000000000036 R14: 000000c0004d7380 R15: 00000000000cabc4 [2071113.673588] FS: 000000c000580090 GS: 0000000000000000 [2071336.568983] potentially unexpected fatal signal 11. [2071336.574228] CPU: 2 PID: 844293 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2071336.584649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2071336.588314] potentially unexpected fatal signal 5. [2071336.594214] RIP: 0033:0x555f825a47cb [2071336.599402] CPU: 25 PID: 829269 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2071336.599403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2071336.599407] RIP: 0033:0x7fffffffe062 [2071336.599408] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2071336.599409] RSP: 002b:000000c00013dd98 EFLAGS: 00000297 [2071336.599411] RAX: 0000560c93a73000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2071336.599411] RDX: 0000000000000001 RSI: 0000000000021000 RDI: 0000560c93a73000 [2071336.599412] RBP: 000000c00013de38 R08: 0000000000000009 R09: 0000000007dd3000 [2071336.599413] R10: 0000000000000011 R11: 0000000000000202 R12: 000000c00013de20 [2071336.599413] R13: 0000000000000022 R14: 000000c00056e4e0 R15: 00000000000c7dab [2071336.599414] FS: 00000000022d2550 GS: 0000000000000000 [2071336.703228] Code: 2e 12 00 48 8d 34 19 48 39 d5 48 89 75 60 0f 95 c2 48 29 d8 48 83 c1 10 0f b6 d2 48 83 c8 01 48 c1 e2 02 48 09 da 48 83 ca 01 <48> 89 51 f8 48 89 46 08 eb 80 48 8d 0d 81 45 09 00 48 8d 15 85 57 [2071336.724255] RSP: 002b:00007fa4078ef120 EFLAGS: 00010206 [2071336.731193] RAX: 0000000000020711 RBX: 0000000000000120 RCX: 0000555f832197e0 [2071336.740118] RDX: 0000000000000121 RSI: 0000555f832198f0 RDI: 0000000000000004 [2071336.748966] RBP: 0000555f826c7660 R08: 00000000ffffffff R09: 0000000000000000 [2071336.757793] R10: 0000000000021000 R11: 0000000000000010 R12: 0000000000000110 [2071336.766630] R13: 0000000000000012 R14: 0000555f826c76c0 R15: 0000000000000120 [2071336.775463] FS: 0000555f83218480 GS: 0000000000000000 [2072071.737263] potentially unexpected fatal signal 5. [2072071.742378] CPU: 8 PID: 889463 Comm: exe Not tainted 5.10.0-0.deb10.23-cloud-amd64 #1 Debian 5.10.179-1~deb10u1 [2072071.752861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [2072071.762415] RIP: 0033:0x7fffffffe062 [2072071.766347] Code: 0f 05 48 83 f8 00 7c 2c 48 c7 c3 00 00 00 00 48 89 c7 48 c7 c0 3e 00 00 00 48 c7 c6 13 00 00 00 0f 05 48 83 fb 01 74 04 cd 03 fc 48 83 f8 00 74 96 eb f4 48 89 c7 48 f7 df 48 c7 c0 3c 00 00 [2072071.786805] RSP: 002b:000000c000787cb0 EFLAGS: 00000297 [2072071.793763] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fffffffe05a [2072071.802651] RDX: 0000000000000000 RSI: 00007fffffffe000 RDI: 0000000000000000 [2072071.811479] RBP: 000000c000787d40 R08: 0000000000000000 R09: 0000000000000000 [2072071.819053] R10: 0000000000000000 R11: 0000000000000202 R12: 000000c000787bf8 [2072071.827908] R13: 0000000002a7dd40 R14: 000000c000530340 R15: 00000000000cdff7 [2072071.836734] FS: 0000000004d463c0 GS: 0000000000000000