) D0713 08:48:00.837120 374228 usertrap_amd64.go:212] [ 628: 629] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:00.837202 374228 usertrap_amd64.go:122] [ 628: 629] Allocate a new trap: 0xc000badb90 12 D0713 08:48:00.837282 374228 usertrap_amd64.go:225] [ 628: 629] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:00.837479 374228 task_signals.go:470] [ 628: 628] Notified of signal 23 D0713 08:48:00.837574 374228 task_signals.go:220] [ 628: 628] Signal 23: delivering to handler D0713 08:48:00.846020 374228 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46af29:sysno 293 D0713 08:48:00.846083 374228 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc000badb90 13 D0713 08:48:00.846142 374228 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:00.848001 374228 task_signals.go:470] [ 628: 628] Notified of signal 23 D0713 08:48:00.848220 374228 task_signals.go:179] [ 628: 628] Restarting syscall 202: interrupted by signal 23 D0713 08:48:00.848285 374228 task_signals.go:220] [ 628: 628] Signal 23: delivering to handler D0713 08:48:00.859178 374228 task_signals.go:470] [ 628: 628] Notified of signal 23 D0713 08:48:00.859738 374228 task_signals.go:220] [ 628: 628] Signal 23: delivering to handler I0713 08:48:00.860574 374228 compat.go:120] Unsupported syscall ioprio_set(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/ioprio_set for more information. D0713 08:48:00.860793 374228 usertrap_amd64.go:212] [ 628: 628] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:00.860834 374228 usertrap_amd64.go:122] [ 628: 628] Allocate a new trap: 0xc000badb90 14 D0713 08:48:00.860896 374228 usertrap_amd64.go:225] [ 628: 628] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:00.861085 374228 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.861220 374228 task_signals.go:204] [ 628: 629] Signal 628, PID: 629, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.861267 374228 task_signals.go:204] [ 628: 630] Signal 628, PID: 630, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.861267 374228 task_signals.go:204] [ 628: 631] Signal 628, PID: 631, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.861351 374228 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.861348 374228 task_signals.go:204] [ 628: 632] Signal 628, PID: 632, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.861452 374228 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.861540 374228 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.861632 374228 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.861903 374228 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.861955 374228 task_exit.go:204] [ 628: 630] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.862114 374228 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.862167 374228 task_exit.go:204] [ 628: 629] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.862261 374228 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.862422 374228 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.862480 374228 task_exit.go:204] [ 628: 631] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.867846 374228 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.867917 374228 task_exit.go:204] [ 628: 632] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.867996 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:00.868293 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:00.868362 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:00.868315 374228 task_exit.go:204] [ 628: 628] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.871337 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:00.875619 374228 syscalls.go:262] [ 633: 633] Allocating stack with size of 8388608 bytes D0713 08:48:00.876147 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:00.877856 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:00.877959 374228 usertrap_amd64.go:106] [ 633: 633] Map a usertrap vma at 64000 D0713 08:48:00.878208 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 1 D0713 08:48:00.878326 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:00.879130 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:00.879194 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 2 D0713 08:48:00.879287 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:00.880376 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:00.880425 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 3 D0713 08:48:00.880504 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:00.889101 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:00.889159 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 4 D0713 08:48:00.889220 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:00.890510 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:00.890550 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 5 D0713 08:48:00.890612 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:00.890739 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b214:sysno 13 D0713 08:48:00.890781 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 6 D0713 08:48:00.890820 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:00.894762 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:00.894813 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 7 D0713 08:48:00.894897 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:00.895533 374228 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:00.895579 374228 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc000badec0 8 D0713 08:48:00.895646 374228 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:00.896173 374228 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46af76:sysno 35 D0713 08:48:00.896228 374228 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc000badec0 9 D0713 08:48:00.896305 374228 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:00.896983 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:00.897040 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 10 D0713 08:48:00.897152 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:00.898263 374228 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b020:sysno 39 D0713 08:48:00.898308 374228 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc000badec0 11 D0713 08:48:00.898360 374228 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:00.898745 374228 usertrap_amd64.go:212] [ 633: 634] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:00.898819 374228 usertrap_amd64.go:122] [ 633: 634] Allocate a new trap: 0xc000badec0 12 D0713 08:48:00.898875 374228 usertrap_amd64.go:225] [ 633: 634] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:00.899034 374228 task_signals.go:470] [ 633: 633] Notified of signal 23 D0713 08:48:00.899205 374228 task_signals.go:220] [ 633: 633] Signal 23: delivering to handler D0713 08:48:00.908033 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46af29:sysno 293 D0713 08:48:00.908102 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 13 D0713 08:48:00.908164 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:00.910400 374228 task_signals.go:470] [ 633: 633] Notified of signal 23 D0713 08:48:00.910555 374228 task_signals.go:220] [ 633: 633] Signal 23: delivering to handler D0713 08:48:00.920827 374228 task_signals.go:470] [ 633: 633] Notified of signal 23 D0713 08:48:00.921385 374228 task_signals.go:220] [ 633: 633] Signal 23: delivering to handler I0713 08:48:00.922382 374228 compat.go:120] Unsupported syscall kcmp(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kcmp for more information. D0713 08:48:00.922534 374228 usertrap_amd64.go:212] [ 633: 633] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:00.922593 374228 usertrap_amd64.go:122] [ 633: 633] Allocate a new trap: 0xc000badec0 14 D0713 08:48:00.922659 374228 usertrap_amd64.go:225] [ 633: 633] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:00.922815 374228 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.922914 374228 task_signals.go:204] [ 633: 635] Signal 633, PID: 635, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.922945 374228 task_signals.go:204] [ 633: 637] Signal 633, PID: 637, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.923115 374228 task_signals.go:204] [ 633: 634] Signal 633, PID: 634, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.923101 374228 task_signals.go:204] [ 633: 636] Signal 633, PID: 636, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.923169 374228 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.923241 374228 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.923361 374228 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.923563 374228 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.923697 374228 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.923725 374228 task_exit.go:204] [ 633: 637] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.923828 374228 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.924002 374228 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.924050 374228 task_exit.go:204] [ 633: 636] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.924129 374228 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.924176 374228 task_exit.go:204] [ 633: 635] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.929107 374228 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.929182 374228 task_exit.go:204] [ 633: 634] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.929261 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:00.929423 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:00.929491 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:00.929525 374228 task_exit.go:204] [ 633: 633] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.929989 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:00.930104 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:00.932039 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:00.936079 374228 syscalls.go:262] [ 638: 638] Allocating stack with size of 8388608 bytes D0713 08:48:00.936640 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:00.938422 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:00.938523 374228 usertrap_amd64.go:106] [ 638: 638] Map a usertrap vma at 63000 D0713 08:48:00.938784 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 1 D0713 08:48:00.938936 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:00.939583 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:00.939624 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 2 D0713 08:48:00.939666 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:00.940673 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:00.940724 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 3 D0713 08:48:00.940779 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:00.949058 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:00.949135 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 4 D0713 08:48:00.949205 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:00.950507 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:00.950552 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 5 D0713 08:48:00.950609 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:00.950872 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b214:sysno 13 D0713 08:48:00.950912 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 6 D0713 08:48:00.950961 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:00.955481 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:00.955533 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 7 D0713 08:48:00.955577 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:00.956133 374228 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:00.956191 374228 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc0000488a0 8 D0713 08:48:00.956272 374228 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:00.956884 374228 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46af76:sysno 35 D0713 08:48:00.956978 374228 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc0000488a0 9 D0713 08:48:00.957052 374228 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:00.957235 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:00.957281 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 10 D0713 08:48:00.957358 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:00.968820 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46af29:sysno 293 D0713 08:48:00.968868 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 11 D0713 08:48:00.968912 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:00.972230 374228 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b020:sysno 39 D0713 08:48:00.972300 374228 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc0000488a0 12 D0713 08:48:00.972352 374228 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:00.972537 374228 usertrap_amd64.go:212] [ 638: 639] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:00.972589 374228 usertrap_amd64.go:122] [ 638: 639] Allocate a new trap: 0xc0000488a0 13 D0713 08:48:00.972646 374228 usertrap_amd64.go:225] [ 638: 639] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:00.972857 374228 task_signals.go:470] [ 638: 638] Notified of signal 23 D0713 08:48:00.973039 374228 task_signals.go:220] [ 638: 638] Signal 23: delivering to handler I0713 08:48:00.981686 374228 compat.go:120] Unsupported syscall kexec_load(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/kexec_load for more information. D0713 08:48:00.981878 374228 usertrap_amd64.go:212] [ 638: 638] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:00.981940 374228 usertrap_amd64.go:122] [ 638: 638] Allocate a new trap: 0xc0000488a0 14 D0713 08:48:00.982028 374228 usertrap_amd64.go:225] [ 638: 638] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:00.982224 374228 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.982356 374228 task_signals.go:204] [ 638: 641] Signal 638, PID: 641, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.982354 374228 task_signals.go:204] [ 638: 640] Signal 638, PID: 640, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.982429 374228 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.982539 374228 task_signals.go:204] [ 638: 642] Signal 638, PID: 642, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.982574 374228 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.982677 374228 task_signals.go:204] [ 638: 639] Signal 638, PID: 639, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:00.982732 374228 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.982885 374228 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.982968 374228 task_exit.go:204] [ 638: 642] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.983092 374228 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.983235 374228 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:00.983371 374228 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.983421 374228 task_exit.go:204] [ 638: 641] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.983540 374228 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.983601 374228 task_exit.go:204] [ 638: 639] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.988045 374228 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:00.988102 374228 task_exit.go:204] [ 638: 640] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.988171 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:00.988352 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:00.988415 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:00.988570 374228 task_exit.go:204] [ 638: 638] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:00.990862 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:00.995376 374228 syscalls.go:262] [ 643: 643] Allocating stack with size of 8388608 bytes D0713 08:48:00.995943 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:00.997809 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:00.997891 374228 usertrap_amd64.go:106] [ 643: 643] Map a usertrap vma at 64000 D0713 08:48:00.998112 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 1 D0713 08:48:00.998211 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:00.998968 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:00.999038 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 2 D0713 08:48:00.999098 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:01.000277 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.000329 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 3 D0713 08:48:01.000377 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:01.008477 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.008636 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 4 D0713 08:48:01.008755 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:01.010302 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.010386 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 5 D0713 08:48:01.010474 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:01.010626 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.010672 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 6 D0713 08:48:01.010751 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:01.013971 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.014034 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 7 D0713 08:48:01.014099 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:01.014906 374228 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.014998 374228 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc00047ab10 8 D0713 08:48:01.015078 374228 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:01.015667 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.015734 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 9 D0713 08:48:01.015824 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:01.016152 374228 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.016214 374228 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc00047ab10 10 D0713 08:48:01.016302 374228 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:01.028702 374228 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.028770 374228 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc00047ab10 11 D0713 08:48:01.028827 374228 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:01.029007 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.029059 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 12 D0713 08:48:01.029110 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:01.029220 374228 usertrap_amd64.go:212] [ 643: 644] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.029296 374228 usertrap_amd64.go:122] [ 643: 644] Allocate a new trap: 0xc00047ab10 13 D0713 08:48:01.029363 374228 usertrap_amd64.go:225] [ 643: 644] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:01.029626 374228 task_signals.go:470] [ 643: 643] Notified of signal 23 D0713 08:48:01.029712 374228 task_signals.go:220] [ 643: 643] Signal 23: delivering to handler D0713 08:48:01.041287 374228 task_signals.go:470] [ 643: 643] Notified of signal 23 D0713 08:48:01.041543 374228 task_signals.go:220] [ 643: 643] Signal 23: delivering to handler D0713 08:48:01.042540 374228 usertrap_amd64.go:212] [ 643: 643] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.042617 374228 usertrap_amd64.go:122] [ 643: 643] Allocate a new trap: 0xc00047ab10 14 D0713 08:48:01.042682 374228 usertrap_amd64.go:225] [ 643: 643] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:01.042890 374228 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.043026 374228 task_signals.go:204] [ 643: 648] Signal 643, PID: 648, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.043072 374228 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.043204 374228 task_signals.go:204] [ 643: 647] Signal 643, PID: 647, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.043175 374228 task_signals.go:204] [ 643: 645] Signal 643, PID: 645, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.043307 374228 task_signals.go:204] [ 643: 646] Signal 643, PID: 646, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.043402 374228 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.043535 374228 task_signals.go:204] [ 643: 644] Signal 643, PID: 644, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.043579 374228 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.043618 374228 task_exit.go:204] [ 643: 647] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.043762 374228 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.043930 374228 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.043975 374228 task_exit.go:204] [ 643: 645] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.044088 374228 task_exit.go:204] [ 643: 648] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.044292 374228 task_exit.go:204] [ 643: 648] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.044343 374228 task_exit.go:204] [ 643: 648] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.044507 374228 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.044707 374228 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.044852 374228 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.044894 374228 task_exit.go:204] [ 643: 644] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.050528 374228 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.050589 374228 task_exit.go:204] [ 643: 646] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.050682 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.050785 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.050856 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.050990 374228 task_exit.go:204] [ 643: 643] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.053299 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.057836 374228 syscalls.go:262] [ 649: 649] Allocating stack with size of 8388608 bytes D0713 08:48:01.060856 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.061207 374228 task_signals.go:481] [ 7: 13] No task notified of signal 23 D0713 08:48:01.061453 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:01.063204 374228 task_signals.go:481] [ 7: 13] No task notified of signal 23 D0713 08:48:01.063388 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:01.063864 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:01.063960 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:01.064730 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.064862 374228 usertrap_amd64.go:106] [ 649: 649] Map a usertrap vma at 66000 D0713 08:48:01.065257 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 1 D0713 08:48:01.065391 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:01.066233 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.066300 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 2 D0713 08:48:01.066388 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:01.067636 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.067685 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 3 D0713 08:48:01.067745 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:01.075943 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.076014 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 4 D0713 08:48:01.076077 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:01.077599 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.077702 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 5 D0713 08:48:01.077782 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:01.078076 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.078239 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 6 D0713 08:48:01.078347 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:01.083983 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.084111 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 7 D0713 08:48:01.084167 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:01.084920 374228 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.085062 374228 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0010f4060 8 D0713 08:48:01.085161 374228 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:01.085885 374228 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.085939 374228 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0010f4060 9 D0713 08:48:01.086108 374228 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:01.086357 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.086443 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 10 D0713 08:48:01.086525 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:01.098297 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.098357 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 11 D0713 08:48:01.098423 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:01.102122 374228 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.102223 374228 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0010f4060 12 D0713 08:48:01.102330 374228 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:01.102481 374228 usertrap_amd64.go:212] [ 649: 650] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.102523 374228 usertrap_amd64.go:122] [ 649: 650] Allocate a new trap: 0xc0010f4060 13 D0713 08:48:01.102605 374228 usertrap_amd64.go:225] [ 649: 650] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:01.102788 374228 task_signals.go:470] [ 649: 649] Notified of signal 23 D0713 08:48:01.102963 374228 task_signals.go:220] [ 649: 649] Signal 23: delivering to handler I0713 08:48:01.111234 374228 compat.go:120] Unsupported syscall sys_445(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_445 for more information. D0713 08:48:01.111455 374228 usertrap_amd64.go:212] [ 649: 649] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.111508 374228 usertrap_amd64.go:122] [ 649: 649] Allocate a new trap: 0xc0010f4060 14 D0713 08:48:01.111563 374228 usertrap_amd64.go:225] [ 649: 649] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:01.111754 374228 task_exit.go:204] [ 649: 649] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.111929 374228 task_signals.go:204] [ 649: 654] Signal 649, PID: 654, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.111927 374228 task_signals.go:204] [ 649: 651] Signal 649, PID: 651, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.111994 374228 task_signals.go:204] [ 649: 650] Signal 649, PID: 650, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.112140 374228 task_exit.go:204] [ 649: 650] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.112318 374228 task_signals.go:204] [ 649: 652] Signal 649, PID: 652, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.112382 374228 task_signals.go:204] [ 649: 653] Signal 649, PID: 653, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.112432 374228 task_exit.go:204] [ 649: 652] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.112659 374228 task_exit.go:204] [ 649: 652] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.112718 374228 task_exit.go:204] [ 649: 652] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.112846 374228 task_exit.go:204] [ 649: 653] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.113033 374228 task_exit.go:204] [ 649: 653] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.113087 374228 task_exit.go:204] [ 649: 653] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.113150 374228 task_exit.go:204] [ 649: 654] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.113315 374228 task_exit.go:204] [ 649: 654] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.113385 374228 task_exit.go:204] [ 649: 654] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.113475 374228 task_exit.go:204] [ 649: 649] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.113571 374228 task_exit.go:204] [ 649: 651] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.113766 374228 task_exit.go:204] [ 649: 650] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.113815 374228 task_exit.go:204] [ 649: 650] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.118578 374228 task_exit.go:204] [ 649: 651] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.118652 374228 task_exit.go:204] [ 649: 651] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.118751 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.118956 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.119004 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.119035 374228 task_exit.go:204] [ 649: 649] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.121211 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.125897 374228 syscalls.go:262] [ 655: 655] Allocating stack with size of 8388608 bytes D0713 08:48:01.126782 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.129639 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.129777 374228 usertrap_amd64.go:106] [ 655: 655] Map a usertrap vma at 62000 D0713 08:48:01.130060 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 1 D0713 08:48:01.130146 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:48:01.131000 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.131070 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 2 D0713 08:48:01.131201 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:48:01.132597 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.132679 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 3 D0713 08:48:01.132741 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:48:01.147693 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.147759 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 4 D0713 08:48:01.147836 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:48:01.149272 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.149355 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 5 D0713 08:48:01.149421 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:48:01.149569 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.149631 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 6 D0713 08:48:01.149694 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:48:01.154083 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.154130 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 7 D0713 08:48:01.154201 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:48:01.154977 374228 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.155041 374228 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc00047aae0 8 D0713 08:48:01.155099 374228 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:48:01.155536 374228 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.155635 374228 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc00047aae0 9 D0713 08:48:01.155707 374228 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:48:01.155994 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.156050 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 10 D0713 08:48:01.156281 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:48:01.166637 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.166715 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 11 D0713 08:48:01.166785 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:48:01.168142 374228 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.168245 374228 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc00047aae0 12 D0713 08:48:01.168312 374228 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:48:01.168505 374228 usertrap_amd64.go:212] [ 655: 656] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.168553 374228 usertrap_amd64.go:122] [ 655: 656] Allocate a new trap: 0xc00047aae0 13 D0713 08:48:01.168611 374228 usertrap_amd64.go:225] [ 655: 656] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:48:01.168758 374228 task_signals.go:470] [ 655: 655] Notified of signal 23 D0713 08:48:01.168997 374228 task_signals.go:220] [ 655: 655] Signal 23: delivering to handler I0713 08:48:01.178933 374228 compat.go:120] Unsupported syscall sys_444(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_444 for more information. D0713 08:48:01.179078 374228 usertrap_amd64.go:212] [ 655: 655] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.179109 374228 usertrap_amd64.go:122] [ 655: 655] Allocate a new trap: 0xc00047aae0 14 D0713 08:48:01.179177 374228 usertrap_amd64.go:225] [ 655: 655] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:48:01.179363 374228 task_exit.go:204] [ 655: 655] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.179497 374228 task_signals.go:204] [ 655: 659] Signal 655, PID: 659, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.179507 374228 task_signals.go:204] [ 655: 658] Signal 655, PID: 658, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.179585 374228 task_signals.go:204] [ 655: 657] Signal 655, PID: 657, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.179608 374228 task_exit.go:204] [ 655: 659] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.179735 374228 task_signals.go:204] [ 655: 656] Signal 655, PID: 656, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.179835 374228 task_exit.go:204] [ 655: 656] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.179970 374228 task_exit.go:204] [ 655: 656] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.180024 374228 task_exit.go:204] [ 655: 656] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.180126 374228 task_exit.go:204] [ 655: 658] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.180321 374228 task_exit.go:204] [ 655: 655] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.180436 374228 task_exit.go:204] [ 655: 657] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.180524 374228 task_exit.go:204] [ 655: 659] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.180596 374228 task_exit.go:204] [ 655: 659] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.180758 374228 task_exit.go:204] [ 655: 658] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.180821 374228 task_exit.go:204] [ 655: 658] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.185919 374228 task_exit.go:204] [ 655: 657] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.185999 374228 task_exit.go:204] [ 655: 657] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.186080 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.186240 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.186336 374228 task_exit.go:204] [ 655: 655] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.186322 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.188489 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.194050 374228 syscalls.go:262] [ 660: 660] Allocating stack with size of 8388608 bytes D0713 08:48:01.194905 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.196676 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.196797 374228 usertrap_amd64.go:106] [ 660: 660] Map a usertrap vma at 67000 D0713 08:48:01.197136 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 1 D0713 08:48:01.197273 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:01.198039 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.198084 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 2 D0713 08:48:01.198181 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:01.199223 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.199274 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 3 D0713 08:48:01.199346 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:01.208262 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.208358 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 4 D0713 08:48:01.208472 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:01.209955 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.210013 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 5 D0713 08:48:01.210076 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:01.210294 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.210331 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 6 D0713 08:48:01.210411 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:01.216279 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.216343 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 7 D0713 08:48:01.216407 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:01.217091 374228 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.217142 374228 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc000a44540 8 D0713 08:48:01.217227 374228 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:01.218182 374228 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.218244 374228 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc000a44540 9 D0713 08:48:01.218293 374228 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:01.218445 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.218509 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 10 D0713 08:48:01.218567 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:01.219607 374228 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.219668 374228 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc000a44540 11 D0713 08:48:01.219738 374228 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:01.220030 374228 usertrap_amd64.go:212] [ 660: 661] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.220085 374228 usertrap_amd64.go:122] [ 660: 661] Allocate a new trap: 0xc000a44540 12 D0713 08:48:01.220150 374228 usertrap_amd64.go:225] [ 660: 661] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:01.220382 374228 task_signals.go:470] [ 660: 660] Notified of signal 23 D0713 08:48:01.220564 374228 task_signals.go:220] [ 660: 660] Signal 23: delivering to handler D0713 08:48:01.228301 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.228377 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 13 D0713 08:48:01.228431 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:01.232464 374228 task_signals.go:470] [ 660: 660] Notified of signal 23 D0713 08:48:01.232627 374228 task_signals.go:179] [ 660: 660] Restarting syscall 202: interrupted by signal 23 D0713 08:48:01.232688 374228 task_signals.go:220] [ 660: 660] Signal 23: delivering to handler I0713 08:48:01.240834 374228 compat.go:120] Unsupported syscall sys_446(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_446 for more information. D0713 08:48:01.241004 374228 usertrap_amd64.go:212] [ 660: 660] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.241048 374228 usertrap_amd64.go:122] [ 660: 660] Allocate a new trap: 0xc000a44540 14 D0713 08:48:01.241120 374228 usertrap_amd64.go:225] [ 660: 660] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:01.241303 374228 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.241427 374228 task_signals.go:204] [ 660: 661] Signal 660, PID: 661, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.241459 374228 task_signals.go:204] [ 660: 662] Signal 660, PID: 662, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.241419 374228 task_signals.go:204] [ 660: 663] Signal 660, PID: 663, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.241464 374228 task_signals.go:204] [ 660: 664] Signal 660, PID: 664, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.241578 374228 task_exit.go:204] [ 660: 664] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.241744 374228 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.241859 374228 task_exit.go:204] [ 660: 662] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.242063 374228 task_exit.go:204] [ 660: 663] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.242213 374228 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.242337 374228 task_exit.go:204] [ 660: 664] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.242385 374228 task_exit.go:204] [ 660: 664] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.242556 374228 task_exit.go:204] [ 660: 662] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.242602 374228 task_exit.go:204] [ 660: 662] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.242716 374228 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.242765 374228 task_exit.go:204] [ 660: 661] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.247678 374228 task_exit.go:204] [ 660: 663] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.247756 374228 task_exit.go:204] [ 660: 663] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.247848 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.248025 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.248104 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.248123 374228 task_exit.go:204] [ 660: 660] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.250522 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.257642 374228 syscalls.go:262] [ 665: 665] Allocating stack with size of 8388608 bytes D0713 08:48:01.258006 374228 task_signals.go:481] [ 7: 13] No task notified of signal 23 D0713 08:48:01.258502 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.258843 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:01.259303 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:01.259379 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:01.266225 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.266323 374228 usertrap_amd64.go:106] [ 665: 665] Map a usertrap vma at 64000 D0713 08:48:01.266572 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 1 D0713 08:48:01.266670 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:01.267279 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.267328 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 2 D0713 08:48:01.267386 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:01.268513 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.268565 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 3 D0713 08:48:01.268606 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:01.276324 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.276423 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 4 D0713 08:48:01.276489 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:01.277930 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.277988 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 5 D0713 08:48:01.278036 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:01.278167 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.278215 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 6 D0713 08:48:01.278265 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:01.281899 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.281961 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 7 D0713 08:48:01.282013 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:01.282573 374228 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.282643 374228 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0005cc450 8 D0713 08:48:01.282692 374228 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:01.283523 374228 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.283611 374228 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0005cc450 9 D0713 08:48:01.283796 374228 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:01.284004 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.284113 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 10 D0713 08:48:01.284188 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:01.294586 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.294690 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 11 D0713 08:48:01.294776 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:01.300090 374228 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.300161 374228 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0005cc450 12 D0713 08:48:01.300254 374228 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:01.300417 374228 usertrap_amd64.go:212] [ 665: 666] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.300463 374228 usertrap_amd64.go:122] [ 665: 666] Allocate a new trap: 0xc0005cc450 13 D0713 08:48:01.300552 374228 usertrap_amd64.go:225] [ 665: 666] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:01.300733 374228 task_signals.go:470] [ 665: 665] Notified of signal 23 D0713 08:48:01.300912 374228 task_signals.go:220] [ 665: 665] Signal 23: delivering to handler D0713 08:48:01.310060 374228 usertrap_amd64.go:212] [ 665: 665] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.310123 374228 usertrap_amd64.go:122] [ 665: 665] Allocate a new trap: 0xc0005cc450 14 D0713 08:48:01.310207 374228 usertrap_amd64.go:225] [ 665: 665] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:01.310370 374228 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.310533 374228 task_signals.go:204] [ 665: 670] Signal 665, PID: 670, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.310517 374228 task_signals.go:204] [ 665: 666] Signal 665, PID: 666, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.310649 374228 task_signals.go:204] [ 665: 668] Signal 665, PID: 668, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.310675 374228 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.310680 374228 task_signals.go:204] [ 665: 667] Signal 665, PID: 667, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.310762 374228 task_signals.go:204] [ 665: 669] Signal 665, PID: 669, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.310833 374228 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.310974 374228 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.311017 374228 task_exit.go:204] [ 665: 668] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.311138 374228 task_exit.go:204] [ 665: 670] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.311251 374228 task_exit.go:204] [ 665: 670] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.311282 374228 task_exit.go:204] [ 665: 670] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.311357 374228 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.311462 374228 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.311598 374228 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.311655 374228 task_exit.go:204] [ 665: 667] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.311733 374228 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.312011 374228 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.312080 374228 task_exit.go:204] [ 665: 666] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.316764 374228 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.316856 374228 task_exit.go:204] [ 665: 669] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.316985 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.317128 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.317221 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.317347 374228 task_exit.go:204] [ 665: 665] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.319687 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.325615 374228 syscalls.go:262] [ 671: 671] Allocating stack with size of 8388608 bytes D0713 08:48:01.326293 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.328248 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.328360 374228 usertrap_amd64.go:106] [ 671: 671] Map a usertrap vma at 67000 D0713 08:48:01.328617 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 1 D0713 08:48:01.328757 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:01.329451 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.329505 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 2 D0713 08:48:01.329564 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:01.330610 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.330668 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 3 D0713 08:48:01.330735 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:01.339031 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.339081 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 4 D0713 08:48:01.339129 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:01.340577 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.340630 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 5 D0713 08:48:01.340686 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:01.340838 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.340880 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 6 D0713 08:48:01.340961 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:01.344922 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.345028 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 7 D0713 08:48:01.345076 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:01.345691 374228 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.345760 374228 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc0016963f0 8 D0713 08:48:01.345836 374228 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:01.346432 374228 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.346510 374228 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc0016963f0 9 D0713 08:48:01.346644 374228 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:01.346832 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.346918 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 10 D0713 08:48:01.347051 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:01.358706 374228 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.358766 374228 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc0016963f0 11 D0713 08:48:01.358820 374228 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:01.358950 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.359005 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 12 D0713 08:48:01.359093 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46af29 trap addr 673c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:01.359233 374228 usertrap_amd64.go:212] [ 671: 672] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.359317 374228 usertrap_amd64.go:122] [ 671: 672] Allocate a new trap: 0xc0016963f0 13 D0713 08:48:01.359385 374228 usertrap_amd64.go:225] [ 671: 672] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:01.359582 374228 task_signals.go:470] [ 671: 671] Notified of signal 23 D0713 08:48:01.359683 374228 task_signals.go:220] [ 671: 671] Signal 23: delivering to handler D0713 08:48:01.372124 374228 task_signals.go:470] [ 671: 671] Notified of signal 23 D0713 08:48:01.372565 374228 task_signals.go:220] [ 671: 671] Signal 23: delivering to handler D0713 08:48:01.373722 374228 usertrap_amd64.go:212] [ 671: 671] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.373779 374228 usertrap_amd64.go:122] [ 671: 671] Allocate a new trap: 0xc0016963f0 14 D0713 08:48:01.373843 374228 usertrap_amd64.go:225] [ 671: 671] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:01.374091 374228 task_exit.go:204] [ 671: 671] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.374222 374228 task_signals.go:204] [ 671: 675] Signal 671, PID: 675, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.374293 374228 task_signals.go:204] [ 671: 674] Signal 671, PID: 674, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.374322 374228 task_signals.go:204] [ 671: 673] Signal 671, PID: 673, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.374346 374228 task_exit.go:204] [ 671: 671] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.374352 374228 task_signals.go:204] [ 671: 676] Signal 671, PID: 676, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.374333 374228 task_signals.go:204] [ 671: 672] Signal 671, PID: 672, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.374556 374228 task_exit.go:204] [ 671: 676] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.374679 374228 task_exit.go:204] [ 671: 672] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.374953 374228 task_exit.go:204] [ 671: 672] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.375036 374228 task_exit.go:204] [ 671: 672] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.375188 374228 task_exit.go:204] [ 671: 675] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.375315 374228 task_exit.go:204] [ 671: 674] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.375568 374228 task_exit.go:204] [ 671: 673] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.375706 374228 task_exit.go:204] [ 671: 675] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.375771 374228 task_exit.go:204] [ 671: 675] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.375914 374228 task_exit.go:204] [ 671: 676] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.375965 374228 task_exit.go:204] [ 671: 676] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.376079 374228 task_exit.go:204] [ 671: 674] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.376159 374228 task_exit.go:204] [ 671: 674] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.380790 374228 task_exit.go:204] [ 671: 673] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.380874 374228 task_exit.go:204] [ 671: 673] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.380997 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.381153 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.381213 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.381458 374228 task_exit.go:204] [ 671: 671] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.383997 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.389546 374228 syscalls.go:262] [ 677: 677] Allocating stack with size of 8388608 bytes D0713 08:48:01.390316 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.392316 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.392447 374228 usertrap_amd64.go:106] [ 677: 677] Map a usertrap vma at 64000 D0713 08:48:01.392675 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 1 D0713 08:48:01.392785 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:01.393639 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.393700 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 2 D0713 08:48:01.393767 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:01.394774 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.394833 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 3 D0713 08:48:01.394915 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:01.403819 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.403875 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 4 D0713 08:48:01.403937 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:01.405967 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.406039 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 5 D0713 08:48:01.406115 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:01.406302 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.406342 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 6 D0713 08:48:01.406424 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:01.410528 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.410583 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 7 D0713 08:48:01.410676 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:01.411425 374228 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.411485 374228 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc0005cd530 8 D0713 08:48:01.411548 374228 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:01.412312 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.412381 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 9 D0713 08:48:01.412450 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:01.412718 374228 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.412788 374228 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc0005cd530 10 D0713 08:48:01.412867 374228 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:01.423377 374228 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.423445 374228 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc0005cd530 11 D0713 08:48:01.423512 374228 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:01.423609 374228 usertrap_amd64.go:212] [ 677: 678] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.423634 374228 usertrap_amd64.go:122] [ 677: 678] Allocate a new trap: 0xc0005cd530 12 D0713 08:48:01.423672 374228 usertrap_amd64.go:225] [ 677: 678] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:01.423786 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.423840 374228 task_signals.go:470] [ 677: 677] Notified of signal 23 D0713 08:48:01.423852 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 13 D0713 08:48:01.423921 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:01.424067 374228 task_signals.go:220] [ 677: 677] Signal 23: delivering to handler D0713 08:48:01.436918 374228 task_signals.go:470] [ 677: 677] Notified of signal 23 D0713 08:48:01.438497 374228 task_signals.go:220] [ 677: 677] Signal 23: delivering to handler D0713 08:48:01.439384 374228 usertrap_amd64.go:212] [ 677: 677] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.439453 374228 usertrap_amd64.go:122] [ 677: 677] Allocate a new trap: 0xc0005cd530 14 D0713 08:48:01.439515 374228 usertrap_amd64.go:225] [ 677: 677] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:01.439734 374228 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.439843 374228 task_signals.go:204] [ 677: 678] Signal 677, PID: 678, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.439868 374228 task_signals.go:204] [ 677: 680] Signal 677, PID: 680, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.439887 374228 task_signals.go:204] [ 677: 681] Signal 677, PID: 681, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.439956 374228 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.440045 374228 task_signals.go:204] [ 677: 679] Signal 677, PID: 679, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.440117 374228 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.440232 374228 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.440348 374228 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.440389 374228 task_exit.go:204] [ 677: 681] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.440506 374228 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.440662 374228 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.440784 374228 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.440832 374228 task_exit.go:204] [ 677: 678] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.440998 374228 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.441040 374228 task_exit.go:204] [ 677: 680] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.445805 374228 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.445856 374228 task_exit.go:204] [ 677: 679] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.445927 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.446074 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.446152 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.446187 374228 task_exit.go:204] [ 677: 677] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.448462 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.453582 374228 syscalls.go:262] [ 682: 682] Allocating stack with size of 8388608 bytes D0713 08:48:01.454133 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.455871 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.455962 374228 usertrap_amd64.go:106] [ 682: 682] Map a usertrap vma at 68000 D0713 08:48:01.456141 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 1 D0713 08:48:01.456230 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:48:01.457211 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.457259 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 2 D0713 08:48:01.457343 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:48:01.458567 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.458631 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 3 D0713 08:48:01.458688 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:48:01.466984 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.467036 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 4 D0713 08:48:01.467116 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:48:01.468685 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.468744 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 5 D0713 08:48:01.468800 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:48:01.468984 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.469039 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 6 D0713 08:48:01.469084 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:48:01.473925 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.473970 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 7 D0713 08:48:01.474035 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:48:01.474685 374228 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.474755 374228 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc000048ba0 8 D0713 08:48:01.474842 374228 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:48:01.475672 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.475745 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 9 D0713 08:48:01.475842 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:48:01.476261 374228 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.476324 374228 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc000048ba0 10 D0713 08:48:01.476371 374228 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:48:01.488404 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.488461 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 11 D0713 08:48:01.488537 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:48:01.498226 374228 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.498277 374228 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc000048ba0 12 D0713 08:48:01.498343 374228 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:48:01.498556 374228 usertrap_amd64.go:212] [ 682: 683] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.498620 374228 usertrap_amd64.go:122] [ 682: 683] Allocate a new trap: 0xc000048ba0 13 D0713 08:48:01.498682 374228 usertrap_amd64.go:225] [ 682: 683] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:48:01.498949 374228 task_signals.go:470] [ 682: 682] Notified of signal 23 D0713 08:48:01.499143 374228 task_signals.go:220] [ 682: 682] Signal 23: delivering to handler D0713 08:48:01.502727 374228 usertrap_amd64.go:212] [ 682: 682] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.502779 374228 usertrap_amd64.go:122] [ 682: 682] Allocate a new trap: 0xc000048ba0 14 D0713 08:48:01.502830 374228 usertrap_amd64.go:225] [ 682: 682] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:48:01.503013 374228 task_exit.go:204] [ 682: 682] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.503115 374228 task_signals.go:204] [ 682: 685] Signal 682, PID: 685, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.503168 374228 task_signals.go:204] [ 682: 683] Signal 682, PID: 683, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.503174 374228 task_signals.go:204] [ 682: 687] Signal 682, PID: 687, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.503179 374228 task_signals.go:204] [ 682: 686] Signal 682, PID: 686, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.503258 374228 task_exit.go:204] [ 682: 683] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.503397 374228 task_signals.go:204] [ 682: 684] Signal 682, PID: 684, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.503442 374228 task_exit.go:204] [ 682: 686] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.503588 374228 task_exit.go:204] [ 682: 684] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.503764 374228 task_exit.go:204] [ 682: 682] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.503873 374228 task_exit.go:204] [ 682: 686] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.503919 374228 task_exit.go:204] [ 682: 686] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.504013 374228 task_exit.go:204] [ 682: 684] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.504071 374228 task_exit.go:204] [ 682: 684] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.504184 374228 task_exit.go:204] [ 682: 685] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.504287 374228 task_exit.go:204] [ 682: 685] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.504320 374228 task_exit.go:204] [ 682: 685] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.504396 374228 task_exit.go:204] [ 682: 687] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.504579 374228 task_exit.go:204] [ 682: 683] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.504637 374228 task_exit.go:204] [ 682: 683] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.509513 374228 task_exit.go:204] [ 682: 687] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.509570 374228 task_exit.go:204] [ 682: 687] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.509630 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.509754 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.509807 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.509834 374228 task_exit.go:204] [ 682: 682] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.512619 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.517221 374228 syscalls.go:262] [ 688: 688] Allocating stack with size of 8388608 bytes D0713 08:48:01.518035 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.520225 374228 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.520301 374228 usertrap_amd64.go:106] [ 688: 688] Map a usertrap vma at 61000 D0713 08:48:01.520499 374228 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000b608d0 1 D0713 08:48:01.520572 374228 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:01.521762 374228 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.521806 374228 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000b608d0 2 D0713 08:48:01.521850 374228 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:01.523422 374228 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.523475 374228 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000b608d0 3 D0713 08:48:01.523541 374228 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:01.534460 374228 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.534548 374228 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000b608d0 4 D0713 08:48:01.534622 374228 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:01.536184 374228 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.536250 374228 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000b608d0 5 D0713 08:48:01.536303 374228 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:01.536459 374228 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.536491 374228 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000b608d0 6 D0713 08:48:01.536541 374228 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:01.541090 374228 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.541202 374228 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000b608d0 7 D0713 08:48:01.541291 374228 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:01.542165 374228 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.542232 374228 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc000b608d0 8 D0713 08:48:01.542308 374228 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:01.543430 374228 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.543521 374228 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc000b608d0 9 D0713 08:48:01.543597 374228 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:01.543746 374228 usertrap_amd64.go:212] [ 688: 691] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.543799 374228 usertrap_amd64.go:122] [ 688: 691] Allocate a new trap: 0xc000b608d0 10 D0713 08:48:01.543862 374228 usertrap_amd64.go:225] [ 688: 691] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:01.544928 374228 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.545076 374228 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc000b608d0 11 D0713 08:48:01.545165 374228 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:01.545390 374228 usertrap_amd64.go:212] [ 688: 689] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.545469 374228 usertrap_amd64.go:122] [ 688: 689] Allocate a new trap: 0xc000b608d0 12 D0713 08:48:01.545564 374228 usertrap_amd64.go:225] [ 688: 689] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:01.545842 374228 task_signals.go:470] [ 688: 688] Notified of signal 23 D0713 08:48:01.546003 374228 task_signals.go:220] [ 688: 688] Signal 23: delivering to handler D0713 08:48:01.556457 374228 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.556544 374228 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000b608d0 13 D0713 08:48:01.556613 374228 task_signals.go:470] [ 688: 688] Notified of signal 23 D0713 08:48:01.556667 374228 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:01.556840 374228 task_signals.go:220] [ 688: 688] Signal 23: delivering to handler D0713 08:48:01.557312 374228 task_signals.go:470] [ 688: 688] Notified of signal 23 D0713 08:48:01.557487 374228 task_signals.go:220] [ 688: 688] Signal 23: delivering to handler D0713 08:48:01.557870 374228 task_signals.go:470] [ 688: 688] Notified of signal 23 D0713 08:48:01.558046 374228 task_signals.go:220] [ 688: 688] Signal 23: delivering to handler D0713 08:48:01.570590 374228 task_signals.go:470] [ 688: 688] Notified of signal 23 D0713 08:48:01.571314 374228 task_signals.go:220] [ 688: 688] Signal 23: delivering to handler D0713 08:48:01.572659 374228 usertrap_amd64.go:212] [ 688: 688] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.572781 374228 usertrap_amd64.go:122] [ 688: 688] Allocate a new trap: 0xc000b608d0 14 D0713 08:48:01.572877 374228 usertrap_amd64.go:225] [ 688: 688] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:01.573109 374228 task_exit.go:204] [ 688: 688] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.573233 374228 task_exit.go:204] [ 688: 688] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.573257 374228 task_signals.go:204] [ 688: 689] Signal 688, PID: 689, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.573316 374228 task_signals.go:204] [ 688: 690] Signal 688, PID: 690, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.573326 374228 task_signals.go:204] [ 688: 692] Signal 688, PID: 692, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.573400 374228 task_exit.go:204] [ 688: 690] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.573360 374228 task_signals.go:204] [ 688: 691] Signal 688, PID: 691, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.573463 374228 task_exit.go:204] [ 688: 689] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.573644 374228 task_exit.go:204] [ 688: 689] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.573694 374228 task_exit.go:204] [ 688: 689] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.573821 374228 task_exit.go:204] [ 688: 690] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.573860 374228 task_exit.go:204] [ 688: 690] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.573927 374228 task_exit.go:204] [ 688: 691] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.574017 374228 task_exit.go:204] [ 688: 691] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.574056 374228 task_exit.go:204] [ 688: 691] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.574153 374228 task_exit.go:204] [ 688: 692] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.579734 374228 task_exit.go:204] [ 688: 692] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.579798 374228 task_exit.go:204] [ 688: 692] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.579885 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.580028 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.580092 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.580261 374228 task_exit.go:204] [ 688: 688] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.580699 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:01.581069 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:01.583744 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.589152 374228 syscalls.go:262] [ 693: 693] Allocating stack with size of 8388608 bytes D0713 08:48:01.589951 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.591225 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:01.591375 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:01.592377 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.592496 374228 usertrap_amd64.go:106] [ 693: 693] Map a usertrap vma at 62000 D0713 08:48:01.592770 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 1 D0713 08:48:01.592889 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:48:01.593995 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.594045 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 2 D0713 08:48:01.594092 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:48:01.595505 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.595595 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 3 D0713 08:48:01.595667 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:48:01.607001 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.607089 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 4 D0713 08:48:01.607144 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:48:01.609073 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.609198 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 5 D0713 08:48:01.609267 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:48:01.609435 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.609500 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 6 D0713 08:48:01.609565 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:48:01.615722 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.615839 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 7 D0713 08:48:01.615939 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:48:01.616895 374228 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.617052 374228 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc0016978f0 8 D0713 08:48:01.617165 374228 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:48:01.618347 374228 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.618464 374228 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc0016978f0 9 D0713 08:48:01.618770 374228 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:48:01.619167 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.619257 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 10 D0713 08:48:01.619329 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:48:01.631223 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.631304 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 11 D0713 08:48:01.631374 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:48:01.631555 374228 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.631664 374228 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc0016978f0 12 D0713 08:48:01.631768 374228 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:48:01.631936 374228 usertrap_amd64.go:212] [ 693: 694] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.631998 374228 usertrap_amd64.go:122] [ 693: 694] Allocate a new trap: 0xc0016978f0 13 D0713 08:48:01.632051 374228 usertrap_amd64.go:225] [ 693: 694] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:48:01.632315 374228 task_signals.go:470] [ 693: 693] Notified of signal 23 D0713 08:48:01.632451 374228 task_signals.go:220] [ 693: 693] Signal 23: delivering to handler D0713 08:48:01.644437 374228 task_signals.go:470] [ 693: 693] Notified of signal 23 D0713 08:48:01.646291 374228 task_signals.go:220] [ 693: 693] Signal 23: delivering to handler D0713 08:48:01.647156 374228 usertrap_amd64.go:212] [ 693: 693] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.647224 374228 usertrap_amd64.go:122] [ 693: 693] Allocate a new trap: 0xc0016978f0 14 D0713 08:48:01.647275 374228 usertrap_amd64.go:225] [ 693: 693] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:48:01.647448 374228 task_exit.go:204] [ 693: 693] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.647585 374228 task_signals.go:204] [ 693: 698] Signal 693, PID: 698, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.647703 374228 task_signals.go:204] [ 693: 695] Signal 693, PID: 695, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.647732 374228 task_exit.go:204] [ 693: 693] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.648004 374228 task_exit.go:204] [ 693: 698] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.647991 374228 task_signals.go:204] [ 693: 696] Signal 693, PID: 696, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.648148 374228 task_signals.go:204] [ 693: 697] Signal 693, PID: 697, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.648187 374228 task_signals.go:204] [ 693: 694] Signal 693, PID: 694, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.648263 374228 task_exit.go:204] [ 693: 696] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.648448 374228 task_exit.go:204] [ 693: 695] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.648655 374228 task_exit.go:204] [ 693: 694] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.648851 374228 task_exit.go:204] [ 693: 698] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.648909 374228 task_exit.go:204] [ 693: 698] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.649182 374228 task_exit.go:204] [ 693: 697] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.649403 374228 task_exit.go:204] [ 693: 696] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.649468 374228 task_exit.go:204] [ 693: 696] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.649602 374228 task_exit.go:204] [ 693: 695] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.649676 374228 task_exit.go:204] [ 693: 695] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.649800 374228 task_exit.go:204] [ 693: 694] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.649851 374228 task_exit.go:204] [ 693: 694] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.654807 374228 task_exit.go:204] [ 693: 697] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.654904 374228 task_exit.go:204] [ 693: 697] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.655018 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.655277 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.655370 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.655399 374228 task_exit.go:204] [ 693: 693] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.657925 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.662627 374228 syscalls.go:262] [ 699: 699] Allocating stack with size of 8388608 bytes D0713 08:48:01.663371 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.665932 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.666077 374228 usertrap_amd64.go:106] [ 699: 699] Map a usertrap vma at 60000 D0713 08:48:01.666472 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 1 D0713 08:48:01.666619 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:48:01.667635 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.667683 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 2 D0713 08:48:01.667753 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:48:01.668928 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.669010 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 3 D0713 08:48:01.669072 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:48:01.678322 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.678388 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 4 D0713 08:48:01.678476 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:48:01.679924 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.679969 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 5 D0713 08:48:01.680029 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:48:01.680194 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.680227 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 6 D0713 08:48:01.680265 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:48:01.684627 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.684683 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 7 D0713 08:48:01.684735 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:48:01.685629 374228 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.685699 374228 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc0000491a0 8 D0713 08:48:01.685779 374228 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:48:01.687177 374228 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.687258 374228 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc0000491a0 9 D0713 08:48:01.687334 374228 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:48:01.687493 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.687547 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 10 D0713 08:48:01.687597 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:48:01.700545 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.700659 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 11 D0713 08:48:01.700749 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:48:01.701013 374228 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.701072 374228 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc0000491a0 12 D0713 08:48:01.701134 374228 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:48:01.701327 374228 usertrap_amd64.go:212] [ 699: 700] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.701367 374228 usertrap_amd64.go:122] [ 699: 700] Allocate a new trap: 0xc0000491a0 13 D0713 08:48:01.701423 374228 usertrap_amd64.go:225] [ 699: 700] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:48:01.701607 374228 task_signals.go:470] [ 699: 699] Notified of signal 23 D0713 08:48:01.701709 374228 task_signals.go:220] [ 699: 699] Signal 23: delivering to handler D0713 08:48:01.715508 374228 task_signals.go:470] [ 699: 699] Notified of signal 23 D0713 08:48:01.716016 374228 task_signals.go:220] [ 699: 699] Signal 23: delivering to handler D0713 08:48:01.716984 374228 usertrap_amd64.go:212] [ 699: 699] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.717076 374228 usertrap_amd64.go:122] [ 699: 699] Allocate a new trap: 0xc0000491a0 14 D0713 08:48:01.717169 374228 usertrap_amd64.go:225] [ 699: 699] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:48:01.717407 374228 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.717569 374228 task_signals.go:204] [ 699: 702] Signal 699, PID: 702, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.717689 374228 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.717699 374228 task_signals.go:204] [ 699: 703] Signal 699, PID: 703, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.717846 374228 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.717695 374228 task_signals.go:204] [ 699: 700] Signal 699, PID: 700, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.717871 374228 task_signals.go:204] [ 699: 701] Signal 699, PID: 701, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.718080 374228 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.718292 374228 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.718349 374228 task_exit.go:204] [ 699: 701] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.718563 374228 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.718876 374228 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.719145 374228 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.719237 374228 task_exit.go:204] [ 699: 702] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.719446 374228 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.719504 374228 task_exit.go:204] [ 699: 703] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.726014 374228 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.726130 374228 task_exit.go:204] [ 699: 700] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.726317 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.726530 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.726597 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.726674 374228 task_exit.go:204] [ 699: 699] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.729728 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.734754 374228 syscalls.go:262] [ 704: 704] Allocating stack with size of 8388608 bytes D0713 08:48:01.735795 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.737269 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:01.737455 374228 task_signals.go:179] [ 7: 13] Restarting syscall 247: interrupted by signal 23 D0713 08:48:01.737529 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:01.737978 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.738101 374228 usertrap_amd64.go:106] [ 704: 704] Map a usertrap vma at 67000 D0713 08:48:01.738651 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 1 D0713 08:48:01.738775 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:01.739798 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.739846 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 2 D0713 08:48:01.739915 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:01.741077 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.741121 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 3 D0713 08:48:01.741177 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:01.755109 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.755345 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 4 D0713 08:48:01.755470 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:01.758151 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.758250 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 5 D0713 08:48:01.758378 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:01.758628 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.758741 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 6 D0713 08:48:01.758855 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:01.766875 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.766952 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 7 D0713 08:48:01.767076 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:01.767891 374228 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.767993 374228 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc0005cde30 8 D0713 08:48:01.768156 374228 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:01.769355 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.769433 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 9 D0713 08:48:01.769523 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:01.769669 374228 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.769739 374228 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc0005cde30 10 D0713 08:48:01.769991 374228 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:01.771466 374228 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.771565 374228 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc0005cde30 11 D0713 08:48:01.771658 374228 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:01.771907 374228 usertrap_amd64.go:212] [ 704: 705] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.771979 374228 usertrap_amd64.go:122] [ 704: 705] Allocate a new trap: 0xc0005cde30 12 D0713 08:48:01.772174 374228 usertrap_amd64.go:225] [ 704: 705] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:01.772391 374228 task_signals.go:470] [ 704: 704] Notified of signal 23 D0713 08:48:01.772533 374228 task_signals.go:220] [ 704: 704] Signal 23: delivering to handler D0713 08:48:01.785218 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.785303 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 13 D0713 08:48:01.785314 374228 task_signals.go:470] [ 704: 704] Notified of signal 23 D0713 08:48:01.785393 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:01.785564 374228 task_signals.go:220] [ 704: 704] Signal 23: delivering to handler D0713 08:48:01.786212 374228 task_signals.go:470] [ 704: 704] Notified of signal 23 D0713 08:48:01.786369 374228 task_signals.go:220] [ 704: 704] Signal 23: delivering to handler D0713 08:48:01.786911 374228 task_signals.go:470] [ 704: 704] Notified of signal 23 D0713 08:48:01.787198 374228 task_signals.go:179] [ 704: 704] Restarting syscall 202: interrupted by signal 23 D0713 08:48:01.787256 374228 task_signals.go:220] [ 704: 704] Signal 23: delivering to handler D0713 08:48:01.800593 374228 task_signals.go:470] [ 704: 704] Notified of signal 23 D0713 08:48:01.800852 374228 task_signals.go:220] [ 704: 704] Signal 23: delivering to handler I0713 08:48:01.806666 374228 compat.go:120] Unsupported syscall lookup_dcookie(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/lookup_dcookie for more information. D0713 08:48:01.806942 374228 usertrap_amd64.go:212] [ 704: 704] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.806989 374228 usertrap_amd64.go:122] [ 704: 704] Allocate a new trap: 0xc0005cde30 14 D0713 08:48:01.807074 374228 usertrap_amd64.go:225] [ 704: 704] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:01.807250 374228 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.807463 374228 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.807432 374228 task_signals.go:204] [ 704: 706] Signal 704, PID: 706, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.807592 374228 task_signals.go:204] [ 704: 708] Signal 704, PID: 708, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.807610 374228 task_signals.go:204] [ 704: 707] Signal 704, PID: 707, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.807695 374228 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.807950 374228 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.807929 374228 task_signals.go:204] [ 704: 705] Signal 704, PID: 705, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.808105 374228 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.808389 374228 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.808470 374228 task_exit.go:204] [ 704: 707] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.808627 374228 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.808714 374228 task_exit.go:204] [ 704: 705] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.808794 374228 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.809063 374228 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.809128 374228 task_exit.go:204] [ 704: 706] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.815540 374228 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.815608 374228 task_exit.go:204] [ 704: 708] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.815685 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.815943 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.816011 374228 task_exit.go:204] [ 704: 704] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.816072 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.818988 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.826156 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:01.826302 374228 syscalls.go:262] [ 709: 709] Allocating stack with size of 8388608 bytes D0713 08:48:01.827300 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.827653 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:01.828262 374228 task_signals.go:470] [ 7: 20] Notified of signal 23 D0713 08:48:01.828525 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:01.829709 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.829888 374228 usertrap_amd64.go:106] [ 709: 709] Map a usertrap vma at 6a000 D0713 08:48:01.830279 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 1 D0713 08:48:01.830410 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:01.831298 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.831414 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 2 D0713 08:48:01.831541 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:01.837336 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.837455 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 3 D0713 08:48:01.837530 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:01.848191 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.848290 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 4 D0713 08:48:01.848386 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:01.850279 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.850368 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 5 D0713 08:48:01.850452 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:01.850664 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.850716 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 6 D0713 08:48:01.850775 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:01.855438 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.855536 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 7 D0713 08:48:01.855596 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:01.856211 374228 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.856272 374228 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc000a45ef0 8 D0713 08:48:01.856373 374228 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:01.857490 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.857542 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 9 D0713 08:48:01.857626 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:01.858035 374228 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.858186 374228 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc000a45ef0 10 D0713 08:48:01.858261 374228 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:01.868891 374228 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.869015 374228 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc000a45ef0 11 D0713 08:48:01.869099 374228 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:01.869306 374228 usertrap_amd64.go:212] [ 709: 710] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.869353 374228 usertrap_amd64.go:122] [ 709: 710] Allocate a new trap: 0xc000a45ef0 12 D0713 08:48:01.869413 374228 usertrap_amd64.go:225] [ 709: 710] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:01.869617 374228 task_signals.go:470] [ 709: 709] Notified of signal 23 D0713 08:48:01.870981 374228 task_signals.go:220] [ 709: 709] Signal 23: delivering to handler D0713 08:48:01.871751 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.871829 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 13 D0713 08:48:01.871938 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:01.880452 374228 task_signals.go:470] [ 709: 709] Notified of signal 23 D0713 08:48:01.880697 374228 task_signals.go:179] [ 709: 709] Restarting syscall 202: interrupted by signal 23 D0713 08:48:01.880848 374228 task_signals.go:220] [ 709: 709] Signal 23: delivering to handler D0713 08:48:01.890792 374228 usertrap_amd64.go:212] [ 709: 709] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.890924 374228 usertrap_amd64.go:122] [ 709: 709] Allocate a new trap: 0xc000a45ef0 14 D0713 08:48:01.891179 374228 usertrap_amd64.go:225] [ 709: 709] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:01.894660 374228 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.894658 374228 task_signals.go:204] [ 709: 710] Signal 709, PID: 710, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.894809 374228 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.895038 374228 task_signals.go:204] [ 709: 713] Signal 709, PID: 713, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.895053 374228 task_signals.go:204] [ 709: 711] Signal 709, PID: 711, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.895157 374228 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.895132 374228 task_signals.go:204] [ 709: 712] Signal 709, PID: 712, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.895262 374228 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.895572 374228 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.895899 374228 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.895950 374228 task_exit.go:204] [ 709: 713] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.896132 374228 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.896187 374228 task_exit.go:204] [ 709: 710] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.896328 374228 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.896588 374228 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.896668 374228 task_exit.go:204] [ 709: 712] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.902860 374228 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.902954 374228 task_exit.go:204] [ 709: 711] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.903059 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.903304 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.903371 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.905084 374228 task_exit.go:204] [ 709: 709] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.908512 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.917135 374228 syscalls.go:262] [ 714: 714] Allocating stack with size of 8388608 bytes D0713 08:48:01.918114 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:01.929209 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:01.929356 374228 usertrap_amd64.go:106] [ 714: 714] Map a usertrap vma at 69000 D0713 08:48:01.929644 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 1 D0713 08:48:01.929784 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:01.930794 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:01.930857 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 2 D0713 08:48:01.930921 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:01.932620 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:01.932688 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 3 D0713 08:48:01.932778 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:01.943907 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:01.943998 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 4 D0713 08:48:01.944101 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:01.946069 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:01.946208 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 5 D0713 08:48:01.946278 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:01.946499 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b214:sysno 13 D0713 08:48:01.946586 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 6 D0713 08:48:01.946663 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:01.951039 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:01.951108 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 7 D0713 08:48:01.951162 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:01.951985 374228 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:01.952065 374228 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc0019885d0 8 D0713 08:48:01.952190 374228 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:01.953194 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:01.953290 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 9 D0713 08:48:01.953359 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:01.953730 374228 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46af76:sysno 35 D0713 08:48:01.953875 374228 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc0019885d0 10 D0713 08:48:01.953979 374228 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:01.964697 374228 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46b020:sysno 39 D0713 08:48:01.964800 374228 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc0019885d0 11 D0713 08:48:01.964898 374228 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:01.965117 374228 usertrap_amd64.go:212] [ 714: 715] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:01.965165 374228 usertrap_amd64.go:122] [ 714: 715] Allocate a new trap: 0xc0019885d0 12 D0713 08:48:01.965264 374228 usertrap_amd64.go:225] [ 714: 715] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:01.965402 374228 task_signals.go:470] [ 714: 714] Notified of signal 23 D0713 08:48:01.965518 374228 task_signals.go:220] [ 714: 714] Signal 23: delivering to handler D0713 08:48:01.968424 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46af29:sysno 293 D0713 08:48:01.968476 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 13 D0713 08:48:01.968538 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:01.978263 374228 task_signals.go:470] [ 714: 714] Notified of signal 23 D0713 08:48:01.978449 374228 task_signals.go:179] [ 714: 714] Restarting syscall 202: interrupted by signal 23 D0713 08:48:01.978562 374228 task_signals.go:220] [ 714: 714] Signal 23: delivering to handler D0713 08:48:01.984014 374228 usertrap_amd64.go:212] [ 714: 714] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:01.984117 374228 usertrap_amd64.go:122] [ 714: 714] Allocate a new trap: 0xc0019885d0 14 D0713 08:48:01.984190 374228 usertrap_amd64.go:225] [ 714: 714] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:01.984472 374228 task_exit.go:204] [ 714: 714] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.984715 374228 task_exit.go:204] [ 714: 714] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.984833 374228 task_signals.go:204] [ 714: 717] Signal 714, PID: 717, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.984835 374228 task_signals.go:204] [ 714: 718] Signal 714, PID: 718, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.984874 374228 task_signals.go:204] [ 714: 715] Signal 714, PID: 715, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.984998 374228 task_exit.go:204] [ 714: 717] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.985093 374228 task_signals.go:204] [ 714: 716] Signal 714, PID: 716, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:01.985261 374228 task_exit.go:204] [ 714: 718] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.985506 374228 task_exit.go:204] [ 714: 718] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.985572 374228 task_exit.go:204] [ 714: 718] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.985718 374228 task_exit.go:204] [ 714: 715] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.985857 374228 task_exit.go:204] [ 714: 716] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:01.986199 374228 task_exit.go:204] [ 714: 717] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.986259 374228 task_exit.go:204] [ 714: 717] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.986409 374228 task_exit.go:204] [ 714: 715] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.986468 374228 task_exit.go:204] [ 714: 715] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.992474 374228 task_exit.go:204] [ 714: 716] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:01.992564 374228 task_exit.go:204] [ 714: 716] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.992679 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:01.992886 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:01.992984 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:01.993092 374228 task_exit.go:204] [ 714: 714] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:01.996122 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.003263 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:02.003842 374228 syscalls.go:262] [ 719: 719] Allocating stack with size of 8388608 bytes D0713 08:48:02.004777 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.005152 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:02.007206 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.007304 374228 usertrap_amd64.go:106] [ 719: 719] Map a usertrap vma at 6a000 D0713 08:48:02.007535 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 1 D0713 08:48:02.007662 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:02.008783 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.008860 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 2 D0713 08:48:02.008933 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:02.011525 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.011587 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 3 D0713 08:48:02.011667 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:02.022138 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.022241 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 4 D0713 08:48:02.022294 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:02.023864 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.023913 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 5 D0713 08:48:02.023957 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:02.024159 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.024207 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 6 D0713 08:48:02.024292 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:02.031065 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.031154 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 7 D0713 08:48:02.031254 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:02.032216 374228 usertrap_amd64.go:212] [ 719: 720] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.032283 374228 usertrap_amd64.go:122] [ 719: 720] Allocate a new trap: 0xc0013eeea0 8 D0713 08:48:02.032353 374228 usertrap_amd64.go:225] [ 719: 720] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:02.032975 374228 usertrap_amd64.go:212] [ 719: 720] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.033124 374228 usertrap_amd64.go:122] [ 719: 720] Allocate a new trap: 0xc0013eeea0 9 D0713 08:48:02.033485 374228 usertrap_amd64.go:225] [ 719: 720] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:02.033807 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.033870 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 10 D0713 08:48:02.033966 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:02.035347 374228 usertrap_amd64.go:212] [ 719: 720] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.035434 374228 usertrap_amd64.go:122] [ 719: 720] Allocate a new trap: 0xc0013eeea0 11 D0713 08:48:02.035486 374228 usertrap_amd64.go:225] [ 719: 720] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:02.035802 374228 usertrap_amd64.go:212] [ 719: 720] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.035863 374228 usertrap_amd64.go:122] [ 719: 720] Allocate a new trap: 0xc0013eeea0 12 D0713 08:48:02.035928 374228 usertrap_amd64.go:225] [ 719: 720] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:02.036104 374228 task_signals.go:470] [ 719: 719] Notified of signal 23 D0713 08:48:02.036194 374228 task_signals.go:220] [ 719: 719] Signal 23: delivering to handler D0713 08:48:02.046275 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.046358 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 13 D0713 08:48:02.046439 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:02.046517 374228 task_signals.go:470] [ 719: 719] Notified of signal 23 D0713 08:48:02.046825 374228 task_signals.go:220] [ 719: 719] Signal 23: delivering to handler D0713 08:48:02.047174 374228 task_signals.go:470] [ 719: 719] Notified of signal 23 D0713 08:48:02.047300 374228 task_signals.go:220] [ 719: 719] Signal 23: delivering to handler D0713 08:48:02.047732 374228 task_signals.go:470] [ 719: 719] Notified of signal 23 D0713 08:48:02.047874 374228 task_signals.go:179] [ 719: 719] Restarting syscall 202: interrupted by signal 23 D0713 08:48:02.047919 374228 task_signals.go:220] [ 719: 719] Signal 23: delivering to handler D0713 08:48:02.058991 374228 task_signals.go:470] [ 719: 719] Notified of signal 23 D0713 08:48:02.060621 374228 task_signals.go:220] [ 719: 719] Signal 23: delivering to handler D0713 08:48:02.062004 374228 usertrap_amd64.go:212] [ 719: 719] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.062067 374228 usertrap_amd64.go:122] [ 719: 719] Allocate a new trap: 0xc0013eeea0 14 D0713 08:48:02.062142 374228 usertrap_amd64.go:225] [ 719: 719] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:02.062373 374228 task_exit.go:204] [ 719: 719] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.062594 374228 task_signals.go:204] [ 719: 723] Signal 719, PID: 723, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.062580 374228 task_signals.go:204] [ 719: 720] Signal 719, PID: 720, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.062671 374228 task_exit.go:204] [ 719: 719] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.062761 374228 task_signals.go:204] [ 719: 722] Signal 719, PID: 722, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.062811 374228 task_exit.go:204] [ 719: 723] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.062944 374228 task_signals.go:204] [ 719: 721] Signal 719, PID: 721, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.063057 374228 task_exit.go:204] [ 719: 720] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.063273 374228 task_exit.go:204] [ 719: 720] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.063321 374228 task_exit.go:204] [ 719: 720] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.063461 374228 task_exit.go:204] [ 719: 722] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.063562 374228 task_exit.go:204] [ 719: 721] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.063730 374228 task_exit.go:204] [ 719: 721] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.063789 374228 task_exit.go:204] [ 719: 721] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.063976 374228 task_exit.go:204] [ 719: 723] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.064080 374228 task_exit.go:204] [ 719: 723] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.069240 374228 task_exit.go:204] [ 719: 722] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.069296 374228 task_exit.go:204] [ 719: 722] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.069404 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.069589 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.069638 374228 task_exit.go:204] [ 719: 719] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.069651 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.072427 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.076524 374228 syscalls.go:262] [ 724: 724] Allocating stack with size of 8388608 bytes D0713 08:48:02.077408 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.079594 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.079765 374228 usertrap_amd64.go:106] [ 724: 724] Map a usertrap vma at 65000 D0713 08:48:02.080070 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 1 D0713 08:48:02.080200 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:48:02.081019 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.081071 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 2 D0713 08:48:02.081151 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:48:02.082342 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.082399 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 3 D0713 08:48:02.082442 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:48:02.091287 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.091366 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 4 D0713 08:48:02.091445 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:48:02.093112 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.093199 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 5 D0713 08:48:02.093324 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:48:02.093513 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.093604 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 6 D0713 08:48:02.093682 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:48:02.098572 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.098631 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 7 D0713 08:48:02.098685 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:48:02.099391 374228 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.099512 374228 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc0010f5a70 8 D0713 08:48:02.099602 374228 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:48:02.100234 374228 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.100311 374228 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc0010f5a70 9 D0713 08:48:02.100661 374228 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:48:02.100794 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.100868 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 10 D0713 08:48:02.100969 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:48:02.112042 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.112104 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 11 D0713 08:48:02.112206 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:48:02.112362 374228 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.112425 374228 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc0010f5a70 12 D0713 08:48:02.112509 374228 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:48:02.112649 374228 usertrap_amd64.go:212] [ 724: 725] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.112696 374228 usertrap_amd64.go:122] [ 724: 725] Allocate a new trap: 0xc0010f5a70 13 D0713 08:48:02.112758 374228 usertrap_amd64.go:225] [ 724: 725] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:48:02.112928 374228 task_signals.go:470] [ 724: 724] Notified of signal 23 D0713 08:48:02.113063 374228 task_signals.go:220] [ 724: 724] Signal 23: delivering to handler D0713 08:48:02.124301 374228 usertrap_amd64.go:212] [ 724: 724] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.124374 374228 usertrap_amd64.go:122] [ 724: 724] Allocate a new trap: 0xc0010f5a70 14 D0713 08:48:02.124431 374228 usertrap_amd64.go:225] [ 724: 724] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:48:02.124580 374228 task_signals.go:470] [ 724: 724] Notified of signal 23 D0713 08:48:02.124750 374228 task_exit.go:204] [ 724: 724] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.124903 374228 task_exit.go:204] [ 724: 724] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.125040 374228 task_signals.go:204] [ 724: 728] Signal 724, PID: 728, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.125060 374228 task_signals.go:204] [ 724: 725] Signal 724, PID: 725, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.125051 374228 task_signals.go:204] [ 724: 726] Signal 724, PID: 726, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.125081 374228 task_signals.go:204] [ 724: 727] Signal 724, PID: 727, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.125146 374228 task_exit.go:204] [ 724: 728] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.125288 374228 task_exit.go:204] [ 724: 727] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.125454 374228 task_exit.go:204] [ 724: 725] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.125571 374228 task_exit.go:204] [ 724: 726] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.125798 374228 task_exit.go:204] [ 724: 725] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.125839 374228 task_exit.go:204] [ 724: 725] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.125988 374228 task_exit.go:204] [ 724: 727] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.126064 374228 task_exit.go:204] [ 724: 727] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.126257 374228 task_exit.go:204] [ 724: 728] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.126304 374228 task_exit.go:204] [ 724: 728] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.130390 374228 task_exit.go:204] [ 724: 726] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.130453 374228 task_exit.go:204] [ 724: 726] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.130547 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.130673 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.130745 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.131218 374228 task_exit.go:204] [ 724: 724] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.133736 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.139420 374228 syscalls.go:262] [ 729: 729] Allocating stack with size of 8388608 bytes D0713 08:48:02.140420 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.141644 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:02.141944 374228 task_signals.go:179] [ 7: 13] Restarting syscall 202: interrupted by signal 23 D0713 08:48:02.142037 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:02.142443 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.142575 374228 usertrap_amd64.go:106] [ 729: 729] Map a usertrap vma at 69000 D0713 08:48:02.142849 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 1 D0713 08:48:02.142961 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:02.143682 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.143754 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 2 D0713 08:48:02.143812 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:02.145019 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.145081 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 3 D0713 08:48:02.145184 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:02.153484 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.153568 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 4 D0713 08:48:02.153630 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:02.155003 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.155049 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 5 D0713 08:48:02.155093 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:02.155250 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.155291 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 6 D0713 08:48:02.155357 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:02.159539 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.159635 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 7 D0713 08:48:02.159682 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:02.160531 374228 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.160603 374228 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc001988990 8 D0713 08:48:02.160676 374228 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:02.161613 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.161678 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 9 D0713 08:48:02.161762 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:02.161871 374228 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.161916 374228 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc001988990 10 D0713 08:48:02.162175 374228 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:02.172876 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.172967 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 11 D0713 08:48:02.173070 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:02.175249 374228 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.175321 374228 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc001988990 12 D0713 08:48:02.177145 374228 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:02.177306 374228 usertrap_amd64.go:212] [ 729: 730] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.177354 374228 usertrap_amd64.go:122] [ 729: 730] Allocate a new trap: 0xc001988990 13 D0713 08:48:02.177454 374228 usertrap_amd64.go:225] [ 729: 730] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:02.177634 374228 task_signals.go:470] [ 729: 729] Notified of signal 23 D0713 08:48:02.177777 374228 task_signals.go:220] [ 729: 729] Signal 23: delivering to handler D0713 08:48:02.187140 374228 usertrap_amd64.go:212] [ 729: 729] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.187233 374228 usertrap_amd64.go:122] [ 729: 729] Allocate a new trap: 0xc001988990 14 D0713 08:48:02.187344 374228 usertrap_amd64.go:225] [ 729: 729] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:02.187561 374228 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.187727 374228 task_signals.go:204] [ 729: 730] Signal 729, PID: 730, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.187713 374228 task_signals.go:204] [ 729: 733] Signal 729, PID: 733, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.187792 374228 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.187727 374228 task_signals.go:204] [ 729: 731] Signal 729, PID: 731, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.187842 374228 task_signals.go:204] [ 729: 732] Signal 729, PID: 732, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.187911 374228 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.188045 374228 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.188224 374228 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.188416 374228 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.188475 374228 task_exit.go:204] [ 729: 731] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.188584 374228 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.188678 374228 task_exit.go:204] [ 729: 730] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.188813 374228 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.188976 374228 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.189035 374228 task_exit.go:204] [ 729: 732] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.195367 374228 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.195443 374228 task_exit.go:204] [ 729: 733] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.195537 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.195791 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.195851 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.195918 374228 task_exit.go:204] [ 729: 729] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.196531 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:02.196665 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:02.198949 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.206299 374228 syscalls.go:262] [ 734: 734] Allocating stack with size of 8388608 bytes D0713 08:48:02.207235 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.207699 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:02.207872 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:02.208997 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.209122 374228 usertrap_amd64.go:106] [ 734: 734] Map a usertrap vma at 63000 D0713 08:48:02.209442 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 1 D0713 08:48:02.209603 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:02.210442 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.210487 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 2 D0713 08:48:02.210563 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:02.211912 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.211973 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 3 D0713 08:48:02.212067 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:02.228921 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.229056 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 4 D0713 08:48:02.229176 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:02.230874 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.230964 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 5 D0713 08:48:02.231030 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:02.231173 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.231222 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 6 D0713 08:48:02.231281 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:02.235432 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.235500 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 7 D0713 08:48:02.235581 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:02.236302 374228 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.236372 374228 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc0010d8210 8 D0713 08:48:02.236452 374228 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:02.237084 374228 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.237169 374228 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc0010d8210 9 D0713 08:48:02.237342 374228 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:02.237601 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.237692 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 10 D0713 08:48:02.237788 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:02.238930 374228 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.239033 374228 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc0010d8210 11 D0713 08:48:02.239119 374228 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:02.239424 374228 usertrap_amd64.go:212] [ 734: 735] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.239481 374228 usertrap_amd64.go:122] [ 734: 735] Allocate a new trap: 0xc0010d8210 12 D0713 08:48:02.239557 374228 usertrap_amd64.go:225] [ 734: 735] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:02.239703 374228 task_signals.go:470] [ 734: 734] Notified of signal 23 D0713 08:48:02.239854 374228 task_signals.go:220] [ 734: 734] Signal 23: delivering to handler D0713 08:48:02.249710 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.249809 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 13 D0713 08:48:02.249934 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:02.251701 374228 task_signals.go:470] [ 734: 734] Notified of signal 23 D0713 08:48:02.251853 374228 task_signals.go:220] [ 734: 734] Signal 23: delivering to handler D0713 08:48:02.262558 374228 task_signals.go:470] [ 734: 734] Notified of signal 23 D0713 08:48:02.264445 374228 task_signals.go:220] [ 734: 734] Signal 23: delivering to handler I0713 08:48:02.265580 374228 compat.go:120] Unsupported syscall sys_451(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_451 for more information. D0713 08:48:02.265785 374228 usertrap_amd64.go:212] [ 734: 734] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.265891 374228 usertrap_amd64.go:122] [ 734: 734] Allocate a new trap: 0xc0010d8210 14 D0713 08:48:02.265976 374228 usertrap_amd64.go:225] [ 734: 734] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:02.266197 374228 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.266416 374228 task_signals.go:204] [ 734: 735] Signal 734, PID: 735, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.266455 374228 task_signals.go:204] [ 734: 736] Signal 734, PID: 736, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.266457 374228 task_signals.go:204] [ 734: 738] Signal 734, PID: 738, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.266384 374228 task_signals.go:204] [ 734: 737] Signal 734, PID: 737, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.266503 374228 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.266633 374228 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.266776 374228 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.266827 374228 task_exit.go:204] [ 734: 735] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.266950 374228 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.267106 374228 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.267144 374228 task_exit.go:204] [ 734: 736] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.267262 374228 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.267424 374228 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.267463 374228 task_exit.go:204] [ 734: 738] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.267578 374228 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.273422 374228 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.273513 374228 task_exit.go:204] [ 734: 737] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.273613 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.273809 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.273923 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.274009 374228 task_exit.go:204] [ 734: 734] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.276473 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.282151 374228 syscalls.go:262] [ 739: 739] Allocating stack with size of 8388608 bytes D0713 08:48:02.283047 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.283913 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:02.284077 374228 task_signals.go:179] [ 7: 11] Restarting syscall 247: interrupted by signal 23 D0713 08:48:02.284120 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:02.285115 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.285237 374228 usertrap_amd64.go:106] [ 739: 739] Map a usertrap vma at 69000 D0713 08:48:02.285552 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 1 D0713 08:48:02.285698 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:02.286767 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.286824 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 2 D0713 08:48:02.286913 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:02.288354 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.288468 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 3 D0713 08:48:02.288558 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:02.298032 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.298111 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 4 D0713 08:48:02.298165 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:02.299892 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.300002 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 5 D0713 08:48:02.300080 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:02.300232 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.300278 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 6 D0713 08:48:02.300343 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:02.304404 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.304472 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 7 D0713 08:48:02.304552 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:02.305546 374228 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.305633 374228 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0008ac7b0 8 D0713 08:48:02.305771 374228 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:02.307524 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.307609 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 9 D0713 08:48:02.307782 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:02.308005 374228 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.308067 374228 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0008ac7b0 10 D0713 08:48:02.308319 374228 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:02.309474 374228 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.309579 374228 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0008ac7b0 11 D0713 08:48:02.309669 374228 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:02.309926 374228 usertrap_amd64.go:212] [ 739: 740] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.309995 374228 usertrap_amd64.go:122] [ 739: 740] Allocate a new trap: 0xc0008ac7b0 12 D0713 08:48:02.310104 374228 usertrap_amd64.go:225] [ 739: 740] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:02.310332 374228 task_signals.go:470] [ 739: 739] Notified of signal 23 D0713 08:48:02.310508 374228 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler D0713 08:48:02.321434 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.321500 374228 task_signals.go:470] [ 739: 739] Notified of signal 23 D0713 08:48:02.321519 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 13 D0713 08:48:02.321609 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:02.321738 374228 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler D0713 08:48:02.322258 374228 task_signals.go:470] [ 739: 739] Notified of signal 23 D0713 08:48:02.322386 374228 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler D0713 08:48:02.322725 374228 task_signals.go:470] [ 739: 739] Notified of signal 23 D0713 08:48:02.322888 374228 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler D0713 08:48:02.335352 374228 task_signals.go:470] [ 739: 739] Notified of signal 23 D0713 08:48:02.335518 374228 task_signals.go:220] [ 739: 739] Signal 23: delivering to handler D0713 08:48:02.339233 374228 usertrap_amd64.go:212] [ 739: 739] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.339311 374228 usertrap_amd64.go:122] [ 739: 739] Allocate a new trap: 0xc0008ac7b0 14 D0713 08:48:02.339373 374228 usertrap_amd64.go:225] [ 739: 739] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:02.339599 374228 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.339720 374228 task_signals.go:204] [ 739: 742] Signal 739, PID: 742, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.339838 374228 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.339830 374228 task_signals.go:204] [ 739: 743] Signal 739, PID: 743, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.339812 374228 task_signals.go:204] [ 739: 740] Signal 739, PID: 740, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.339881 374228 task_signals.go:204] [ 739: 741] Signal 739, PID: 741, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.339919 374228 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.340038 374228 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.340192 374228 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.340247 374228 task_exit.go:204] [ 739: 741] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.340489 374228 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.340731 374228 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.340788 374228 task_exit.go:204] [ 739: 743] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.340892 374228 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.341202 374228 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.341281 374228 task_exit.go:204] [ 739: 742] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.346662 374228 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.346742 374228 task_exit.go:204] [ 739: 740] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.346840 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.347050 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.347137 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.347165 374228 task_exit.go:204] [ 739: 739] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.350381 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.356028 374228 syscalls.go:262] [ 744: 744] Allocating stack with size of 8388608 bytes D0713 08:48:02.356717 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.357823 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:02.357992 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:02.358045 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:02.358153 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:02.359841 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.359953 374228 usertrap_amd64.go:106] [ 744: 744] Map a usertrap vma at 69000 D0713 08:48:02.360206 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 1 D0713 08:48:02.360322 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:02.361337 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.361413 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 2 D0713 08:48:02.361493 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:02.362835 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.362895 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 3 D0713 08:48:02.362961 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:02.373450 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.373525 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 4 D0713 08:48:02.373590 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:02.375469 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.375526 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 5 D0713 08:48:02.375607 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:02.375798 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.375859 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 6 D0713 08:48:02.375939 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:02.380008 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.380061 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 7 D0713 08:48:02.380105 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:02.380997 374228 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.381093 374228 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0008acf90 8 D0713 08:48:02.381168 374228 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:02.381918 374228 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.382008 374228 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0008acf90 9 D0713 08:48:02.382197 374228 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:02.382329 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.382407 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 10 D0713 08:48:02.382520 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:02.397844 374228 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.397935 374228 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0008acf90 11 D0713 08:48:02.398017 374228 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:02.398182 374228 usertrap_amd64.go:212] [ 744: 745] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.398258 374228 usertrap_amd64.go:122] [ 744: 745] Allocate a new trap: 0xc0008acf90 12 D0713 08:48:02.398310 374228 usertrap_amd64.go:225] [ 744: 745] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:02.398536 374228 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 08:48:02.398727 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.398781 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 13 D0713 08:48:02.398851 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:02.398995 374228 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler D0713 08:48:02.411226 374228 task_signals.go:470] [ 744: 744] Notified of signal 23 D0713 08:48:02.411330 374228 task_signals.go:220] [ 744: 744] Signal 23: delivering to handler I0713 08:48:02.417311 374228 compat.go:120] Unsupported syscall membarrier(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/membarrier for more information. D0713 08:48:02.417602 374228 usertrap_amd64.go:212] [ 744: 744] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.417721 374228 usertrap_amd64.go:122] [ 744: 744] Allocate a new trap: 0xc0008acf90 14 D0713 08:48:02.417806 374228 usertrap_amd64.go:225] [ 744: 744] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:02.418079 374228 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.418242 374228 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.418394 374228 task_signals.go:204] [ 744: 747] Signal 744, PID: 747, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.418517 374228 task_signals.go:204] [ 744: 749] Signal 744, PID: 749, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.418575 374228 task_signals.go:204] [ 744: 745] Signal 744, PID: 745, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.418641 374228 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.418408 374228 task_signals.go:204] [ 744: 746] Signal 744, PID: 746, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.418650 374228 task_signals.go:204] [ 744: 748] Signal 744, PID: 748, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.418754 374228 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.418942 374228 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.419148 374228 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.419194 374228 task_exit.go:204] [ 744: 747] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.419447 374228 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.419490 374228 task_exit.go:204] [ 744: 746] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.419596 374228 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.419773 374228 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.419824 374228 task_exit.go:204] [ 744: 745] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.419913 374228 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.420063 374228 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.420139 374228 task_exit.go:204] [ 744: 749] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.426046 374228 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.426140 374228 task_exit.go:204] [ 744: 748] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.426237 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.427294 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.427347 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.428002 374228 task_exit.go:204] [ 744: 744] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.430903 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.437314 374228 syscalls.go:262] [ 750: 750] Allocating stack with size of 8388608 bytes D0713 08:48:02.438309 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.439319 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:02.439574 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:02.440926 374228 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.441096 374228 usertrap_amd64.go:106] [ 750: 750] Map a usertrap vma at 66000 D0713 08:48:02.441422 374228 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc0013ef7a0 1 D0713 08:48:02.441602 374228 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:02.442810 374228 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.442870 374228 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc0013ef7a0 2 D0713 08:48:02.442939 374228 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:02.444565 374228 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.444642 374228 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc0013ef7a0 3 D0713 08:48:02.444724 374228 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:02.455525 374228 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.455594 374228 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc0013ef7a0 4 D0713 08:48:02.455672 374228 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:02.457584 374228 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.457660 374228 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc0013ef7a0 5 D0713 08:48:02.457748 374228 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:02.457940 374228 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.457989 374228 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc0013ef7a0 6 D0713 08:48:02.458051 374228 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:02.462915 374228 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.462977 374228 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc0013ef7a0 7 D0713 08:48:02.463065 374228 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:02.463833 374228 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.463897 374228 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc0013ef7a0 8 D0713 08:48:02.463973 374228 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:02.464466 374228 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.464548 374228 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc0013ef7a0 9 D0713 08:48:02.464628 374228 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:02.464922 374228 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.465047 374228 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc0013ef7a0 10 D0713 08:48:02.465105 374228 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b020 trap addr 66320 ([184 39 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:02.465265 374228 usertrap_amd64.go:212] [ 750: 751] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.465318 374228 usertrap_amd64.go:122] [ 750: 751] Allocate a new trap: 0xc0013ef7a0 11 D0713 08:48:02.465389 374228 usertrap_amd64.go:225] [ 750: 751] Apply the binary patch addr 46b04f trap addr 66370 ([184 234 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:02.465796 374228 task_signals.go:470] [ 750: 750] Notified of signal 23 D0713 08:48:02.466932 374228 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler D0713 08:48:02.467716 374228 task_signals.go:481] [ 750: 750] No task notified of signal 23 D0713 08:48:02.468622 374228 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler D0713 08:48:02.468860 374228 usertrap_amd64.go:212] [ 750: 753] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.468979 374228 usertrap_amd64.go:122] [ 750: 753] Allocate a new trap: 0xc0013ef7a0 12 D0713 08:48:02.469064 374228 usertrap_amd64.go:225] [ 750: 753] Apply the binary patch addr 46b57c trap addr 663c0 ([184 202 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:02.480347 374228 task_signals.go:470] [ 750: 750] Notified of signal 23 D0713 08:48:02.480492 374228 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler D0713 08:48:02.483477 374228 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.483519 374228 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc0013ef7a0 13 D0713 08:48:02.483593 374228 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:02.491393 374228 sampler.go:191] Time: Adjusting syscall overhead down to 766 D0713 08:48:02.493560 374228 task_signals.go:470] [ 750: 750] Notified of signal 23 D0713 08:48:02.493720 374228 task_signals.go:220] [ 750: 750] Signal 23: delivering to handler D0713 08:48:02.503405 374228 usertrap_amd64.go:212] [ 750: 750] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.503529 374228 usertrap_amd64.go:122] [ 750: 750] Allocate a new trap: 0xc0013ef7a0 14 D0713 08:48:02.503596 374228 usertrap_amd64.go:225] [ 750: 750] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:02.503777 374228 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.504008 374228 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.504149 374228 task_signals.go:204] [ 750: 753] Signal 750, PID: 753, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.504127 374228 task_signals.go:204] [ 750: 752] Signal 750, PID: 752, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.504245 374228 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.504219 374228 task_signals.go:204] [ 750: 751] Signal 750, PID: 751, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.504146 374228 task_signals.go:204] [ 750: 754] Signal 750, PID: 754, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.504470 374228 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.504801 374228 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.504923 374228 task_exit.go:204] [ 750: 754] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.505284 374228 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.505450 374228 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.505845 374228 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.505931 374228 task_exit.go:204] [ 750: 753] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.506168 374228 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.506235 374228 task_exit.go:204] [ 750: 751] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.511779 374228 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.511838 374228 task_exit.go:204] [ 750: 752] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.512006 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.512280 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.512356 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.512783 374228 task_exit.go:204] [ 750: 750] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.516144 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.520679 374228 syscalls.go:262] [ 755: 755] Allocating stack with size of 8388608 bytes D0713 08:48:02.523908 374228 task_signals.go:481] [ 7: 13] No task notified of signal 23 D0713 08:48:02.526552 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.527013 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:02.534956 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.535160 374228 usertrap_amd64.go:106] [ 755: 755] Map a usertrap vma at 60000 D0713 08:48:02.535515 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 1 D0713 08:48:02.535732 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:48:02.536817 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.536882 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 2 D0713 08:48:02.536953 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:48:02.538359 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.538403 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 3 D0713 08:48:02.538462 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:48:02.547761 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.547833 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 4 D0713 08:48:02.547879 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:48:02.549627 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.549677 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 5 D0713 08:48:02.549736 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:48:02.550030 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.550074 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 6 D0713 08:48:02.550115 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:48:02.553573 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.553631 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 7 D0713 08:48:02.553714 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:48:02.554640 374228 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.554730 374228 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0008ac030 8 D0713 08:48:02.554810 374228 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:48:02.555424 374228 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.555519 374228 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0008ac030 9 D0713 08:48:02.555779 374228 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:48:02.556011 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.556105 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 10 D0713 08:48:02.556165 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:48:02.568584 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.568666 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 11 D0713 08:48:02.568745 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:48:02.568913 374228 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.569004 374228 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0008ac030 12 D0713 08:48:02.569198 374228 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:48:02.569382 374228 usertrap_amd64.go:212] [ 755: 756] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.569447 374228 usertrap_amd64.go:122] [ 755: 756] Allocate a new trap: 0xc0008ac030 13 D0713 08:48:02.569557 374228 usertrap_amd64.go:225] [ 755: 756] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:48:02.569737 374228 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 08:48:02.569858 374228 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler D0713 08:48:02.581253 374228 task_signals.go:470] [ 755: 755] Notified of signal 23 D0713 08:48:02.582132 374228 task_signals.go:220] [ 755: 755] Signal 23: delivering to handler I0713 08:48:02.583219 374228 compat.go:120] Unsupported syscall sys_447(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_447 for more information. D0713 08:48:02.583473 374228 usertrap_amd64.go:212] [ 755: 755] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.583517 374228 usertrap_amd64.go:122] [ 755: 755] Allocate a new trap: 0xc0008ac030 14 D0713 08:48:02.583593 374228 usertrap_amd64.go:225] [ 755: 755] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:48:02.584355 374228 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.584569 374228 task_signals.go:204] [ 755: 758] Signal 755, PID: 758, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.584594 374228 task_signals.go:204] [ 755: 757] Signal 755, PID: 757, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.584754 374228 task_signals.go:204] [ 755: 760] Signal 755, PID: 760, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.584819 374228 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.584996 374228 task_signals.go:204] [ 755: 759] Signal 755, PID: 759, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.585031 374228 task_signals.go:204] [ 755: 756] Signal 755, PID: 756, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.585112 374228 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.585234 374228 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.585434 374228 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.585584 374228 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.585653 374228 task_exit.go:204] [ 755: 757] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.585826 374228 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.585965 374228 task_exit.go:204] [ 755: 760] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.586219 374228 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.586270 374228 task_exit.go:204] [ 755: 759] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.586348 374228 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.586423 374228 task_exit.go:204] [ 755: 756] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.586562 374228 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.586623 374228 task_exit.go:204] [ 755: 758] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.590691 374228 task_exit.go:204] [ 755: 760] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.590776 374228 task_exit.go:204] [ 755: 760] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.590895 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.591044 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.591117 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.591367 374228 task_exit.go:204] [ 755: 755] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.593734 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.597770 374228 syscalls.go:262] [ 761: 761] Allocating stack with size of 8388608 bytes D0713 08:48:02.598505 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.600394 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.600529 374228 usertrap_amd64.go:106] [ 761: 761] Map a usertrap vma at 69000 D0713 08:48:02.600746 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 1 D0713 08:48:02.600861 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:02.601589 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.601655 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 2 D0713 08:48:02.601746 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:02.603257 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.603310 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 3 D0713 08:48:02.603374 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:02.611468 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.611524 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 4 D0713 08:48:02.611569 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:02.612860 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.612905 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 5 D0713 08:48:02.612993 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:02.613121 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.613169 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 6 D0713 08:48:02.613218 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:02.616433 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.616503 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 7 D0713 08:48:02.616554 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:02.617247 374228 usertrap_amd64.go:212] [ 761: 762] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.617293 374228 usertrap_amd64.go:122] [ 761: 762] Allocate a new trap: 0xc0008ac870 8 D0713 08:48:02.617354 374228 usertrap_amd64.go:225] [ 761: 762] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:02.618576 374228 usertrap_amd64.go:212] [ 761: 762] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.618642 374228 usertrap_amd64.go:122] [ 761: 762] Allocate a new trap: 0xc0008ac870 9 D0713 08:48:02.618713 374228 usertrap_amd64.go:225] [ 761: 762] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:02.618962 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.619024 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 10 D0713 08:48:02.619095 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:02.629732 374228 usertrap_amd64.go:212] [ 761: 762] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.629813 374228 usertrap_amd64.go:122] [ 761: 762] Allocate a new trap: 0xc0008ac870 11 D0713 08:48:02.629894 374228 usertrap_amd64.go:225] [ 761: 762] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:02.630158 374228 usertrap_amd64.go:212] [ 761: 762] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.630213 374228 usertrap_amd64.go:122] [ 761: 762] Allocate a new trap: 0xc0008ac870 12 D0713 08:48:02.630274 374228 usertrap_amd64.go:225] [ 761: 762] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:02.630409 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.630417 374228 task_signals.go:470] [ 761: 761] Notified of signal 23 D0713 08:48:02.630493 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 13 D0713 08:48:02.630593 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:02.630776 374228 task_signals.go:220] [ 761: 761] Signal 23: delivering to handler D0713 08:48:02.642722 374228 task_signals.go:470] [ 761: 761] Notified of signal 23 D0713 08:48:02.644393 374228 task_signals.go:220] [ 761: 761] Signal 23: delivering to handler I0713 08:48:02.645919 374228 compat.go:120] Unsupported syscall migrate_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/migrate_pages for more information. D0713 08:48:02.646213 374228 usertrap_amd64.go:212] [ 761: 761] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.646305 374228 usertrap_amd64.go:122] [ 761: 761] Allocate a new trap: 0xc0008ac870 14 D0713 08:48:02.646388 374228 usertrap_amd64.go:225] [ 761: 761] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:02.646686 374228 task_exit.go:204] [ 761: 761] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.646910 374228 task_exit.go:204] [ 761: 761] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.647023 374228 task_signals.go:204] [ 761: 765] Signal 761, PID: 765, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.647101 374228 task_signals.go:204] [ 761: 763] Signal 761, PID: 763, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.647128 374228 task_signals.go:204] [ 761: 762] Signal 761, PID: 762, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.647123 374228 task_signals.go:204] [ 761: 764] Signal 761, PID: 764, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.647156 374228 task_exit.go:204] [ 761: 765] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.647454 374228 task_exit.go:204] [ 761: 765] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.647516 374228 task_exit.go:204] [ 761: 765] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.647734 374228 task_exit.go:204] [ 761: 763] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.647908 374228 task_exit.go:204] [ 761: 763] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.647962 374228 task_exit.go:204] [ 761: 763] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.648087 374228 task_exit.go:204] [ 761: 762] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.648232 374228 task_exit.go:204] [ 761: 762] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.648290 374228 task_exit.go:204] [ 761: 762] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.648396 374228 task_exit.go:204] [ 761: 764] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.654182 374228 task_exit.go:204] [ 761: 764] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.654258 374228 task_exit.go:204] [ 761: 764] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.654368 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.654543 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.654626 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.654659 374228 task_exit.go:204] [ 761: 761] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.658116 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.664651 374228 task_signals.go:481] [ 7: 13] No task notified of signal 23 D0713 08:48:02.665067 374228 syscalls.go:262] [ 766: 766] Allocating stack with size of 8388608 bytes D0713 08:48:02.665714 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.665988 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:02.666366 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:02.666550 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:02.667719 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.667861 374228 usertrap_amd64.go:106] [ 766: 766] Map a usertrap vma at 62000 D0713 08:48:02.668092 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 1 D0713 08:48:02.668192 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:48:02.669098 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.669164 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 2 D0713 08:48:02.669217 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:48:02.670437 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.670485 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 3 D0713 08:48:02.670535 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:48:02.681571 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.681686 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 4 D0713 08:48:02.681801 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:48:02.683383 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.683445 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 5 D0713 08:48:02.683515 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:48:02.683698 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.683740 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 6 D0713 08:48:02.683824 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:48:02.690275 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.690354 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 7 D0713 08:48:02.690437 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:48:02.691464 374228 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.691571 374228 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc0010d86c0 8 D0713 08:48:02.691667 374228 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:48:02.692591 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.692653 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 9 D0713 08:48:02.692933 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:48:02.693322 374228 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.693402 374228 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc0010d86c0 10 D0713 08:48:02.693473 374228 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:48:02.704352 374228 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.704455 374228 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc0010d86c0 11 D0713 08:48:02.704527 374228 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:48:02.704736 374228 usertrap_amd64.go:212] [ 766: 767] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.704772 374228 usertrap_amd64.go:122] [ 766: 767] Allocate a new trap: 0xc0010d86c0 12 D0713 08:48:02.705007 374228 usertrap_amd64.go:225] [ 766: 767] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:48:02.705221 374228 task_signals.go:470] [ 766: 766] Notified of signal 23 D0713 08:48:02.705401 374228 task_signals.go:220] [ 766: 766] Signal 23: delivering to handler D0713 08:48:02.707885 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.707950 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 13 D0713 08:48:02.708033 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:48:02.717868 374228 task_signals.go:470] [ 766: 766] Notified of signal 23 D0713 08:48:02.718606 374228 task_signals.go:220] [ 766: 766] Signal 23: delivering to handler D0713 08:48:02.723579 374228 usertrap_amd64.go:212] [ 766: 766] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.723656 374228 usertrap_amd64.go:122] [ 766: 766] Allocate a new trap: 0xc0010d86c0 14 D0713 08:48:02.723707 374228 usertrap_amd64.go:225] [ 766: 766] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:48:02.723920 374228 task_exit.go:204] [ 766: 766] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.724054 374228 task_signals.go:204] [ 766: 771] Signal 766, PID: 771, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.724120 374228 task_exit.go:204] [ 766: 766] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.724155 374228 task_signals.go:204] [ 766: 770] Signal 766, PID: 770, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.724203 374228 task_signals.go:204] [ 766: 769] Signal 766, PID: 769, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.724241 374228 task_exit.go:204] [ 766: 771] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.724380 374228 task_signals.go:204] [ 766: 768] Signal 766, PID: 768, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.724503 374228 task_exit.go:204] [ 766: 768] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.724609 374228 task_signals.go:204] [ 766: 767] Signal 766, PID: 767, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.724822 374228 task_exit.go:204] [ 766: 768] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.724880 374228 task_exit.go:204] [ 766: 768] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.725130 374228 task_exit.go:204] [ 766: 770] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.725322 374228 task_exit.go:204] [ 766: 769] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.725492 374228 task_exit.go:204] [ 766: 769] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.725545 374228 task_exit.go:204] [ 766: 769] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.725664 374228 task_exit.go:204] [ 766: 767] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.725861 374228 task_exit.go:204] [ 766: 771] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.725919 374228 task_exit.go:204] [ 766: 771] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.726032 374228 task_exit.go:204] [ 766: 770] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.726095 374228 task_exit.go:204] [ 766: 770] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.731118 374228 task_exit.go:204] [ 766: 767] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.731186 374228 task_exit.go:204] [ 766: 767] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.731293 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.731452 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.731524 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.731631 374228 task_exit.go:204] [ 766: 766] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.734327 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.738782 374228 syscalls.go:262] [ 772: 772] Allocating stack with size of 8388608 bytes D0713 08:48:02.739436 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.741306 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.741415 374228 usertrap_amd64.go:106] [ 772: 772] Map a usertrap vma at 60000 D0713 08:48:02.741644 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 1 D0713 08:48:02.741741 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:48:02.742600 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.742664 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 2 D0713 08:48:02.742710 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:48:02.743698 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.743742 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 3 D0713 08:48:02.743807 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:48:02.752145 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.752215 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 4 D0713 08:48:02.752277 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:48:02.754276 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.754368 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 5 D0713 08:48:02.754467 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:48:02.754666 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.754722 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 6 D0713 08:48:02.754780 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:48:02.758232 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.758288 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 7 D0713 08:48:02.758345 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:48:02.759013 374228 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.759093 374228 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0013ee960 8 D0713 08:48:02.759214 374228 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:48:02.760180 374228 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.760253 374228 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0013ee960 9 D0713 08:48:02.760422 374228 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:48:02.760540 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.760605 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 10 D0713 08:48:02.760667 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:48:02.771269 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.771334 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 11 D0713 08:48:02.771383 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:48:02.771521 374228 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.771584 374228 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0013ee960 12 D0713 08:48:02.771659 374228 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:48:02.771806 374228 usertrap_amd64.go:212] [ 772: 773] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.771841 374228 usertrap_amd64.go:122] [ 772: 773] Allocate a new trap: 0xc0013ee960 13 D0713 08:48:02.771918 374228 usertrap_amd64.go:225] [ 772: 773] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:48:02.772142 374228 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 08:48:02.772237 374228 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0713 08:48:02.783553 374228 task_signals.go:470] [ 772: 772] Notified of signal 23 D0713 08:48:02.784038 374228 task_signals.go:220] [ 772: 772] Signal 23: delivering to handler D0713 08:48:02.785063 374228 usertrap_amd64.go:212] [ 772: 772] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.785164 374228 usertrap_amd64.go:122] [ 772: 772] Allocate a new trap: 0xc0013ee960 14 D0713 08:48:02.785264 374228 usertrap_amd64.go:225] [ 772: 772] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:48:02.785474 374228 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.785624 374228 task_signals.go:204] [ 772: 775] Signal 772, PID: 775, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.785633 374228 task_signals.go:204] [ 772: 774] Signal 772, PID: 774, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.785681 374228 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.785676 374228 task_signals.go:204] [ 772: 776] Signal 772, PID: 776, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.785819 374228 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.785898 374228 task_signals.go:204] [ 772: 773] Signal 772, PID: 773, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.786043 374228 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.786228 374228 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.786277 374228 task_exit.go:204] [ 772: 774] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.786375 374228 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.786483 374228 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.786544 374228 task_exit.go:204] [ 772: 773] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.786689 374228 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.786880 374228 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.786958 374228 task_exit.go:204] [ 772: 775] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.792184 374228 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.792318 374228 task_exit.go:204] [ 772: 776] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.792508 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.792703 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.792782 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.792928 374228 task_exit.go:204] [ 772: 772] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.795358 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.800287 374228 syscalls.go:262] [ 777: 777] Allocating stack with size of 8388608 bytes D0713 08:48:02.801115 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.802875 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.802979 374228 usertrap_amd64.go:106] [ 777: 777] Map a usertrap vma at 64000 D0713 08:48:02.803200 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 1 D0713 08:48:02.803301 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:02.804149 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.804198 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 2 D0713 08:48:02.804238 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:02.805667 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.805736 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 3 D0713 08:48:02.805779 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:02.815662 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.815735 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 4 D0713 08:48:02.815785 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:02.817393 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.817475 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 5 D0713 08:48:02.817531 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:02.817677 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.817740 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 6 D0713 08:48:02.817780 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:02.821777 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.821874 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 7 D0713 08:48:02.821959 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:02.823033 374228 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.823118 374228 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0010d8840 8 D0713 08:48:02.823187 374228 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:02.823827 374228 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.823892 374228 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0010d8840 9 D0713 08:48:02.823970 374228 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:02.824289 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.824348 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 10 D0713 08:48:02.824453 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:02.837062 374228 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.837201 374228 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0010d8840 11 D0713 08:48:02.837325 374228 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:02.837581 374228 usertrap_amd64.go:212] [ 777: 778] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.837637 374228 usertrap_amd64.go:122] [ 777: 778] Allocate a new trap: 0xc0010d8840 12 D0713 08:48:02.837694 374228 usertrap_amd64.go:225] [ 777: 778] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:02.837938 374228 task_signals.go:470] [ 777: 777] Notified of signal 23 D0713 08:48:02.837976 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.838086 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 13 D0713 08:48:02.838182 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:02.838335 374228 task_signals.go:220] [ 777: 777] Signal 23: delivering to handler D0713 08:48:02.838799 374228 task_signals.go:470] [ 777: 777] Notified of signal 23 D0713 08:48:02.838904 374228 task_signals.go:220] [ 777: 777] Signal 23: delivering to handler D0713 08:48:02.839316 374228 task_signals.go:470] [ 777: 777] Notified of signal 23 D0713 08:48:02.839418 374228 task_signals.go:220] [ 777: 777] Signal 23: delivering to handler D0713 08:48:02.849973 374228 task_signals.go:470] [ 777: 777] Notified of signal 23 D0713 08:48:02.850128 374228 task_signals.go:179] [ 777: 777] Restarting syscall 202: interrupted by signal 23 D0713 08:48:02.850202 374228 task_signals.go:220] [ 777: 777] Signal 23: delivering to handler D0713 08:48:02.853830 374228 usertrap_amd64.go:212] [ 777: 777] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.853887 374228 usertrap_amd64.go:122] [ 777: 777] Allocate a new trap: 0xc0010d8840 14 D0713 08:48:02.853958 374228 usertrap_amd64.go:225] [ 777: 777] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:02.854204 374228 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.854381 374228 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.854387 374228 task_signals.go:204] [ 777: 782] Signal 777, PID: 782, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.854328 374228 task_signals.go:204] [ 777: 779] Signal 777, PID: 779, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.854505 374228 task_signals.go:204] [ 777: 778] Signal 777, PID: 778, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.854517 374228 task_exit.go:204] [ 777: 782] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.854470 374228 task_signals.go:204] [ 777: 781] Signal 777, PID: 781, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.854633 374228 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.854778 374228 task_signals.go:204] [ 777: 780] Signal 777, PID: 780, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.854815 374228 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.854855 374228 task_exit.go:204] [ 777: 778] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.855099 374228 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.855272 374228 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.855329 374228 task_exit.go:204] [ 777: 780] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.855517 374228 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.855681 374228 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.855841 374228 task_exit.go:204] [ 777: 782] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.855913 374228 task_exit.go:204] [ 777: 782] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.856078 374228 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.856131 374228 task_exit.go:204] [ 777: 779] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.860870 374228 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.860927 374228 task_exit.go:204] [ 777: 781] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.861046 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.861245 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.861318 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.861550 374228 task_exit.go:204] [ 777: 777] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.864286 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.869186 374228 syscalls.go:262] [ 783: 783] Allocating stack with size of 8388608 bytes D0713 08:48:02.869897 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.871887 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.871986 374228 usertrap_amd64.go:106] [ 783: 783] Map a usertrap vma at 67000 D0713 08:48:02.872243 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 1 D0713 08:48:02.872345 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:02.873380 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.873439 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 2 D0713 08:48:02.873499 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:02.874647 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.874693 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 3 D0713 08:48:02.874732 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:02.883506 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.883577 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 4 D0713 08:48:02.883625 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:02.885283 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.885376 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 5 D0713 08:48:02.885456 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:02.885598 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.885630 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 6 D0713 08:48:02.885676 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:02.888814 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.888876 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 7 D0713 08:48:02.888926 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:02.889731 374228 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.889799 374228 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc0008ad350 8 D0713 08:48:02.889932 374228 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:02.890385 374228 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.890448 374228 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc0008ad350 9 D0713 08:48:02.890519 374228 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:02.890788 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.890878 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 10 D0713 08:48:02.890939 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:02.902903 374228 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.903037 374228 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc0008ad350 11 D0713 08:48:02.903125 374228 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:02.903335 374228 usertrap_amd64.go:212] [ 783: 784] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.903395 374228 usertrap_amd64.go:122] [ 783: 784] Allocate a new trap: 0xc0008ad350 12 D0713 08:48:02.903478 374228 usertrap_amd64.go:225] [ 783: 784] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:02.903652 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.903743 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 13 D0713 08:48:02.903819 374228 task_signals.go:470] [ 783: 783] Notified of signal 23 D0713 08:48:02.903846 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:02.903944 374228 task_signals.go:220] [ 783: 783] Signal 23: delivering to handler D0713 08:48:02.917980 374228 task_signals.go:470] [ 783: 783] Notified of signal 23 D0713 08:48:02.919372 374228 task_signals.go:220] [ 783: 783] Signal 23: delivering to handler D0713 08:48:02.920914 374228 usertrap_amd64.go:212] [ 783: 783] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.921053 374228 usertrap_amd64.go:122] [ 783: 783] Allocate a new trap: 0xc0008ad350 14 D0713 08:48:02.921189 374228 usertrap_amd64.go:225] [ 783: 783] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:02.921573 374228 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.921807 374228 task_signals.go:204] [ 783: 785] Signal 783, PID: 785, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.921929 374228 task_signals.go:204] [ 783: 788] Signal 783, PID: 788, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.921982 374228 task_signals.go:204] [ 783: 784] Signal 783, PID: 784, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.922050 374228 task_exit.go:204] [ 783: 788] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.922041 374228 task_signals.go:204] [ 783: 786] Signal 783, PID: 786, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.922159 374228 task_signals.go:204] [ 783: 787] Signal 783, PID: 787, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.922303 374228 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.922538 374228 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.922686 374228 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.922902 374228 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.922947 374228 task_exit.go:204] [ 783: 786] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.923102 374228 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.923268 374228 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.923520 374228 task_exit.go:204] [ 783: 788] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.923578 374228 task_exit.go:204] [ 783: 788] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.923789 374228 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.923858 374228 task_exit.go:204] [ 783: 784] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.924022 374228 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.924070 374228 task_exit.go:204] [ 783: 787] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.928996 374228 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.929074 374228 task_exit.go:204] [ 783: 785] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.929185 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.929364 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.929444 374228 task_exit.go:204] [ 783: 783] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.929439 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.932572 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.937612 374228 syscalls.go:262] [ 789: 789] Allocating stack with size of 8388608 bytes D0713 08:48:02.938365 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:02.940581 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:02.940692 374228 usertrap_amd64.go:106] [ 789: 789] Map a usertrap vma at 67000 D0713 08:48:02.941122 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 1 D0713 08:48:02.941271 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:02.942289 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:02.942345 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 2 D0713 08:48:02.942402 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:02.943941 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:02.944006 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 3 D0713 08:48:02.944056 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:02.954332 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:02.954391 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 4 D0713 08:48:02.954465 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:02.956279 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:02.956386 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 5 D0713 08:48:02.956461 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:02.956660 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b214:sysno 13 D0713 08:48:02.956749 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 6 D0713 08:48:02.956840 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:02.960255 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:02.960310 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 7 D0713 08:48:02.960376 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:02.961293 374228 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:02.961426 374228 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc0010d8cf0 8 D0713 08:48:02.961508 374228 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:02.962170 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:02.962280 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 9 D0713 08:48:02.962375 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:02.962888 374228 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46af76:sysno 35 D0713 08:48:02.962967 374228 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc0010d8cf0 10 D0713 08:48:02.963061 374228 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:02.964425 374228 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46b020:sysno 39 D0713 08:48:02.964473 374228 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc0010d8cf0 11 D0713 08:48:02.964667 374228 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:02.964888 374228 usertrap_amd64.go:212] [ 789: 790] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:02.965038 374228 usertrap_amd64.go:122] [ 789: 790] Allocate a new trap: 0xc0010d8cf0 12 D0713 08:48:02.965166 374228 usertrap_amd64.go:225] [ 789: 790] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:02.965341 374228 task_signals.go:470] [ 789: 789] Notified of signal 23 D0713 08:48:02.965424 374228 task_signals.go:220] [ 789: 789] Signal 23: delivering to handler D0713 08:48:02.975344 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46af29:sysno 293 D0713 08:48:02.975432 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 13 D0713 08:48:02.975521 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:02.975916 374228 task_signals.go:470] [ 789: 789] Notified of signal 23 D0713 08:48:02.976088 374228 task_signals.go:220] [ 789: 789] Signal 23: delivering to handler D0713 08:48:02.989630 374228 usertrap_amd64.go:212] [ 789: 789] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:02.989724 374228 usertrap_amd64.go:122] [ 789: 789] Allocate a new trap: 0xc0010d8cf0 14 D0713 08:48:02.989732 374228 task_signals.go:470] [ 789: 789] Notified of signal 23 D0713 08:48:02.989801 374228 usertrap_amd64.go:225] [ 789: 789] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:02.989924 374228 task_signals.go:220] [ 789: 789] Signal 23: delivering to handler D0713 08:48:02.990314 374228 task_exit.go:204] [ 789: 789] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.990487 374228 task_signals.go:204] [ 789: 792] Signal 789, PID: 792, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.990582 374228 task_signals.go:204] [ 789: 794] Signal 789, PID: 794, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.990646 374228 task_exit.go:204] [ 789: 789] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.990785 374228 task_signals.go:204] [ 789: 791] Signal 789, PID: 791, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.990754 374228 task_signals.go:204] [ 789: 793] Signal 789, PID: 793, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.990877 374228 task_signals.go:204] [ 789: 790] Signal 789, PID: 790, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:02.990933 374228 task_exit.go:204] [ 789: 791] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.991144 374228 task_exit.go:204] [ 789: 790] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.991331 374228 task_exit.go:204] [ 789: 790] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.991376 374228 task_exit.go:204] [ 789: 790] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.991530 374228 task_exit.go:204] [ 789: 792] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.991703 374228 task_exit.go:204] [ 789: 792] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.991759 374228 task_exit.go:204] [ 789: 792] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.991875 374228 task_exit.go:204] [ 789: 794] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.991957 374228 task_exit.go:204] [ 789: 793] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:02.992045 374228 task_exit.go:204] [ 789: 791] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.992108 374228 task_exit.go:204] [ 789: 791] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.992374 374228 task_exit.go:204] [ 789: 794] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.992459 374228 task_exit.go:204] [ 789: 794] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.998338 374228 task_exit.go:204] [ 789: 793] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:02.998447 374228 task_exit.go:204] [ 789: 793] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.998530 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:02.998737 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:02.998836 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:02.999000 374228 task_exit.go:204] [ 789: 789] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:02.999695 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:02.999813 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:03.001940 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.006436 374228 syscalls.go:262] [ 795: 795] Allocating stack with size of 8388608 bytes D0713 08:48:03.007145 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.009044 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.009181 374228 usertrap_amd64.go:106] [ 795: 795] Map a usertrap vma at 63000 D0713 08:48:03.009445 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 1 D0713 08:48:03.009565 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:03.010559 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.010638 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 2 D0713 08:48:03.010711 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:03.012041 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.012101 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 3 D0713 08:48:03.012189 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:03.021642 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.021710 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 4 D0713 08:48:03.021780 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:03.023070 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.023146 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 5 D0713 08:48:03.023224 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:03.023379 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.023418 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 6 D0713 08:48:03.023517 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:03.030532 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.030624 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 7 D0713 08:48:03.030689 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:03.031459 374228 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.031515 374228 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc000bacff0 8 D0713 08:48:03.031656 374228 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:03.032648 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.032720 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 9 D0713 08:48:03.033061 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:03.033401 374228 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.033501 374228 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc000bacff0 10 D0713 08:48:03.033572 374228 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:03.046138 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.046209 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 11 D0713 08:48:03.046304 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:03.046448 374228 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.046543 374228 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc000bacff0 12 D0713 08:48:03.046669 374228 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:03.047016 374228 usertrap_amd64.go:212] [ 795: 796] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.047107 374228 usertrap_amd64.go:122] [ 795: 796] Allocate a new trap: 0xc000bacff0 13 D0713 08:48:03.047216 374228 usertrap_amd64.go:225] [ 795: 796] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:03.047458 374228 task_signals.go:470] [ 795: 795] Notified of signal 23 D0713 08:48:03.047572 374228 task_signals.go:220] [ 795: 795] Signal 23: delivering to handler D0713 08:48:03.058923 374228 task_signals.go:470] [ 795: 795] Notified of signal 23 D0713 08:48:03.059111 374228 task_signals.go:220] [ 795: 795] Signal 23: delivering to handler D0713 08:48:03.062771 374228 usertrap_amd64.go:212] [ 795: 795] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.062881 374228 usertrap_amd64.go:122] [ 795: 795] Allocate a new trap: 0xc000bacff0 14 D0713 08:48:03.062963 374228 usertrap_amd64.go:225] [ 795: 795] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:03.063237 374228 task_exit.go:204] [ 795: 795] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.063433 374228 task_signals.go:204] [ 795: 800] Signal 795, PID: 800, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.063522 374228 task_signals.go:204] [ 795: 799] Signal 795, PID: 799, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.063550 374228 task_exit.go:204] [ 795: 795] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.063565 374228 task_signals.go:204] [ 795: 797] Signal 795, PID: 797, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.063652 374228 task_signals.go:204] [ 795: 796] Signal 795, PID: 796, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.063694 374228 task_exit.go:204] [ 795: 799] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.063812 374228 task_signals.go:204] [ 795: 798] Signal 795, PID: 798, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.063916 374228 task_exit.go:204] [ 795: 798] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.064066 374228 task_exit.go:204] [ 795: 800] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.064315 374228 task_exit.go:204] [ 795: 799] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.064387 374228 task_exit.go:204] [ 795: 799] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.064582 374228 task_exit.go:204] [ 795: 797] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.064743 374228 task_exit.go:204] [ 795: 797] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.064789 374228 task_exit.go:204] [ 795: 797] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.064874 374228 task_exit.go:204] [ 795: 796] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.065125 374228 task_exit.go:204] [ 795: 800] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.065214 374228 task_exit.go:204] [ 795: 800] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.065335 374228 task_exit.go:204] [ 795: 798] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.065386 374228 task_exit.go:204] [ 795: 798] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.071478 374228 task_exit.go:204] [ 795: 796] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.071580 374228 task_exit.go:204] [ 795: 796] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.071721 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.071928 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.071991 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.072021 374228 task_exit.go:204] [ 795: 795] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.074734 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.079944 374228 syscalls.go:262] [ 801: 801] Allocating stack with size of 8388608 bytes D0713 08:48:03.081016 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.082907 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.083122 374228 usertrap_amd64.go:106] [ 801: 801] Map a usertrap vma at 63000 D0713 08:48:03.083496 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 1 D0713 08:48:03.083620 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:03.084472 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.084525 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 2 D0713 08:48:03.084581 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:03.086034 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.086100 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 3 D0713 08:48:03.086145 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:03.096692 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.096810 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 4 D0713 08:48:03.096902 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:03.098719 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.098785 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 5 D0713 08:48:03.098848 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:03.099031 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.099086 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 6 D0713 08:48:03.099171 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:03.103374 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.103436 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 7 D0713 08:48:03.103484 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:03.104369 374228 usertrap_amd64.go:212] [ 801: 802] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.104427 374228 usertrap_amd64.go:122] [ 801: 802] Allocate a new trap: 0xc0013438f0 8 D0713 08:48:03.104489 374228 usertrap_amd64.go:225] [ 801: 802] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:03.105762 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.105836 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 9 D0713 08:48:03.105915 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:03.106159 374228 usertrap_amd64.go:212] [ 801: 802] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.106236 374228 usertrap_amd64.go:122] [ 801: 802] Allocate a new trap: 0xc0013438f0 10 D0713 08:48:03.106299 374228 usertrap_amd64.go:225] [ 801: 802] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:03.119435 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.119532 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 11 D0713 08:48:03.119607 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:03.120040 374228 usertrap_amd64.go:212] [ 801: 802] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.120120 374228 usertrap_amd64.go:122] [ 801: 802] Allocate a new trap: 0xc0013438f0 12 D0713 08:48:03.120191 374228 usertrap_amd64.go:225] [ 801: 802] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:03.120344 374228 usertrap_amd64.go:212] [ 801: 802] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.120389 374228 usertrap_amd64.go:122] [ 801: 802] Allocate a new trap: 0xc0013438f0 13 D0713 08:48:03.120494 374228 usertrap_amd64.go:225] [ 801: 802] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:03.120824 374228 task_signals.go:470] [ 801: 801] Notified of signal 23 D0713 08:48:03.121094 374228 task_signals.go:220] [ 801: 801] Signal 23: delivering to handler D0713 08:48:03.133926 374228 task_signals.go:470] [ 801: 801] Notified of signal 23 D0713 08:48:03.135661 374228 task_signals.go:220] [ 801: 801] Signal 23: delivering to handler D0713 08:48:03.136898 374228 usertrap_amd64.go:212] [ 801: 801] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.137024 374228 usertrap_amd64.go:122] [ 801: 801] Allocate a new trap: 0xc0013438f0 14 D0713 08:48:03.137114 374228 usertrap_amd64.go:225] [ 801: 801] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:03.137362 374228 task_exit.go:204] [ 801: 801] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.137496 374228 task_signals.go:204] [ 801: 802] Signal 801, PID: 802, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.137581 374228 task_signals.go:204] [ 801: 804] Signal 801, PID: 804, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.137577 374228 task_signals.go:204] [ 801: 803] Signal 801, PID: 803, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.137690 374228 task_signals.go:204] [ 801: 805] Signal 801, PID: 805, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.137806 374228 task_exit.go:204] [ 801: 802] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.137961 374228 task_exit.go:204] [ 801: 801] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.138110 374228 task_exit.go:204] [ 801: 804] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.138304 374228 task_exit.go:204] [ 801: 803] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.138509 374228 task_exit.go:204] [ 801: 805] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.138760 374228 task_exit.go:204] [ 801: 804] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.138847 374228 task_exit.go:204] [ 801: 804] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.139039 374228 task_exit.go:204] [ 801: 803] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.139115 374228 task_exit.go:204] [ 801: 803] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.139229 374228 task_exit.go:204] [ 801: 802] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.139283 374228 task_exit.go:204] [ 801: 802] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.143858 374228 task_exit.go:204] [ 801: 805] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.143940 374228 task_exit.go:204] [ 801: 805] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.144050 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.144202 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.144268 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.144358 374228 task_exit.go:204] [ 801: 801] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.147153 374228 task_stop.go:118] [ 7: 13] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.153486 374228 syscalls.go:262] [ 806: 806] Allocating stack with size of 8388608 bytes D0713 08:48:03.154342 374228 task_stop.go:138] [ 7: 13] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.155099 374228 task_signals.go:470] [ 7: 13] Notified of signal 23 D0713 08:48:03.155199 374228 task_signals.go:220] [ 7: 13] Signal 23: delivering to handler D0713 08:48:03.156501 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.156595 374228 usertrap_amd64.go:106] [ 806: 806] Map a usertrap vma at 66000 D0713 08:48:03.156807 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 1 D0713 08:48:03.156883 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:03.158001 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.158070 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 2 D0713 08:48:03.158144 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:03.159511 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.159570 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 3 D0713 08:48:03.159630 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:03.170296 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.170395 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 4 D0713 08:48:03.170460 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:03.172010 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.172102 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 5 D0713 08:48:03.172157 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:03.172312 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.172384 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 6 D0713 08:48:03.172439 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:03.176621 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.176693 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 7 D0713 08:48:03.176792 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:03.177496 374228 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.177611 374228 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc0008adf80 8 D0713 08:48:03.177685 374228 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:03.178310 374228 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.178368 374228 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc0008adf80 9 D0713 08:48:03.178575 374228 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:03.178750 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.178827 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 10 D0713 08:48:03.178920 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:03.192567 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.192656 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 11 D0713 08:48:03.192746 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:03.193014 374228 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.193105 374228 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc0008adf80 12 D0713 08:48:03.193226 374228 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:03.193375 374228 usertrap_amd64.go:212] [ 806: 807] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.193432 374228 usertrap_amd64.go:122] [ 806: 807] Allocate a new trap: 0xc0008adf80 13 D0713 08:48:03.193518 374228 usertrap_amd64.go:225] [ 806: 807] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:03.193821 374228 task_signals.go:470] [ 806: 806] Notified of signal 23 D0713 08:48:03.193922 374228 task_signals.go:220] [ 806: 806] Signal 23: delivering to handler D0713 08:48:03.205427 374228 task_signals.go:470] [ 806: 806] Notified of signal 23 D0713 08:48:03.205576 374228 task_signals.go:220] [ 806: 806] Signal 23: delivering to handler D0713 08:48:03.209401 374228 usertrap_amd64.go:212] [ 806: 806] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.209518 374228 usertrap_amd64.go:122] [ 806: 806] Allocate a new trap: 0xc0008adf80 14 D0713 08:48:03.209634 374228 usertrap_amd64.go:225] [ 806: 806] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:03.209901 374228 task_exit.go:204] [ 806: 806] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.210203 374228 task_signals.go:204] [ 806: 808] Signal 806, PID: 808, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.210257 374228 task_exit.go:204] [ 806: 806] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.210420 374228 task_signals.go:204] [ 806: 807] Signal 806, PID: 807, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.210406 374228 task_signals.go:204] [ 806: 810] Signal 806, PID: 810, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.210523 374228 task_exit.go:204] [ 806: 808] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.210756 374228 task_signals.go:204] [ 806: 809] Signal 806, PID: 809, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.210832 374228 task_exit.go:204] [ 806: 807] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.210959 374228 task_exit.go:204] [ 806: 809] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.211174 374228 task_exit.go:204] [ 806: 809] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.211245 374228 task_exit.go:204] [ 806: 809] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.211422 374228 task_exit.go:204] [ 806: 810] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.211622 374228 task_exit.go:204] [ 806: 808] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.211706 374228 task_exit.go:204] [ 806: 808] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.211902 374228 task_exit.go:204] [ 806: 807] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.211965 374228 task_exit.go:204] [ 806: 807] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.217459 374228 task_exit.go:204] [ 806: 810] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.217515 374228 task_exit.go:204] [ 806: 810] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.217593 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.217803 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.217841 374228 task_exit.go:204] [ 806: 806] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.217909 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.220648 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.227923 374228 syscalls.go:262] [ 811: 811] Allocating stack with size of 8388608 bytes D0713 08:48:03.228761 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.229232 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:03.229332 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:03.231190 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.231300 374228 usertrap_amd64.go:106] [ 811: 811] Map a usertrap vma at 64000 D0713 08:48:03.231600 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 1 D0713 08:48:03.231738 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:03.232596 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.232650 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 2 D0713 08:48:03.232697 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:03.234452 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.234554 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 3 D0713 08:48:03.234640 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:03.245474 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.245546 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 4 D0713 08:48:03.245654 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:03.247402 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.247464 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 5 D0713 08:48:03.247554 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:03.247736 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.247785 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 6 D0713 08:48:03.247852 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:03.253331 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.253384 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 7 D0713 08:48:03.253466 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:03.254095 374228 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.254157 374228 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc00077cc00 8 D0713 08:48:03.254246 374228 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:03.255160 374228 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.255237 374228 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc00077cc00 9 D0713 08:48:03.255314 374228 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:03.255572 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.255707 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 10 D0713 08:48:03.255835 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:03.258011 374228 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.258083 374228 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc00077cc00 11 D0713 08:48:03.258185 374228 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:03.258755 374228 usertrap_amd64.go:212] [ 811: 812] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.258793 374228 usertrap_amd64.go:122] [ 811: 812] Allocate a new trap: 0xc00077cc00 12 D0713 08:48:03.258853 374228 usertrap_amd64.go:225] [ 811: 812] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:03.259183 374228 task_signals.go:470] [ 811: 811] Notified of signal 23 D0713 08:48:03.259269 374228 task_signals.go:220] [ 811: 811] Signal 23: delivering to handler D0713 08:48:03.270522 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.270573 374228 task_signals.go:470] [ 811: 811] Notified of signal 23 D0713 08:48:03.270598 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 13 D0713 08:48:03.270672 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:03.270755 374228 task_signals.go:220] [ 811: 811] Signal 23: delivering to handler D0713 08:48:03.271317 374228 task_signals.go:470] [ 811: 811] Notified of signal 23 D0713 08:48:03.271495 374228 task_signals.go:220] [ 811: 811] Signal 23: delivering to handler D0713 08:48:03.271893 374228 task_signals.go:470] [ 811: 811] Notified of signal 23 D0713 08:48:03.271977 374228 task_signals.go:220] [ 811: 811] Signal 23: delivering to handler D0713 08:48:03.283765 374228 task_signals.go:470] [ 811: 811] Notified of signal 23 D0713 08:48:03.283909 374228 task_signals.go:220] [ 811: 811] Signal 23: delivering to handler D0713 08:48:03.288499 374228 usertrap_amd64.go:212] [ 811: 811] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.288584 374228 usertrap_amd64.go:122] [ 811: 811] Allocate a new trap: 0xc00077cc00 14 D0713 08:48:03.288654 374228 usertrap_amd64.go:225] [ 811: 811] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:03.288862 374228 task_exit.go:204] [ 811: 811] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.289042 374228 task_signals.go:204] [ 811: 815] Signal 811, PID: 815, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.289085 374228 task_exit.go:204] [ 811: 811] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.289103 374228 task_signals.go:204] [ 811: 816] Signal 811, PID: 816, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.289206 374228 task_signals.go:204] [ 811: 814] Signal 811, PID: 814, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.289247 374228 task_signals.go:204] [ 811: 812] Signal 811, PID: 812, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.289269 374228 task_exit.go:204] [ 811: 816] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.289391 374228 task_exit.go:204] [ 811: 815] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.289559 374228 task_signals.go:204] [ 811: 813] Signal 811, PID: 813, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.289616 374228 task_exit.go:204] [ 811: 815] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.289689 374228 task_exit.go:204] [ 811: 815] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.289859 374228 task_exit.go:204] [ 811: 816] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.289905 374228 task_exit.go:204] [ 811: 816] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.290033 374228 task_exit.go:204] [ 811: 813] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.290165 374228 task_exit.go:204] [ 811: 814] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.290323 374228 task_exit.go:204] [ 811: 812] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.290703 374228 task_exit.go:204] [ 811: 814] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.290767 374228 task_exit.go:204] [ 811: 814] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.290895 374228 task_exit.go:204] [ 811: 813] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.290944 374228 task_exit.go:204] [ 811: 813] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.295938 374228 task_exit.go:204] [ 811: 812] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.296033 374228 task_exit.go:204] [ 811: 812] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.296147 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.296366 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.296425 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.296923 374228 task_exit.go:204] [ 811: 811] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.300303 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.305210 374228 syscalls.go:262] [ 817: 817] Allocating stack with size of 8388608 bytes D0713 08:48:03.305868 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.307173 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:03.307438 374228 task_signals.go:179] [ 7: 14] Restarting syscall 202: interrupted by signal 23 D0713 08:48:03.307522 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:03.310204 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.310336 374228 usertrap_amd64.go:106] [ 817: 817] Map a usertrap vma at 68000 D0713 08:48:03.310601 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 1 D0713 08:48:03.310698 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:48:03.311486 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.311528 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 2 D0713 08:48:03.311613 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:48:03.313815 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.313880 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 3 D0713 08:48:03.313932 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:48:03.323572 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.323633 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 4 D0713 08:48:03.323707 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:48:03.325271 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.325324 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 5 D0713 08:48:03.325385 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:48:03.325534 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.325594 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 6 D0713 08:48:03.325642 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:48:03.329264 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.329307 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 7 D0713 08:48:03.329371 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:48:03.330203 374228 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.330306 374228 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc001989b30 8 D0713 08:48:03.330431 374228 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:48:03.331308 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.331436 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 9 D0713 08:48:03.331684 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:48:03.331992 374228 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.332061 374228 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc001989b30 10 D0713 08:48:03.332156 374228 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:48:03.344038 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.344112 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 11 D0713 08:48:03.344192 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:48:03.344445 374228 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.344499 374228 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc001989b30 12 D0713 08:48:03.344576 374228 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:48:03.344723 374228 usertrap_amd64.go:212] [ 817: 818] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.344775 374228 usertrap_amd64.go:122] [ 817: 818] Allocate a new trap: 0xc001989b30 13 D0713 08:48:03.344824 374228 usertrap_amd64.go:225] [ 817: 818] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:48:03.345046 374228 task_signals.go:470] [ 817: 817] Notified of signal 23 D0713 08:48:03.345157 374228 task_signals.go:220] [ 817: 817] Signal 23: delivering to handler D0713 08:48:03.357077 374228 task_signals.go:470] [ 817: 817] Notified of signal 23 D0713 08:48:03.358452 374228 task_signals.go:220] [ 817: 817] Signal 23: delivering to handler D0713 08:48:03.359942 374228 usertrap_amd64.go:212] [ 817: 817] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.360013 374228 usertrap_amd64.go:122] [ 817: 817] Allocate a new trap: 0xc001989b30 14 D0713 08:48:03.360126 374228 usertrap_amd64.go:225] [ 817: 817] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:48:03.360361 374228 task_exit.go:204] [ 817: 817] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.360490 374228 task_signals.go:204] [ 817: 820] Signal 817, PID: 820, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.360563 374228 task_signals.go:204] [ 817: 821] Signal 817, PID: 821, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.360586 374228 task_signals.go:204] [ 817: 818] Signal 817, PID: 818, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.360674 374228 task_signals.go:204] [ 817: 819] Signal 817, PID: 819, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.360725 374228 task_exit.go:204] [ 817: 821] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.360844 374228 task_signals.go:204] [ 817: 822] Signal 817, PID: 822, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.360902 374228 task_exit.go:204] [ 817: 819] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.361151 374228 task_exit.go:204] [ 817: 819] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.361202 374228 task_exit.go:204] [ 817: 819] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.361358 374228 task_exit.go:204] [ 817: 820] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.361532 374228 task_exit.go:204] [ 817: 820] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.361590 374228 task_exit.go:204] [ 817: 820] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.361700 374228 task_exit.go:204] [ 817: 817] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.361827 374228 task_exit.go:204] [ 817: 818] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.361986 374228 task_exit.go:204] [ 817: 818] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.362025 374228 task_exit.go:204] [ 817: 818] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.362123 374228 task_exit.go:204] [ 817: 822] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.362331 374228 task_exit.go:204] [ 817: 821] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.362382 374228 task_exit.go:204] [ 817: 821] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.367395 374228 task_exit.go:204] [ 817: 822] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.367497 374228 task_exit.go:204] [ 817: 822] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.367613 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.367845 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.367956 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.367953 374228 task_exit.go:204] [ 817: 817] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.369375 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:03.369522 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:03.370590 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.374560 374228 syscalls.go:262] [ 823: 823] Allocating stack with size of 8388608 bytes D0713 08:48:03.375106 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.377100 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.377207 374228 usertrap_amd64.go:106] [ 823: 823] Map a usertrap vma at 67000 D0713 08:48:03.377445 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 1 D0713 08:48:03.377559 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:03.378461 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.378530 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 2 D0713 08:48:03.378585 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:03.379881 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.379923 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 3 D0713 08:48:03.379965 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:03.389269 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.389411 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 4 D0713 08:48:03.389517 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:03.391273 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.391350 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 5 D0713 08:48:03.391439 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:03.391636 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.391694 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 6 D0713 08:48:03.391750 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:03.395199 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.395301 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 7 D0713 08:48:03.395353 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:03.396168 374228 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.396241 374228 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc00047ad20 8 D0713 08:48:03.396339 374228 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:03.397403 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.397478 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 9 D0713 08:48:03.397637 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:03.398055 374228 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.398166 374228 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc00047ad20 10 D0713 08:48:03.398267 374228 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:03.426843 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.427091 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 11 D0713 08:48:03.427185 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:03.438067 374228 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.438169 374228 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc00047ad20 12 D0713 08:48:03.438282 374228 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:03.438443 374228 usertrap_amd64.go:212] [ 823: 824] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.438471 374228 usertrap_amd64.go:122] [ 823: 824] Allocate a new trap: 0xc00047ad20 13 D0713 08:48:03.438512 374228 usertrap_amd64.go:225] [ 823: 824] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:03.438704 374228 task_signals.go:470] [ 823: 823] Notified of signal 23 D0713 08:48:03.438860 374228 task_signals.go:220] [ 823: 823] Signal 23: delivering to handler D0713 08:48:03.443824 374228 usertrap_amd64.go:212] [ 823: 823] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.443918 374228 usertrap_amd64.go:122] [ 823: 823] Allocate a new trap: 0xc00047ad20 14 D0713 08:48:03.443977 374228 usertrap_amd64.go:225] [ 823: 823] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:03.444271 374228 task_exit.go:204] [ 823: 823] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.444503 374228 task_exit.go:204] [ 823: 823] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.444546 374228 task_signals.go:204] [ 823: 826] Signal 823, PID: 826, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.444677 374228 task_signals.go:204] [ 823: 824] Signal 823, PID: 824, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.444772 374228 task_exit.go:204] [ 823: 826] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.444768 374228 task_signals.go:204] [ 823: 825] Signal 823, PID: 825, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.444971 374228 task_exit.go:204] [ 823: 826] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.445061 374228 task_exit.go:204] [ 823: 826] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.445224 374228 task_exit.go:204] [ 823: 824] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.445244 374228 task_signals.go:204] [ 823: 827] Signal 823, PID: 827, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.445341 374228 task_exit.go:204] [ 823: 827] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.445521 374228 task_exit.go:204] [ 823: 827] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.445571 374228 task_exit.go:204] [ 823: 827] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.445843 374228 task_exit.go:204] [ 823: 824] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.445931 374228 task_exit.go:204] [ 823: 824] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.446077 374228 task_exit.go:204] [ 823: 825] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.451668 374228 task_exit.go:204] [ 823: 825] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.451745 374228 task_exit.go:204] [ 823: 825] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.452057 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.452435 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.452557 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.453064 374228 task_exit.go:204] [ 823: 823] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.458111 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.462674 374228 task_signals.go:481] [ 7: 11] No task notified of signal 23 D0713 08:48:03.462914 374228 syscalls.go:262] [ 828: 828] Allocating stack with size of 8388608 bytes D0713 08:48:03.463775 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.464218 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:03.466267 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.466406 374228 usertrap_amd64.go:106] [ 828: 828] Map a usertrap vma at 6a000 D0713 08:48:03.466658 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 1 D0713 08:48:03.466767 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:03.467605 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.467690 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 2 D0713 08:48:03.467744 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:03.469118 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.469183 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 3 D0713 08:48:03.469260 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:03.482261 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.482367 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 4 D0713 08:48:03.482445 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:03.484331 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.484469 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 5 D0713 08:48:03.484598 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:03.484859 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.484922 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 6 D0713 08:48:03.485140 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:03.496204 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.496319 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 7 D0713 08:48:03.496382 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:03.497332 374228 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.497463 374228 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc001696510 8 D0713 08:48:03.497545 374228 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:03.498740 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.498814 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 9 D0713 08:48:03.498900 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:03.499130 374228 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.499169 374228 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc001696510 10 D0713 08:48:03.499263 374228 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:03.510364 374228 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.510516 374228 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc001696510 11 D0713 08:48:03.510677 374228 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:03.510957 374228 usertrap_amd64.go:212] [ 828: 829] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.511043 374228 usertrap_amd64.go:122] [ 828: 829] Allocate a new trap: 0xc001696510 12 D0713 08:48:03.511117 374228 usertrap_amd64.go:225] [ 828: 829] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:03.511326 374228 task_signals.go:470] [ 828: 828] Notified of signal 23 D0713 08:48:03.514127 374228 task_signals.go:220] [ 828: 828] Signal 23: delivering to handler D0713 08:48:03.515080 374228 task_signals.go:470] [ 828: 828] Notified of signal 23 D0713 08:48:03.515439 374228 task_signals.go:220] [ 828: 828] Signal 23: delivering to handler D0713 08:48:03.518990 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.519054 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 13 D0713 08:48:03.519154 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:03.527525 374228 task_signals.go:470] [ 828: 828] Notified of signal 23 D0713 08:48:03.527982 374228 task_signals.go:220] [ 828: 828] Signal 23: delivering to handler I0713 08:48:03.537805 374228 compat.go:120] Unsupported syscall sys_442(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_442 for more information. D0713 08:48:03.538052 374228 usertrap_amd64.go:212] [ 828: 828] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.538112 374228 usertrap_amd64.go:122] [ 828: 828] Allocate a new trap: 0xc001696510 14 D0713 08:48:03.538194 374228 usertrap_amd64.go:225] [ 828: 828] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:03.538564 374228 task_exit.go:204] [ 828: 828] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.538743 374228 task_signals.go:204] [ 828: 831] Signal 828, PID: 831, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.538840 374228 task_signals.go:204] [ 828: 829] Signal 828, PID: 829, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.538843 374228 task_signals.go:204] [ 828: 832] Signal 828, PID: 832, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.538902 374228 task_exit.go:204] [ 828: 828] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.539020 374228 task_signals.go:204] [ 828: 830] Signal 828, PID: 830, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.539071 374228 task_exit.go:204] [ 828: 831] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.539233 374228 task_exit.go:204] [ 828: 829] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.539423 374228 task_exit.go:204] [ 828: 829] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.539510 374228 task_exit.go:204] [ 828: 829] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.539663 374228 task_exit.go:204] [ 828: 830] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.539843 374228 task_exit.go:204] [ 828: 830] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.539891 374228 task_exit.go:204] [ 828: 830] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.540009 374228 task_exit.go:204] [ 828: 832] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.540223 374228 task_exit.go:204] [ 828: 831] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.540315 374228 task_exit.go:204] [ 828: 831] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.546443 374228 task_exit.go:204] [ 828: 832] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.546506 374228 task_exit.go:204] [ 828: 832] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.546614 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.547083 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.547221 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.547679 374228 task_exit.go:204] [ 828: 828] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.549946 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.555302 374228 syscalls.go:262] [ 833: 833] Allocating stack with size of 8388608 bytes D0713 08:48:03.555947 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.565196 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.565315 374228 usertrap_amd64.go:106] [ 833: 833] Map a usertrap vma at 69000 D0713 08:48:03.565651 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 1 D0713 08:48:03.565753 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:03.566529 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.566574 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 2 D0713 08:48:03.566629 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:03.567827 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.567876 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 3 D0713 08:48:03.567930 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:03.578071 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.578233 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 4 D0713 08:48:03.578368 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:03.579898 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.579980 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 5 D0713 08:48:03.580045 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:03.580212 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.580260 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 6 D0713 08:48:03.580316 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:03.584008 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.584072 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 7 D0713 08:48:03.584128 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:03.584822 374228 usertrap_amd64.go:212] [ 833: 834] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.584925 374228 usertrap_amd64.go:122] [ 833: 834] Allocate a new trap: 0xc00047b2f0 8 D0713 08:48:03.585077 374228 usertrap_amd64.go:225] [ 833: 834] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:03.585973 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.586027 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 9 D0713 08:48:03.586088 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:03.586269 374228 usertrap_amd64.go:212] [ 833: 834] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.586368 374228 usertrap_amd64.go:122] [ 833: 834] Allocate a new trap: 0xc00047b2f0 10 D0713 08:48:03.586469 374228 usertrap_amd64.go:225] [ 833: 834] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:03.597846 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.597926 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 11 D0713 08:48:03.598012 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:03.598209 374228 usertrap_amd64.go:212] [ 833: 834] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.598310 374228 usertrap_amd64.go:122] [ 833: 834] Allocate a new trap: 0xc00047b2f0 12 D0713 08:48:03.598393 374228 usertrap_amd64.go:225] [ 833: 834] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:03.598591 374228 usertrap_amd64.go:212] [ 833: 834] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.598668 374228 usertrap_amd64.go:122] [ 833: 834] Allocate a new trap: 0xc00047b2f0 13 D0713 08:48:03.598787 374228 usertrap_amd64.go:225] [ 833: 834] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:03.598995 374228 task_signals.go:470] [ 833: 833] Notified of signal 23 D0713 08:48:03.599097 374228 task_signals.go:220] [ 833: 833] Signal 23: delivering to handler D0713 08:48:03.610021 374228 task_signals.go:470] [ 833: 833] Notified of signal 23 D0713 08:48:03.610386 374228 task_signals.go:220] [ 833: 833] Signal 23: delivering to handler I0713 08:48:03.614093 374228 compat.go:120] Unsupported syscall move_mount(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_mount for more information. D0713 08:48:03.614348 374228 usertrap_amd64.go:212] [ 833: 833] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.614411 374228 usertrap_amd64.go:122] [ 833: 833] Allocate a new trap: 0xc00047b2f0 14 D0713 08:48:03.614486 374228 usertrap_amd64.go:225] [ 833: 833] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:03.614722 374228 task_exit.go:204] [ 833: 833] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.614856 374228 task_signals.go:204] [ 833: 837] Signal 833, PID: 837, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.614932 374228 task_exit.go:204] [ 833: 833] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.615066 374228 task_signals.go:204] [ 833: 836] Signal 833, PID: 836, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.615166 374228 task_exit.go:204] [ 833: 836] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.615156 374228 task_signals.go:204] [ 833: 835] Signal 833, PID: 835, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.615029 374228 task_signals.go:204] [ 833: 834] Signal 833, PID: 834, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.615250 374228 task_exit.go:204] [ 833: 835] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.615436 374228 task_exit.go:204] [ 833: 835] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.615515 374228 task_exit.go:204] [ 833: 835] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.615616 374228 task_exit.go:204] [ 833: 837] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.615739 374228 task_exit.go:204] [ 833: 834] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.615964 374228 task_exit.go:204] [ 833: 836] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.616036 374228 task_exit.go:204] [ 833: 836] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.616171 374228 task_exit.go:204] [ 833: 837] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.616251 374228 task_exit.go:204] [ 833: 837] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.621625 374228 task_exit.go:204] [ 833: 834] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.621833 374228 task_exit.go:204] [ 833: 834] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.621939 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.622103 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.622193 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.622245 374228 task_exit.go:204] [ 833: 833] Transitioning from exit state TaskExitZombie to TaskExitDead executing program D0713 08:48:03.625072 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.630673 374228 syscalls.go:262] [ 838: 838] Allocating stack with size of 8388608 bytes D0713 08:48:03.631331 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.633440 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.633541 374228 usertrap_amd64.go:106] [ 838: 838] Map a usertrap vma at 66000 D0713 08:48:03.633793 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 1 D0713 08:48:03.633911 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:03.634631 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.634696 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 2 D0713 08:48:03.634763 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:03.635933 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.635998 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 3 D0713 08:48:03.636054 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:03.645746 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.645827 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 4 D0713 08:48:03.645985 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:03.647744 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.647811 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 5 D0713 08:48:03.647887 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:03.648116 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.648174 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 6 D0713 08:48:03.648257 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:03.652000 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.652068 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 7 D0713 08:48:03.652129 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:03.653029 374228 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.653137 374228 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc00077dc50 8 D0713 08:48:03.653260 374228 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:03.653863 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.653919 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 9 D0713 08:48:03.654068 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:03.655441 374228 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.655496 374228 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc00077dc50 10 D0713 08:48:03.655593 374228 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:03.666059 374228 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.666169 374228 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc00077dc50 11 D0713 08:48:03.666222 374228 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:03.666346 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.666456 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 12 D0713 08:48:03.666520 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46af29 trap addr 663c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:03.666738 374228 usertrap_amd64.go:212] [ 838: 839] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.666798 374228 usertrap_amd64.go:122] [ 838: 839] Allocate a new trap: 0xc00077dc50 13 D0713 08:48:03.666888 374228 usertrap_amd64.go:225] [ 838: 839] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:03.667044 374228 task_signals.go:470] [ 838: 838] Notified of signal 23 D0713 08:48:03.667161 374228 task_signals.go:179] [ 838: 838] Restarting syscall 202: interrupted by signal 23 D0713 08:48:03.667231 374228 task_signals.go:220] [ 838: 838] Signal 23: delivering to handler D0713 08:48:03.679742 374228 task_signals.go:470] [ 838: 838] Notified of signal 23 D0713 08:48:03.680258 374228 task_signals.go:220] [ 838: 838] Signal 23: delivering to handler I0713 08:48:03.681190 374228 compat.go:120] Unsupported syscall move_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/move_pages for more information. D0713 08:48:03.681365 374228 usertrap_amd64.go:212] [ 838: 838] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.681436 374228 usertrap_amd64.go:122] [ 838: 838] Allocate a new trap: 0xc00077dc50 14 D0713 08:48:03.681511 374228 usertrap_amd64.go:225] [ 838: 838] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:03.681738 374228 task_exit.go:204] [ 838: 838] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.681885 374228 task_signals.go:204] [ 838: 841] Signal 838, PID: 841, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.681946 374228 task_exit.go:204] [ 838: 838] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.681892 374228 task_signals.go:204] [ 838: 842] Signal 838, PID: 842, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.682036 374228 task_signals.go:204] [ 838: 840] Signal 838, PID: 840, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.682046 374228 task_exit.go:204] [ 838: 841] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.682249 374228 task_signals.go:204] [ 838: 839] Signal 838, PID: 839, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.682295 374228 task_exit.go:204] [ 838: 841] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.682377 374228 task_exit.go:204] [ 838: 841] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.682535 374228 task_exit.go:204] [ 838: 840] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.682700 374228 task_exit.go:204] [ 838: 839] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.682903 374228 task_exit.go:204] [ 838: 839] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.682990 374228 task_exit.go:204] [ 838: 839] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.683109 374228 task_exit.go:204] [ 838: 842] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.683494 374228 task_exit.go:204] [ 838: 840] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.683578 374228 task_exit.go:204] [ 838: 840] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.689318 374228 task_exit.go:204] [ 838: 842] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.689461 374228 task_exit.go:204] [ 838: 842] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.689558 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.689776 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.689875 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.690248 374228 task_exit.go:204] [ 838: 838] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.693044 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.699166 374228 syscalls.go:262] [ 843: 843] Allocating stack with size of 8388608 bytes D0713 08:48:03.700034 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.700649 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:03.700851 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:03.701258 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:03.701555 374228 task_signals.go:179] [ 7: 11] Restarting syscall 202: interrupted by signal 23 D0713 08:48:03.701616 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:03.702264 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.702377 374228 usertrap_amd64.go:106] [ 843: 843] Map a usertrap vma at 61000 D0713 08:48:03.702638 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 1 D0713 08:48:03.702760 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:03.703679 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.703727 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 2 D0713 08:48:03.703801 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:03.705114 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.705163 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 3 D0713 08:48:03.705214 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:03.714883 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.714988 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 4 D0713 08:48:03.715043 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:03.716828 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.716904 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 5 D0713 08:48:03.717024 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:03.717226 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.717279 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 6 D0713 08:48:03.717359 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:03.722411 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.722484 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 7 D0713 08:48:03.722565 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:03.723776 374228 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.723874 374228 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc0010d9ec0 8 D0713 08:48:03.724032 374228 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:03.724251 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.724324 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 9 D0713 08:48:03.724381 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:03.724972 374228 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.725118 374228 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc0010d9ec0 10 D0713 08:48:03.725238 374228 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:03.736748 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.736850 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 11 D0713 08:48:03.736930 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:03.739272 374228 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.739458 374228 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc0010d9ec0 12 D0713 08:48:03.739560 374228 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:03.739792 374228 usertrap_amd64.go:212] [ 843: 844] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.739874 374228 usertrap_amd64.go:122] [ 843: 844] Allocate a new trap: 0xc0010d9ec0 13 D0713 08:48:03.739937 374228 usertrap_amd64.go:225] [ 843: 844] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:03.740210 374228 task_signals.go:470] [ 843: 843] Notified of signal 23 D0713 08:48:03.740497 374228 task_signals.go:179] [ 843: 843] Restarting syscall 202: interrupted by signal 23 D0713 08:48:03.740610 374228 task_signals.go:220] [ 843: 843] Signal 23: delivering to handler D0713 08:48:03.756827 374228 usertrap_amd64.go:212] [ 843: 843] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.756985 374228 usertrap_amd64.go:122] [ 843: 843] Allocate a new trap: 0xc0010d9ec0 14 D0713 08:48:03.757086 374228 usertrap_amd64.go:225] [ 843: 843] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:03.757286 374228 task_exit.go:204] [ 843: 843] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.757449 374228 task_signals.go:204] [ 843: 844] Signal 843, PID: 844, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.757547 374228 task_exit.go:204] [ 843: 843] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.757530 374228 task_signals.go:204] [ 843: 845] Signal 843, PID: 845, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.757732 374228 task_signals.go:204] [ 843: 846] Signal 843, PID: 846, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.757748 374228 task_exit.go:204] [ 843: 844] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.758070 374228 task_signals.go:204] [ 843: 847] Signal 843, PID: 847, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.758098 374228 task_exit.go:204] [ 843: 844] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.758189 374228 task_exit.go:204] [ 843: 844] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.758333 374228 task_exit.go:204] [ 843: 845] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.758524 374228 task_exit.go:204] [ 843: 846] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.758671 374228 task_exit.go:204] [ 843: 847] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.758992 374228 task_exit.go:204] [ 843: 847] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.759049 374228 task_exit.go:204] [ 843: 847] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.759158 374228 task_exit.go:204] [ 843: 845] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.759235 374228 task_exit.go:204] [ 843: 845] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.765150 374228 task_exit.go:204] [ 843: 846] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.765225 374228 task_exit.go:204] [ 843: 846] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.765349 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.765712 374228 task_exit.go:204] [ 843: 843] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.765750 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.765883 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.768323 374228 task_stop.go:118] [ 7: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.773825 374228 syscalls.go:262] [ 848: 848] Allocating stack with size of 8388608 bytes D0713 08:48:03.774627 374228 task_stop.go:138] [ 7: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.776865 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.777034 374228 usertrap_amd64.go:106] [ 848: 848] Map a usertrap vma at 68000 D0713 08:48:03.777276 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 1 D0713 08:48:03.777389 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:48:03.778181 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.778250 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 2 D0713 08:48:03.778310 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:48:03.779588 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.779654 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 3 D0713 08:48:03.779720 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:48:03.789150 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.789244 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 4 D0713 08:48:03.789320 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:48:03.790946 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.791014 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 5 D0713 08:48:03.791072 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:48:03.791212 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.791250 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 6 D0713 08:48:03.791289 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:48:03.795525 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.795616 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 7 D0713 08:48:03.795674 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:48:03.796674 374228 usertrap_amd64.go:212] [ 848: 849] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.796771 374228 usertrap_amd64.go:122] [ 848: 849] Allocate a new trap: 0xc000048e70 8 D0713 08:48:03.796847 374228 usertrap_amd64.go:225] [ 848: 849] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:48:03.797378 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.797487 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 9 D0713 08:48:03.797697 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:48:03.797890 374228 usertrap_amd64.go:212] [ 848: 849] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.797945 374228 usertrap_amd64.go:122] [ 848: 849] Allocate a new trap: 0xc000048e70 10 D0713 08:48:03.798066 374228 usertrap_amd64.go:225] [ 848: 849] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:48:03.808854 374228 usertrap_amd64.go:212] [ 848: 849] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.808979 374228 usertrap_amd64.go:122] [ 848: 849] Allocate a new trap: 0xc000048e70 11 D0713 08:48:03.809071 374228 usertrap_amd64.go:225] [ 848: 849] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:48:03.809252 374228 usertrap_amd64.go:212] [ 848: 849] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.809328 374228 usertrap_amd64.go:122] [ 848: 849] Allocate a new trap: 0xc000048e70 12 D0713 08:48:03.809420 374228 usertrap_amd64.go:225] [ 848: 849] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:48:03.809609 374228 task_signals.go:470] [ 848: 848] Notified of signal 23 D0713 08:48:03.809990 374228 task_signals.go:220] [ 848: 848] Signal 23: delivering to handler D0713 08:48:03.814095 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.814186 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 13 D0713 08:48:03.814253 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:48:03.820447 374228 task_signals.go:470] [ 848: 848] Notified of signal 23 D0713 08:48:03.820595 374228 task_signals.go:220] [ 848: 848] Signal 23: delivering to handler I0713 08:48:03.835179 374228 compat.go:120] Unsupported syscall mq_getsetattr(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_getsetattr for more information. D0713 08:48:03.835391 374228 usertrap_amd64.go:212] [ 848: 848] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.835448 374228 usertrap_amd64.go:122] [ 848: 848] Allocate a new trap: 0xc000048e70 14 D0713 08:48:03.835498 374228 usertrap_amd64.go:225] [ 848: 848] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:48:03.835708 374228 task_exit.go:204] [ 848: 848] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.835922 374228 task_signals.go:204] [ 848: 851] Signal 848, PID: 851, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.835915 374228 task_signals.go:204] [ 848: 849] Signal 848, PID: 849, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.836033 374228 task_signals.go:204] [ 848: 853] Signal 848, PID: 853, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.836048 374228 task_signals.go:204] [ 848: 850] Signal 848, PID: 850, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.836164 374228 task_exit.go:204] [ 848: 851] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.836358 374228 task_signals.go:204] [ 848: 852] Signal 848, PID: 852, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.836470 374228 task_exit.go:204] [ 848: 852] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.836618 374228 task_exit.go:204] [ 848: 852] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.836677 374228 task_exit.go:204] [ 848: 852] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.836868 374228 task_exit.go:204] [ 848: 848] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.837176 374228 task_exit.go:204] [ 848: 849] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.837374 374228 task_exit.go:204] [ 848: 853] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.837531 374228 task_exit.go:204] [ 848: 850] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.837619 374228 task_exit.go:204] [ 848: 851] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.837715 374228 task_exit.go:204] [ 848: 851] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.838121 374228 task_exit.go:204] [ 848: 850] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.838177 374228 task_exit.go:204] [ 848: 850] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.838359 374228 task_exit.go:204] [ 848: 849] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.838457 374228 task_exit.go:204] [ 848: 849] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.843369 374228 task_exit.go:204] [ 848: 853] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.843435 374228 task_exit.go:204] [ 848: 853] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.843542 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.843676 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.843724 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.844432 374228 task_exit.go:204] [ 848: 848] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.847056 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.852820 374228 syscalls.go:262] [ 854: 854] Allocating stack with size of 8388608 bytes D0713 08:48:03.853778 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.854604 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:03.854837 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:03.856110 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.856248 374228 usertrap_amd64.go:106] [ 854: 854] Map a usertrap vma at 67000 D0713 08:48:03.856530 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 1 D0713 08:48:03.856663 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:03.857672 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.857734 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 2 D0713 08:48:03.857837 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:03.859066 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.859122 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 3 D0713 08:48:03.859166 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:03.868272 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.868334 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 4 D0713 08:48:03.868399 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:03.869919 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.870005 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 5 D0713 08:48:03.870086 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:03.870273 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.870328 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 6 D0713 08:48:03.870381 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:03.874807 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.874870 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 7 D0713 08:48:03.874938 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:03.875714 374228 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.875811 374228 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc0003c38f0 8 D0713 08:48:03.875892 374228 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:03.876814 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.876885 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 9 D0713 08:48:03.876967 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:03.877364 374228 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.877433 374228 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc0003c38f0 10 D0713 08:48:03.877558 374228 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:03.888793 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.888855 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 11 D0713 08:48:03.888930 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:03.892801 374228 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.892896 374228 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc0003c38f0 12 D0713 08:48:03.893000 374228 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:03.893189 374228 usertrap_amd64.go:212] [ 854: 855] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.893240 374228 usertrap_amd64.go:122] [ 854: 855] Allocate a new trap: 0xc0003c38f0 13 D0713 08:48:03.893304 374228 usertrap_amd64.go:225] [ 854: 855] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:03.893577 374228 task_signals.go:470] [ 854: 854] Notified of signal 23 D0713 08:48:03.893834 374228 task_signals.go:220] [ 854: 854] Signal 23: delivering to handler I0713 08:48:03.903397 374228 compat.go:120] Unsupported syscall mq_notify(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_notify for more information. D0713 08:48:03.904400 374228 usertrap_amd64.go:212] [ 854: 854] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.904472 374228 usertrap_amd64.go:122] [ 854: 854] Allocate a new trap: 0xc0003c38f0 14 D0713 08:48:03.904545 374228 usertrap_amd64.go:225] [ 854: 854] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:03.904820 374228 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.905044 374228 task_signals.go:204] [ 854: 855] Signal 854, PID: 855, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.905092 374228 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.905270 374228 task_signals.go:204] [ 854: 856] Signal 854, PID: 856, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.905285 374228 task_signals.go:204] [ 854: 858] Signal 854, PID: 858, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.905283 374228 task_signals.go:204] [ 854: 857] Signal 854, PID: 857, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.905313 374228 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.905521 374228 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.905591 374228 task_exit.go:204] [ 854: 855] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.905720 374228 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.905930 374228 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.906080 374228 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.906352 374228 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.906435 374228 task_exit.go:204] [ 854: 856] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.906633 374228 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.906690 374228 task_exit.go:204] [ 854: 857] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.912251 374228 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.912329 374228 task_exit.go:204] [ 854: 858] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.912462 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.912730 374228 task_exit.go:204] [ 854: 854] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.912708 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.912878 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.915202 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.919197 374228 syscalls.go:262] [ 859: 859] Allocating stack with size of 8388608 bytes D0713 08:48:03.919841 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.921624 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.921706 374228 usertrap_amd64.go:106] [ 859: 859] Map a usertrap vma at 65000 D0713 08:48:03.921935 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 1 D0713 08:48:03.922035 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:48:03.922683 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.922726 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 2 D0713 08:48:03.922811 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:48:03.923806 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.923850 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 3 D0713 08:48:03.923912 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:48:03.933103 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:03.933171 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 4 D0713 08:48:03.933241 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:48:03.934523 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:03.934578 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 5 D0713 08:48:03.934666 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:48:03.937676 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b214:sysno 13 D0713 08:48:03.937729 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 6 D0713 08:48:03.937795 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:48:03.942373 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:03.942446 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 7 D0713 08:48:03.942508 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:48:03.943191 374228 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:03.943255 374228 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc0000497d0 8 D0713 08:48:03.943314 374228 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:48:03.944184 374228 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46af76:sysno 35 D0713 08:48:03.944284 374228 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc0000497d0 9 D0713 08:48:03.944463 374228 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:48:03.944627 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:03.944664 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 10 D0713 08:48:03.944712 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:48:03.946700 374228 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b020:sysno 39 D0713 08:48:03.946755 374228 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc0000497d0 11 D0713 08:48:03.946820 374228 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:48:03.947254 374228 usertrap_amd64.go:212] [ 859: 860] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:03.947310 374228 usertrap_amd64.go:122] [ 859: 860] Allocate a new trap: 0xc0000497d0 12 D0713 08:48:03.947403 374228 usertrap_amd64.go:225] [ 859: 860] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:48:03.947587 374228 task_signals.go:470] [ 859: 859] Notified of signal 23 D0713 08:48:03.947787 374228 task_signals.go:220] [ 859: 859] Signal 23: delivering to handler D0713 08:48:03.956000 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46af29:sysno 293 D0713 08:48:03.956046 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 13 D0713 08:48:03.956089 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:48:03.958031 374228 task_signals.go:470] [ 859: 859] Notified of signal 23 D0713 08:48:03.958290 374228 task_signals.go:220] [ 859: 859] Signal 23: delivering to handler D0713 08:48:03.970019 374228 task_signals.go:470] [ 859: 859] Notified of signal 23 D0713 08:48:03.970891 374228 task_signals.go:220] [ 859: 859] Signal 23: delivering to handler D0713 08:48:03.972081 374228 usertrap_amd64.go:212] [ 859: 859] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:03.972148 374228 usertrap_amd64.go:122] [ 859: 859] Allocate a new trap: 0xc0000497d0 14 D0713 08:48:03.972196 374228 usertrap_amd64.go:225] [ 859: 859] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:48:03.972365 374228 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.972494 374228 task_signals.go:204] [ 859: 863] Signal 859, PID: 863, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.972554 374228 task_signals.go:204] [ 859: 864] Signal 859, PID: 864, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.972619 374228 task_signals.go:204] [ 859: 860] Signal 859, PID: 860, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.972635 374228 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.972742 374228 task_signals.go:204] [ 859: 862] Signal 859, PID: 862, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.972781 374228 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.972858 374228 task_signals.go:204] [ 859: 861] Signal 859, PID: 861, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:03.973005 374228 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.973190 374228 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.973252 374228 task_exit.go:204] [ 859: 862] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.973369 374228 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.973536 374228 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.973610 374228 task_exit.go:204] [ 859: 861] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.973737 374228 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.973839 374228 task_exit.go:204] [ 859: 864] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:03.973972 374228 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.974018 374228 task_exit.go:204] [ 859: 863] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.974172 374228 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.974243 374228 task_exit.go:204] [ 859: 860] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.979325 374228 task_exit.go:204] [ 859: 864] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:03.979376 374228 task_exit.go:204] [ 859: 864] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.979435 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:03.979568 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:03.979626 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:03.979762 374228 task_exit.go:204] [ 859: 859] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:03.982822 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.987436 374228 syscalls.go:262] [ 865: 865] Allocating stack with size of 8388608 bytes D0713 08:48:03.988182 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:03.990330 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:03.990474 374228 usertrap_amd64.go:106] [ 865: 865] Map a usertrap vma at 69000 D0713 08:48:03.990794 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 1 D0713 08:48:03.990911 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:03.991729 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:03.991821 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 2 D0713 08:48:03.992200 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:03.993392 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:03.993472 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 3 D0713 08:48:03.993533 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:04.003031 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.003120 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 4 D0713 08:48:04.003212 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:04.004885 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.005001 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 5 D0713 08:48:04.005099 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:04.005272 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.005326 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 6 D0713 08:48:04.005614 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:04.012385 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.012505 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 7 D0713 08:48:04.012603 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:04.013909 374228 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.014034 374228 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc000049bc0 8 D0713 08:48:04.014131 374228 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:04.014674 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.014776 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 9 D0713 08:48:04.015057 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:04.015634 374228 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.015687 374228 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc000049bc0 10 D0713 08:48:04.015969 374228 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:04.027465 374228 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.027541 374228 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc000049bc0 11 D0713 08:48:04.027611 374228 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:04.027756 374228 usertrap_amd64.go:212] [ 865: 866] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.027812 374228 usertrap_amd64.go:122] [ 865: 866] Allocate a new trap: 0xc000049bc0 12 D0713 08:48:04.027880 374228 usertrap_amd64.go:225] [ 865: 866] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:04.028037 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.028100 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 13 D0713 08:48:04.028166 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:04.028310 374228 task_signals.go:470] [ 865: 865] Notified of signal 23 D0713 08:48:04.028453 374228 task_signals.go:220] [ 865: 865] Signal 23: delivering to handler D0713 08:48:04.028817 374228 task_signals.go:470] [ 865: 865] Notified of signal 23 D0713 08:48:04.028888 374228 task_signals.go:220] [ 865: 865] Signal 23: delivering to handler I0713 08:48:04.041867 374228 compat.go:120] Unsupported syscall mq_timedreceive(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedreceive for more information. D0713 08:48:04.042124 374228 usertrap_amd64.go:212] [ 865: 865] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.042188 374228 usertrap_amd64.go:122] [ 865: 865] Allocate a new trap: 0xc000049bc0 14 D0713 08:48:04.042269 374228 usertrap_amd64.go:225] [ 865: 865] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:04.042524 374228 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.042747 374228 task_signals.go:204] [ 865: 866] Signal 865, PID: 866, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.042804 374228 task_signals.go:204] [ 865: 868] Signal 865, PID: 868, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.042809 374228 task_signals.go:204] [ 865: 867] Signal 865, PID: 867, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.042923 374228 task_signals.go:204] [ 865: 869] Signal 865, PID: 869, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.043007 374228 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.043181 374228 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.043368 374228 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.043585 374228 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.043650 374228 task_exit.go:204] [ 865: 866] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.043824 374228 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.044052 374228 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.044094 374228 task_exit.go:204] [ 865: 867] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.044201 374228 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.044331 374228 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.044397 374228 task_exit.go:204] [ 865: 868] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.049775 374228 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.049872 374228 task_exit.go:204] [ 865: 869] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.049986 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.050234 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.050321 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.050419 374228 task_exit.go:204] [ 865: 865] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.054090 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.060874 374228 syscalls.go:262] [ 870: 870] Allocating stack with size of 8388608 bytes D0713 08:48:04.061666 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.061866 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.062306 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.064342 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.064546 374228 usertrap_amd64.go:106] [ 870: 870] Map a usertrap vma at 67000 D0713 08:48:04.064848 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 1 D0713 08:48:04.065009 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:04.065937 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.066021 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 2 D0713 08:48:04.066086 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:04.067441 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.067510 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 3 D0713 08:48:04.067561 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:04.077412 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.077506 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 4 D0713 08:48:04.077571 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:04.079088 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.079159 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 5 D0713 08:48:04.079234 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:04.079389 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.079429 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 6 D0713 08:48:04.079514 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:04.085197 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.085263 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 7 D0713 08:48:04.085324 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:04.086285 374228 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.086390 374228 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0023be750 8 D0713 08:48:04.086483 374228 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:04.087054 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.087180 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 9 D0713 08:48:04.087288 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:04.087468 374228 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.087511 374228 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0023be750 10 D0713 08:48:04.087623 374228 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:04.098450 374228 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.098549 374228 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0023be750 11 D0713 08:48:04.098652 374228 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b020 trap addr 67370 ([184 39 0 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:04.098859 374228 usertrap_amd64.go:212] [ 870: 871] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.098905 374228 usertrap_amd64.go:122] [ 870: 871] Allocate a new trap: 0xc0023be750 12 D0713 08:48:04.098973 374228 usertrap_amd64.go:225] [ 870: 871] Apply the binary patch addr 46b04f trap addr 673c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:04.099233 374228 task_signals.go:470] [ 870: 870] Notified of signal 23 D0713 08:48:04.100212 374228 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler D0713 08:48:04.101048 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.101127 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 13 D0713 08:48:04.101211 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46af29 trap addr 67410 ([184 37 1 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:04.110155 374228 task_signals.go:470] [ 870: 870] Notified of signal 23 D0713 08:48:04.110264 374228 task_signals.go:220] [ 870: 870] Signal 23: delivering to handler I0713 08:48:04.117354 374228 compat.go:120] Unsupported syscall mq_timedsend(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/mq_timedsend for more information. D0713 08:48:04.117511 374228 usertrap_amd64.go:212] [ 870: 870] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.117563 374228 usertrap_amd64.go:122] [ 870: 870] Allocate a new trap: 0xc0023be750 14 D0713 08:48:04.117645 374228 usertrap_amd64.go:225] [ 870: 870] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:04.117865 374228 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.118060 374228 task_signals.go:204] [ 870: 871] Signal 870, PID: 871, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.118028 374228 task_signals.go:204] [ 870: 873] Signal 870, PID: 873, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.118177 374228 task_signals.go:204] [ 870: 872] Signal 870, PID: 872, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.118205 374228 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.118400 374228 task_signals.go:204] [ 870: 874] Signal 870, PID: 874, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.118487 374228 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.118629 374228 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.118881 374228 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.118965 374228 task_exit.go:204] [ 870: 873] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.119086 374228 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.119280 374228 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.119674 374228 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.119778 374228 task_exit.go:204] [ 870: 871] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.119930 374228 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.119988 374228 task_exit.go:204] [ 870: 872] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.125421 374228 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.125491 374228 task_exit.go:204] [ 870: 874] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.125576 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.125823 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.125911 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.125990 374228 task_exit.go:204] [ 870: 870] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.128899 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.138042 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.143772 374228 syscalls.go:262] [ 875: 875] Allocating stack with size of 8388608 bytes D0713 08:48:04.144601 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.144918 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.147224 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.147371 374228 usertrap_amd64.go:106] [ 875: 875] Map a usertrap vma at 60000 D0713 08:48:04.147722 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 1 D0713 08:48:04.147899 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:48:04.149179 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.149313 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 2 D0713 08:48:04.149398 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:48:04.151222 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.151338 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 3 D0713 08:48:04.151417 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:48:04.161803 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.161949 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 4 D0713 08:48:04.162049 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:48:04.163966 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.164083 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 5 D0713 08:48:04.164199 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:48:04.164418 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.164458 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 6 D0713 08:48:04.164501 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:48:04.168563 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.168695 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 7 D0713 08:48:04.168779 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:48:04.169744 374228 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.169831 374228 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001696060 8 D0713 08:48:04.169960 374228 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:48:04.170851 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.170948 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 9 D0713 08:48:04.171021 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46b57c trap addr 602d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:48:04.171437 374228 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.171499 374228 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001696060 10 D0713 08:48:04.171786 374228 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46af76 trap addr 60320 ([184 35 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:48:04.182950 374228 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.183029 374228 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001696060 11 D0713 08:48:04.183084 374228 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:48:04.183220 374228 usertrap_amd64.go:212] [ 875: 876] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.183268 374228 usertrap_amd64.go:122] [ 875: 876] Allocate a new trap: 0xc001696060 12 D0713 08:48:04.183328 374228 usertrap_amd64.go:225] [ 875: 876] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:48:04.183569 374228 task_signals.go:470] [ 875: 875] Notified of signal 23 D0713 08:48:04.185155 374228 task_signals.go:220] [ 875: 875] Signal 23: delivering to handler D0713 08:48:04.189308 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.189412 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 13 D0713 08:48:04.189480 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:48:04.198047 374228 task_signals.go:470] [ 875: 875] Notified of signal 23 D0713 08:48:04.198262 374228 task_signals.go:179] [ 875: 875] Restarting syscall 202: interrupted by signal 23 D0713 08:48:04.198354 374228 task_signals.go:220] [ 875: 875] Signal 23: delivering to handler D0713 08:48:04.206726 374228 usertrap_amd64.go:212] [ 875: 875] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.206870 374228 usertrap_amd64.go:122] [ 875: 875] Allocate a new trap: 0xc001696060 14 D0713 08:48:04.206964 374228 usertrap_amd64.go:225] [ 875: 875] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:48:04.207298 374228 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.207545 374228 task_signals.go:204] [ 875: 876] Signal 875, PID: 876, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.207565 374228 task_signals.go:204] [ 875: 877] Signal 875, PID: 877, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.207600 374228 task_signals.go:204] [ 875: 878] Signal 875, PID: 878, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.207684 374228 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.207689 374228 task_signals.go:204] [ 875: 880] Signal 875, PID: 880, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.207776 374228 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.207892 374228 task_signals.go:204] [ 875: 879] Signal 875, PID: 879, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.208055 374228 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.208120 374228 task_exit.go:204] [ 875: 878] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.208317 374228 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.208529 374228 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.208670 374228 task_exit.go:204] [ 875: 880] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.208810 374228 task_exit.go:204] [ 875: 880] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.208854 374228 task_exit.go:204] [ 875: 880] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.209016 374228 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.209300 374228 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.209365 374228 task_exit.go:204] [ 875: 879] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.209463 374228 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.209527 374228 task_exit.go:204] [ 875: 876] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.215344 374228 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.215455 374228 task_exit.go:204] [ 875: 877] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.215595 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.215796 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.215884 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.216026 374228 task_exit.go:204] [ 875: 875] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.219346 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.224846 374228 syscalls.go:262] [ 881: 881] Allocating stack with size of 8388608 bytes D0713 08:48:04.225868 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.226041 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.226500 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.227162 374228 task_signals.go:470] [ 7: 20] Notified of signal 23 D0713 08:48:04.227296 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.228298 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.228455 374228 usertrap_amd64.go:106] [ 881: 881] Map a usertrap vma at 60000 D0713 08:48:04.228777 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 1 D0713 08:48:04.228932 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:48:04.229950 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.230012 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 2 D0713 08:48:04.230067 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:48:04.231325 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.231374 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 3 D0713 08:48:04.231419 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:48:04.241661 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.241816 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 4 D0713 08:48:04.241883 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:48:04.243480 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.243544 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 5 D0713 08:48:04.243620 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:48:04.243838 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.243903 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 6 D0713 08:48:04.243955 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:48:04.249073 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.249175 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 7 D0713 08:48:04.249234 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:48:04.250034 374228 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.250132 374228 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc002810420 8 D0713 08:48:04.250267 374228 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:48:04.250968 374228 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.251058 374228 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc002810420 9 D0713 08:48:04.251172 374228 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:48:04.251473 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.251547 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 10 D0713 08:48:04.251631 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:48:04.264321 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.264412 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 11 D0713 08:48:04.264502 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:48:04.264883 374228 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.265049 374228 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc002810420 12 D0713 08:48:04.265215 374228 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:48:04.265896 374228 usertrap_amd64.go:212] [ 881: 882] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.266106 374228 usertrap_amd64.go:122] [ 881: 882] Allocate a new trap: 0xc002810420 13 D0713 08:48:04.266234 374228 usertrap_amd64.go:225] [ 881: 882] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:48:04.266460 374228 task_signals.go:470] [ 881: 881] Notified of signal 23 D0713 08:48:04.266744 374228 task_signals.go:220] [ 881: 881] Signal 23: delivering to handler D0713 08:48:04.279375 374228 usertrap_amd64.go:212] [ 881: 881] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.279462 374228 usertrap_amd64.go:122] [ 881: 881] Allocate a new trap: 0xc002810420 14 D0713 08:48:04.279519 374228 usertrap_amd64.go:225] [ 881: 881] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:48:04.279749 374228 task_exit.go:204] [ 881: 881] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.279869 374228 task_signals.go:204] [ 881: 884] Signal 881, PID: 884, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.279920 374228 task_exit.go:204] [ 881: 881] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.280062 374228 task_signals.go:204] [ 881: 886] Signal 881, PID: 886, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.280180 374228 task_exit.go:204] [ 881: 884] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.280404 374228 task_signals.go:204] [ 881: 882] Signal 881, PID: 882, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.280431 374228 task_signals.go:204] [ 881: 885] Signal 881, PID: 885, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.280479 374228 task_signals.go:204] [ 881: 883] Signal 881, PID: 883, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.280485 374228 task_exit.go:204] [ 881: 884] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.280651 374228 task_exit.go:204] [ 881: 884] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.280847 374228 task_exit.go:204] [ 881: 886] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.281127 374228 task_exit.go:204] [ 881: 882] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.281301 374228 task_exit.go:204] [ 881: 885] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.281572 374228 task_exit.go:204] [ 881: 883] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.281921 374228 task_exit.go:204] [ 881: 886] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.282013 374228 task_exit.go:204] [ 881: 886] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.282191 374228 task_exit.go:204] [ 881: 883] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.282261 374228 task_exit.go:204] [ 881: 883] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.282373 374228 task_exit.go:204] [ 881: 885] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.282441 374228 task_exit.go:204] [ 881: 885] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.287753 374228 task_exit.go:204] [ 881: 882] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.287889 374228 task_exit.go:204] [ 881: 882] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.287993 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.288196 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.288254 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.288634 374228 task_exit.go:204] [ 881: 881] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.291511 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.299040 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.299629 374228 syscalls.go:262] [ 887: 887] Allocating stack with size of 8388608 bytes D0713 08:48:04.300419 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.300710 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.301478 374228 task_signals.go:470] [ 7: 20] Notified of signal 23 D0713 08:48:04.301622 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.302637 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.302777 374228 usertrap_amd64.go:106] [ 887: 887] Map a usertrap vma at 6a000 D0713 08:48:04.303089 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 1 D0713 08:48:04.303228 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:04.303974 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.304032 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 2 D0713 08:48:04.304081 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:04.305222 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.305267 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 3 D0713 08:48:04.305317 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:04.314061 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.314144 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 4 D0713 08:48:04.314240 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:04.316538 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.316602 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 5 D0713 08:48:04.316674 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:04.317350 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.317400 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 6 D0713 08:48:04.317467 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:04.322038 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.322112 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 7 D0713 08:48:04.322235 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:04.323116 374228 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.323230 374228 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc0023be3f0 8 D0713 08:48:04.323320 374228 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:04.323847 374228 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.323910 374228 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc0023be3f0 9 D0713 08:48:04.323989 374228 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:04.324252 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.324333 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 10 D0713 08:48:04.324433 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:04.337023 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.337112 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 11 D0713 08:48:04.337203 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:04.337498 374228 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.337589 374228 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc0023be3f0 12 D0713 08:48:04.337702 374228 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:04.338067 374228 usertrap_amd64.go:212] [ 887: 888] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.338150 374228 usertrap_amd64.go:122] [ 887: 888] Allocate a new trap: 0xc0023be3f0 13 D0713 08:48:04.338246 374228 usertrap_amd64.go:225] [ 887: 888] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:04.338461 374228 task_signals.go:470] [ 887: 887] Notified of signal 23 D0713 08:48:04.338585 374228 task_signals.go:220] [ 887: 887] Signal 23: delivering to handler D0713 08:48:04.350218 374228 task_signals.go:470] [ 887: 887] Notified of signal 23 D0713 08:48:04.350386 374228 task_signals.go:220] [ 887: 887] Signal 23: delivering to handler D0713 08:48:04.355203 374228 usertrap_amd64.go:212] [ 887: 887] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.355298 374228 usertrap_amd64.go:122] [ 887: 887] Allocate a new trap: 0xc0023be3f0 14 D0713 08:48:04.355355 374228 usertrap_amd64.go:225] [ 887: 887] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:04.355581 374228 task_exit.go:204] [ 887: 887] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.355714 374228 task_signals.go:204] [ 887: 891] Signal 887, PID: 891, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.355788 374228 task_exit.go:204] [ 887: 887] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.355731 374228 task_signals.go:204] [ 887: 888] Signal 887, PID: 888, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.355946 374228 task_exit.go:204] [ 887: 891] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.356065 374228 task_signals.go:204] [ 887: 890] Signal 887, PID: 890, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.356077 374228 task_signals.go:204] [ 887: 892] Signal 887, PID: 892, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.356111 374228 task_signals.go:204] [ 887: 889] Signal 887, PID: 889, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.356269 374228 task_exit.go:204] [ 887: 892] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.356500 374228 task_exit.go:204] [ 887: 890] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.356799 374228 task_exit.go:204] [ 887: 890] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.356852 374228 task_exit.go:204] [ 887: 890] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.357054 374228 task_exit.go:204] [ 887: 891] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.357107 374228 task_exit.go:204] [ 887: 891] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.357180 374228 task_exit.go:204] [ 887: 888] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.357296 374228 task_exit.go:204] [ 887: 889] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.357640 374228 task_exit.go:204] [ 887: 892] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.357721 374228 task_exit.go:204] [ 887: 892] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.357938 374228 task_exit.go:204] [ 887: 888] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.358006 374228 task_exit.go:204] [ 887: 888] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.363757 374228 task_exit.go:204] [ 887: 889] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.363863 374228 task_exit.go:204] [ 887: 889] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.363961 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.364219 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.364298 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.364395 374228 task_exit.go:204] [ 887: 887] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.367387 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.373980 374228 syscalls.go:262] [ 893: 893] Allocating stack with size of 8388608 bytes D0713 08:48:04.374815 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.375214 374228 task_signals.go:470] [ 7: 20] Notified of signal 23 D0713 08:48:04.375380 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.377069 374228 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.377214 374228 usertrap_amd64.go:106] [ 893: 893] Map a usertrap vma at 61000 D0713 08:48:04.377500 374228 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc000b606f0 1 D0713 08:48:04.377667 374228 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:04.378515 374228 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.378558 374228 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc000b606f0 2 D0713 08:48:04.378645 374228 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:04.380118 374228 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.380196 374228 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc000b606f0 3 D0713 08:48:04.380279 374228 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:04.389650 374228 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.389740 374228 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc000b606f0 4 D0713 08:48:04.389825 374228 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:04.392499 374228 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.392598 374228 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc000b606f0 5 D0713 08:48:04.392681 374228 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:04.392869 374228 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.392936 374228 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc000b606f0 6 D0713 08:48:04.393060 374228 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:04.398981 374228 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.399098 374228 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc000b606f0 7 D0713 08:48:04.399180 374228 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:04.399990 374228 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.400101 374228 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc000b606f0 8 D0713 08:48:04.400220 374228 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:04.401561 374228 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.401657 374228 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc000b606f0 9 D0713 08:48:04.401776 374228 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:04.402078 374228 usertrap_amd64.go:212] [ 893: 896] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.402174 374228 usertrap_amd64.go:122] [ 893: 896] Allocate a new trap: 0xc000b606f0 10 D0713 08:48:04.402252 374228 usertrap_amd64.go:225] [ 893: 896] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:04.413841 374228 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.413934 374228 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc000b606f0 11 D0713 08:48:04.414001 374228 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:04.414216 374228 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.414344 374228 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc000b606f0 12 D0713 08:48:04.414449 374228 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:04.414674 374228 usertrap_amd64.go:212] [ 893: 894] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.414751 374228 usertrap_amd64.go:122] [ 893: 894] Allocate a new trap: 0xc000b606f0 13 D0713 08:48:04.414832 374228 usertrap_amd64.go:225] [ 893: 894] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:04.415244 374228 task_signals.go:470] [ 893: 893] Notified of signal 23 D0713 08:48:04.415464 374228 task_signals.go:220] [ 893: 893] Signal 23: delivering to handler D0713 08:48:04.426953 374228 task_signals.go:470] [ 893: 893] Notified of signal 23 D0713 08:48:04.428835 374228 task_signals.go:220] [ 893: 893] Signal 23: delivering to handler D0713 08:48:04.429968 374228 usertrap_amd64.go:212] [ 893: 893] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.430063 374228 usertrap_amd64.go:122] [ 893: 893] Allocate a new trap: 0xc000b606f0 14 D0713 08:48:04.430175 374228 usertrap_amd64.go:225] [ 893: 893] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:04.430424 374228 task_exit.go:204] [ 893: 893] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.430634 374228 task_exit.go:204] [ 893: 893] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.430688 374228 task_signals.go:204] [ 893: 896] Signal 893, PID: 896, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.430796 374228 task_signals.go:204] [ 893: 894] Signal 893, PID: 894, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.430818 374228 task_signals.go:204] [ 893: 897] Signal 893, PID: 897, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.430816 374228 task_signals.go:204] [ 893: 895] Signal 893, PID: 895, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.430835 374228 task_exit.go:204] [ 893: 896] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.431081 374228 task_exit.go:204] [ 893: 896] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.431131 374228 task_exit.go:204] [ 893: 896] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.431247 374228 task_exit.go:204] [ 893: 894] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.431334 374228 task_exit.go:204] [ 893: 897] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.431505 374228 task_exit.go:204] [ 893: 894] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.431584 374228 task_exit.go:204] [ 893: 894] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.431699 374228 task_exit.go:204] [ 893: 895] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.431898 374228 task_exit.go:204] [ 893: 897] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.431964 374228 task_exit.go:204] [ 893: 897] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.437189 374228 task_exit.go:204] [ 893: 895] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.437302 374228 task_exit.go:204] [ 893: 895] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.437416 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.437580 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.437633 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.437851 374228 task_exit.go:204] [ 893: 893] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.440928 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.446940 374228 syscalls.go:262] [ 898: 898] Allocating stack with size of 8388608 bytes D0713 08:48:04.447666 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.447913 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.448273 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.448691 374228 task_signals.go:470] [ 7: 20] Notified of signal 23 D0713 08:48:04.449019 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.449515 374228 task_signals.go:470] [ 7: 20] Notified of signal 23 D0713 08:48:04.449745 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.450311 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.450480 374228 usertrap_amd64.go:106] [ 898: 898] Map a usertrap vma at 66000 D0713 08:48:04.450826 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 1 D0713 08:48:04.450959 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:04.451884 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.451947 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 2 D0713 08:48:04.451993 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:04.453306 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.453364 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 3 D0713 08:48:04.453430 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:04.462997 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.463071 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 4 D0713 08:48:04.463123 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:04.464904 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.465029 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 5 D0713 08:48:04.465093 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:04.465297 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.465342 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 6 D0713 08:48:04.465396 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:04.469902 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.469955 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 7 D0713 08:48:04.470017 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:04.471171 374228 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.471295 374228 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc000b60ed0 8 D0713 08:48:04.471396 374228 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:04.471923 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.472041 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 9 D0713 08:48:04.472187 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:04.472574 374228 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.472806 374228 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc000b60ed0 10 D0713 08:48:04.473192 374228 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:04.473548 374228 usertrap_amd64.go:212] [ 898: 901] Found the pattern at ip 46b6e0:sysno 24 D0713 08:48:04.473609 374228 usertrap_amd64.go:122] [ 898: 901] Allocate a new trap: 0xc000b60ed0 11 D0713 08:48:04.473677 374228 usertrap_amd64.go:225] [ 898: 901] Apply the binary patch addr 46b6e0 trap addr 66370 ([184 24 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:04.474846 374228 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.474909 374228 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc000b60ed0 12 D0713 08:48:04.475088 374228 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:04.475373 374228 usertrap_amd64.go:212] [ 898: 899] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.475419 374228 usertrap_amd64.go:122] [ 898: 899] Allocate a new trap: 0xc000b60ed0 13 D0713 08:48:04.475490 374228 usertrap_amd64.go:225] [ 898: 899] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:04.475730 374228 task_signals.go:470] [ 898: 898] Notified of signal 23 D0713 08:48:04.477071 374228 task_signals.go:220] [ 898: 898] Signal 23: delivering to handler D0713 08:48:04.488018 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.488057 374228 task_signals.go:470] [ 898: 898] Notified of signal 23 D0713 08:48:04.488099 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 14 D0713 08:48:04.488161 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46af29 trap addr 66460 ([184 37 1 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:04.488283 374228 task_signals.go:220] [ 898: 898] Signal 23: delivering to handler D0713 08:48:04.488645 374228 task_signals.go:470] [ 898: 898] Notified of signal 23 D0713 08:48:04.488845 374228 task_signals.go:220] [ 898: 898] Signal 23: delivering to handler D0713 08:48:04.503173 374228 task_signals.go:470] [ 898: 898] Notified of signal 23 D0713 08:48:04.504828 374228 task_signals.go:220] [ 898: 898] Signal 23: delivering to handler D0713 08:48:04.505991 374228 usertrap_amd64.go:212] [ 898: 898] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.506046 374228 usertrap_amd64.go:122] [ 898: 898] Allocate a new trap: 0xc000b60ed0 15 D0713 08:48:04.506116 374228 usertrap_amd64.go:225] [ 898: 898] Apply the binary patch addr 46ae44 trap addr 664b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 100 6 0]) D0713 08:48:04.506294 374228 task_exit.go:204] [ 898: 898] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.506486 374228 task_exit.go:204] [ 898: 898] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.506487 374228 task_signals.go:204] [ 898: 899] Signal 898, PID: 899, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.506505 374228 task_signals.go:204] [ 898: 902] Signal 898, PID: 902, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.506628 374228 task_signals.go:204] [ 898: 900] Signal 898, PID: 900, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.506651 374228 task_signals.go:204] [ 898: 901] Signal 898, PID: 901, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.506672 374228 task_exit.go:204] [ 898: 899] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.506823 374228 task_exit.go:204] [ 898: 902] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.506992 374228 task_exit.go:204] [ 898: 902] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.507043 374228 task_exit.go:204] [ 898: 902] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.507144 374228 task_exit.go:204] [ 898: 900] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.507303 374228 task_exit.go:204] [ 898: 900] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.507343 374228 task_exit.go:204] [ 898: 900] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.507463 374228 task_exit.go:204] [ 898: 899] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.507526 374228 task_exit.go:204] [ 898: 899] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.507619 374228 task_exit.go:204] [ 898: 901] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.512564 374228 task_exit.go:204] [ 898: 901] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.512635 374228 task_exit.go:204] [ 898: 901] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.512725 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.513024 374228 task_exit.go:204] [ 898: 898] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.513051 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.513184 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.515894 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.522166 374228 syscalls.go:262] [ 903: 903] Allocating stack with size of 8388608 bytes D0713 08:48:04.522787 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.523071 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.523291 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.523678 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.523802 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.525157 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.525345 374228 usertrap_amd64.go:106] [ 903: 903] Map a usertrap vma at 65000 D0713 08:48:04.525664 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 1 D0713 08:48:04.525796 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:48:04.526696 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.526752 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 2 D0713 08:48:04.526856 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:48:04.528062 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.528117 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 3 D0713 08:48:04.528179 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:48:04.538974 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.539072 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 4 D0713 08:48:04.539181 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:48:04.541194 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.541259 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 5 D0713 08:48:04.541325 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:48:04.541950 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.542004 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 6 D0713 08:48:04.542054 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:48:04.547098 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.547181 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 7 D0713 08:48:04.547236 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:48:04.548012 374228 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.548106 374228 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc000a45800 8 D0713 08:48:04.548186 374228 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:48:04.549063 374228 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.549329 374228 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc000a45800 9 D0713 08:48:04.549617 374228 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46af76 trap addr 652d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:48:04.550146 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.550220 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 10 D0713 08:48:04.550298 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46b57c trap addr 65320 ([184 202 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:48:04.551675 374228 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b6e0:sysno 24 D0713 08:48:04.551747 374228 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc000a45800 11 D0713 08:48:04.551825 374228 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b6e0 trap addr 65370 ([184 24 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:48:04.560814 374228 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.561027 374228 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc000a45800 12 D0713 08:48:04.561140 374228 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:48:04.561312 374228 usertrap_amd64.go:212] [ 903: 904] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.561355 374228 usertrap_amd64.go:122] [ 903: 904] Allocate a new trap: 0xc000a45800 13 D0713 08:48:04.561423 374228 usertrap_amd64.go:225] [ 903: 904] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:48:04.561599 374228 task_signals.go:470] [ 903: 903] Notified of signal 23 D0713 08:48:04.561912 374228 task_signals.go:220] [ 903: 903] Signal 23: delivering to handler D0713 08:48:04.564049 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.564108 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 14 D0713 08:48:04.564165 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46af29 trap addr 65460 ([184 37 1 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:48:04.572921 374228 task_signals.go:470] [ 903: 903] Notified of signal 23 D0713 08:48:04.574769 374228 task_signals.go:220] [ 903: 903] Signal 23: delivering to handler D0713 08:48:04.581728 374228 usertrap_amd64.go:212] [ 903: 903] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.581822 374228 usertrap_amd64.go:122] [ 903: 903] Allocate a new trap: 0xc000a45800 15 D0713 08:48:04.581932 374228 usertrap_amd64.go:225] [ 903: 903] Apply the binary patch addr 46ae44 trap addr 654b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 84 6 0]) D0713 08:48:04.582194 374228 task_exit.go:204] [ 903: 903] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.582352 374228 task_signals.go:204] [ 903: 907] Signal 903, PID: 907, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.582395 374228 task_exit.go:204] [ 903: 903] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.582352 374228 task_signals.go:204] [ 903: 904] Signal 903, PID: 904, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.582541 374228 task_exit.go:204] [ 903: 907] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.582631 374228 task_signals.go:204] [ 903: 905] Signal 903, PID: 905, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.582664 374228 task_signals.go:204] [ 903: 906] Signal 903, PID: 906, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.582725 374228 task_exit.go:204] [ 903: 905] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.582890 374228 task_exit.go:204] [ 903: 905] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.582929 374228 task_exit.go:204] [ 903: 905] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.583048 374228 task_exit.go:204] [ 903: 904] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.583169 374228 task_exit.go:204] [ 903: 904] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.583248 374228 task_exit.go:204] [ 903: 904] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.583358 374228 task_exit.go:204] [ 903: 906] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.583521 374228 task_exit.go:204] [ 903: 907] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.583609 374228 task_exit.go:204] [ 903: 907] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.589632 374228 task_exit.go:204] [ 903: 906] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.589706 374228 task_exit.go:204] [ 903: 906] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.589799 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.589979 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.590080 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.590174 374228 task_exit.go:204] [ 903: 903] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.593132 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.598016 374228 syscalls.go:262] [ 908: 908] Allocating stack with size of 8388608 bytes D0713 08:48:04.598826 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.600845 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.601006 374228 usertrap_amd64.go:106] [ 908: 908] Map a usertrap vma at 66000 D0713 08:48:04.601277 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 1 D0713 08:48:04.601396 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:04.602402 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.602467 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 2 D0713 08:48:04.602524 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:04.603876 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.603953 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 3 D0713 08:48:04.604030 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:04.615429 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.615541 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 4 D0713 08:48:04.615653 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:04.617749 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.617842 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 5 D0713 08:48:04.617941 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:04.618112 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.618152 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 6 D0713 08:48:04.618216 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:04.622996 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.623075 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 7 D0713 08:48:04.623173 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:04.623929 374228 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.623997 374228 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc0023be9c0 8 D0713 08:48:04.624090 374228 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:04.624858 374228 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.627916 374228 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc0023be9c0 9 D0713 08:48:04.628163 374228 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:04.628560 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.628667 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 10 D0713 08:48:04.628748 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:04.641963 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.642036 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 11 D0713 08:48:04.642098 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:04.647737 374228 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.647826 374228 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc0023be9c0 12 D0713 08:48:04.647910 374228 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:04.648275 374228 usertrap_amd64.go:212] [ 908: 909] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.648376 374228 usertrap_amd64.go:122] [ 908: 909] Allocate a new trap: 0xc0023be9c0 13 D0713 08:48:04.648455 374228 usertrap_amd64.go:225] [ 908: 909] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:04.648668 374228 task_signals.go:470] [ 908: 908] Notified of signal 23 D0713 08:48:04.648908 374228 task_signals.go:220] [ 908: 908] Signal 23: delivering to handler D0713 08:48:04.660754 374228 usertrap_amd64.go:212] [ 908: 908] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.660869 374228 usertrap_amd64.go:122] [ 908: 908] Allocate a new trap: 0xc0023be9c0 14 D0713 08:48:04.661017 374228 usertrap_amd64.go:225] [ 908: 908] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:04.661485 374228 task_signals.go:470] [ 908: 908] Notified of signal 23 D0713 08:48:04.661671 374228 task_exit.go:204] [ 908: 908] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.661847 374228 task_signals.go:204] [ 908: 912] Signal 908, PID: 912, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.662012 374228 task_signals.go:204] [ 908: 913] Signal 908, PID: 913, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.662049 374228 task_signals.go:204] [ 908: 911] Signal 908, PID: 911, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.662045 374228 task_exit.go:204] [ 908: 912] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.662316 374228 task_signals.go:204] [ 908: 909] Signal 908, PID: 909, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.662423 374228 task_signals.go:204] [ 908: 910] Signal 908, PID: 910, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.662479 374228 task_exit.go:204] [ 908: 909] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.662620 374228 task_exit.go:204] [ 908: 910] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.662815 374228 task_exit.go:204] [ 908: 910] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.662902 374228 task_exit.go:204] [ 908: 910] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.663103 374228 task_exit.go:204] [ 908: 913] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.663416 374228 task_exit.go:204] [ 908: 911] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.663674 374228 task_exit.go:204] [ 908: 912] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.663778 374228 task_exit.go:204] [ 908: 912] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.664000 374228 task_exit.go:204] [ 908: 909] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.664058 374228 task_exit.go:204] [ 908: 909] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.664269 374228 task_exit.go:204] [ 908: 908] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.664680 374228 task_exit.go:204] [ 908: 913] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.664819 374228 task_exit.go:204] [ 908: 913] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.671090 374228 task_exit.go:204] [ 908: 911] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.671223 374228 task_exit.go:204] [ 908: 911] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.671321 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.671538 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.671613 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.671709 374228 task_exit.go:204] [ 908: 908] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.675314 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.681493 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.684340 374228 syscalls.go:262] [ 914: 914] Allocating stack with size of 8388608 bytes D0713 08:48:04.685273 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.686225 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.690796 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.690979 374228 usertrap_amd64.go:106] [ 914: 914] Map a usertrap vma at 68000 D0713 08:48:04.691261 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 1 D0713 08:48:04.691372 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:48:04.692375 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.692435 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 2 D0713 08:48:04.692512 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:48:04.694785 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.694903 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 3 D0713 08:48:04.695036 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:48:04.711432 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.711540 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 4 D0713 08:48:04.711616 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:48:04.713717 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.713812 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 5 D0713 08:48:04.713890 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:48:04.714075 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.714126 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 6 D0713 08:48:04.714187 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:48:04.719893 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.719963 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 7 D0713 08:48:04.720039 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:48:04.720932 374228 usertrap_amd64.go:212] [ 914: 915] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.721214 374228 usertrap_amd64.go:122] [ 914: 915] Allocate a new trap: 0xc0005ccc00 8 D0713 08:48:04.721416 374228 usertrap_amd64.go:225] [ 914: 915] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:48:04.722473 374228 usertrap_amd64.go:212] [ 914: 915] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.722578 374228 usertrap_amd64.go:122] [ 914: 915] Allocate a new trap: 0xc0005ccc00 9 D0713 08:48:04.722658 374228 usertrap_amd64.go:225] [ 914: 915] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:48:04.723095 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.723192 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 10 D0713 08:48:04.723316 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:48:04.734796 374228 usertrap_amd64.go:212] [ 914: 915] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.734883 374228 usertrap_amd64.go:122] [ 914: 915] Allocate a new trap: 0xc0005ccc00 11 D0713 08:48:04.734997 374228 usertrap_amd64.go:225] [ 914: 915] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:48:04.735475 374228 usertrap_amd64.go:212] [ 914: 915] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.735557 374228 usertrap_amd64.go:122] [ 914: 915] Allocate a new trap: 0xc0005ccc00 12 D0713 08:48:04.735657 374228 usertrap_amd64.go:225] [ 914: 915] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:48:04.735885 374228 task_signals.go:470] [ 914: 914] Notified of signal 23 D0713 08:48:04.737427 374228 task_signals.go:220] [ 914: 914] Signal 23: delivering to handler D0713 08:48:04.738306 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.738361 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 13 D0713 08:48:04.738444 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:48:04.746626 374228 task_signals.go:470] [ 914: 914] Notified of signal 23 D0713 08:48:04.746962 374228 task_signals.go:179] [ 914: 914] Restarting syscall 202: interrupted by signal 23 D0713 08:48:04.747030 374228 task_signals.go:220] [ 914: 914] Signal 23: delivering to handler D0713 08:48:04.757731 374228 usertrap_amd64.go:212] [ 914: 914] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.757843 374228 usertrap_amd64.go:122] [ 914: 914] Allocate a new trap: 0xc0005ccc00 14 D0713 08:48:04.757940 374228 usertrap_amd64.go:225] [ 914: 914] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:48:04.758272 374228 task_exit.go:204] [ 914: 914] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.758521 374228 task_signals.go:204] [ 914: 919] Signal 914, PID: 919, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.758544 374228 task_signals.go:204] [ 914: 917] Signal 914, PID: 917, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.758693 374228 task_signals.go:204] [ 914: 918] Signal 914, PID: 918, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.758706 374228 task_exit.go:204] [ 914: 917] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.758866 374228 task_signals.go:204] [ 914: 915] Signal 914, PID: 915, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.758907 374228 task_signals.go:204] [ 914: 916] Signal 914, PID: 916, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.758938 374228 task_exit.go:204] [ 914: 918] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.759197 374228 task_exit.go:204] [ 914: 918] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.759275 374228 task_exit.go:204] [ 914: 918] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.759424 374228 task_exit.go:204] [ 914: 915] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.759610 374228 task_exit.go:204] [ 914: 919] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.759927 374228 task_exit.go:204] [ 914: 916] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.760270 374228 task_exit.go:204] [ 914: 919] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.760364 374228 task_exit.go:204] [ 914: 919] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.760491 374228 task_exit.go:204] [ 914: 917] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.760577 374228 task_exit.go:204] [ 914: 917] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.760710 374228 task_exit.go:204] [ 914: 915] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.760799 374228 task_exit.go:204] [ 914: 915] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.760924 374228 task_exit.go:204] [ 914: 914] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.767476 374228 task_exit.go:204] [ 914: 916] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.767595 374228 task_exit.go:204] [ 914: 916] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.767733 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.767972 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.768035 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.768160 374228 task_exit.go:204] [ 914: 914] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.770784 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.777946 374228 syscalls.go:262] [ 920: 920] Allocating stack with size of 8388608 bytes D0713 08:48:04.778256 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.778842 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.779274 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.781139 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.781332 374228 usertrap_amd64.go:106] [ 920: 920] Map a usertrap vma at 69000 D0713 08:48:04.781687 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 1 D0713 08:48:04.781816 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:04.782788 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.782866 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 2 D0713 08:48:04.782937 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:04.784198 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.784255 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 3 D0713 08:48:04.784359 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:04.795396 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.795491 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 4 D0713 08:48:04.795575 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:04.797230 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.797293 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 5 D0713 08:48:04.797366 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:04.797542 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.797617 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 6 D0713 08:48:04.797705 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:04.802339 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.802431 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 7 D0713 08:48:04.802489 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:04.803617 374228 usertrap_amd64.go:212] [ 920: 921] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.803705 374228 usertrap_amd64.go:122] [ 920: 921] Allocate a new trap: 0xc0023bf0b0 8 D0713 08:48:04.803780 374228 usertrap_amd64.go:225] [ 920: 921] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:04.804834 374228 usertrap_amd64.go:212] [ 920: 921] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.804962 374228 usertrap_amd64.go:122] [ 920: 921] Allocate a new trap: 0xc0023bf0b0 9 D0713 08:48:04.805100 374228 usertrap_amd64.go:225] [ 920: 921] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:04.805301 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.805385 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 10 D0713 08:48:04.805504 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:04.806642 374228 usertrap_amd64.go:212] [ 920: 921] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.806714 374228 usertrap_amd64.go:122] [ 920: 921] Allocate a new trap: 0xc0023bf0b0 11 D0713 08:48:04.806776 374228 usertrap_amd64.go:225] [ 920: 921] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:04.806894 374228 usertrap_amd64.go:212] [ 920: 921] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.806935 374228 usertrap_amd64.go:122] [ 920: 921] Allocate a new trap: 0xc0023bf0b0 12 D0713 08:48:04.807100 374228 usertrap_amd64.go:225] [ 920: 921] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:04.807545 374228 task_signals.go:470] [ 920: 920] Notified of signal 23 D0713 08:48:04.807719 374228 task_signals.go:220] [ 920: 920] Signal 23: delivering to handler D0713 08:48:04.818457 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.818550 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 13 D0713 08:48:04.818658 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:04.818840 374228 task_signals.go:470] [ 920: 920] Notified of signal 23 D0713 08:48:04.818931 374228 task_signals.go:220] [ 920: 920] Signal 23: delivering to handler D0713 08:48:04.833425 374228 task_signals.go:470] [ 920: 920] Notified of signal 23 D0713 08:48:04.835447 374228 task_signals.go:220] [ 920: 920] Signal 23: delivering to handler D0713 08:48:04.836661 374228 usertrap_amd64.go:212] [ 920: 920] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.836754 374228 usertrap_amd64.go:122] [ 920: 920] Allocate a new trap: 0xc0023bf0b0 14 D0713 08:48:04.836836 374228 usertrap_amd64.go:225] [ 920: 920] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:04.837152 374228 task_exit.go:204] [ 920: 920] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.837286 374228 task_signals.go:204] [ 920: 921] Signal 920, PID: 921, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.837356 374228 task_signals.go:204] [ 920: 924] Signal 920, PID: 924, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.837395 374228 task_signals.go:204] [ 920: 922] Signal 920, PID: 922, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.837506 374228 task_signals.go:204] [ 920: 923] Signal 920, PID: 923, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.837604 374228 task_exit.go:204] [ 920: 922] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.837776 374228 task_exit.go:204] [ 920: 924] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.837955 374228 task_exit.go:204] [ 920: 920] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.838158 374228 task_exit.go:204] [ 920: 921] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.838346 374228 task_exit.go:204] [ 920: 921] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.838425 374228 task_exit.go:204] [ 920: 921] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.838540 374228 task_exit.go:204] [ 920: 923] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.838805 374228 task_exit.go:204] [ 920: 924] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.838883 374228 task_exit.go:204] [ 920: 924] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.839124 374228 task_exit.go:204] [ 920: 922] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.839184 374228 task_exit.go:204] [ 920: 922] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.845430 374228 task_exit.go:204] [ 920: 923] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.845525 374228 task_exit.go:204] [ 920: 923] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.845605 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.845787 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.846000 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.846054 374228 task_exit.go:204] [ 920: 920] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.848709 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.854865 374228 syscalls.go:262] [ 925: 925] Allocating stack with size of 8388608 bytes D0713 08:48:04.855577 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.855898 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:04.856107 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:04.857597 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.857748 374228 usertrap_amd64.go:106] [ 925: 925] Map a usertrap vma at 6a000 D0713 08:48:04.858089 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 1 D0713 08:48:04.858215 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:04.865460 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.865526 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 2 D0713 08:48:04.865618 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:04.867318 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.867379 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 3 D0713 08:48:04.867438 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:04.878823 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.878898 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 4 D0713 08:48:04.878979 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:04.880658 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.880716 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 5 D0713 08:48:04.880762 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:04.880935 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.881026 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 6 D0713 08:48:04.881088 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:04.885472 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.885540 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 7 D0713 08:48:04.885598 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:04.886439 374228 usertrap_amd64.go:212] [ 925: 926] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.886594 374228 usertrap_amd64.go:122] [ 925: 926] Allocate a new trap: 0xc0028115f0 8 D0713 08:48:04.886687 374228 usertrap_amd64.go:225] [ 925: 926] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:04.887450 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.887506 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 9 D0713 08:48:04.887584 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:04.887829 374228 usertrap_amd64.go:212] [ 925: 926] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.887952 374228 usertrap_amd64.go:122] [ 925: 926] Allocate a new trap: 0xc0028115f0 10 D0713 08:48:04.888050 374228 usertrap_amd64.go:225] [ 925: 926] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:04.899090 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.899158 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 11 D0713 08:48:04.899246 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:04.899549 374228 usertrap_amd64.go:212] [ 925: 926] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.899624 374228 usertrap_amd64.go:122] [ 925: 926] Allocate a new trap: 0xc0028115f0 12 D0713 08:48:04.899705 374228 usertrap_amd64.go:225] [ 925: 926] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:04.899959 374228 usertrap_amd64.go:212] [ 925: 926] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.900007 374228 usertrap_amd64.go:122] [ 925: 926] Allocate a new trap: 0xc0028115f0 13 D0713 08:48:04.900068 374228 usertrap_amd64.go:225] [ 925: 926] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:04.900237 374228 task_signals.go:470] [ 925: 925] Notified of signal 23 D0713 08:48:04.900345 374228 task_signals.go:220] [ 925: 925] Signal 23: delivering to handler D0713 08:48:04.912823 374228 task_signals.go:470] [ 925: 925] Notified of signal 23 D0713 08:48:04.914424 374228 task_signals.go:220] [ 925: 925] Signal 23: delivering to handler D0713 08:48:04.915300 374228 usertrap_amd64.go:212] [ 925: 925] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.915374 374228 usertrap_amd64.go:122] [ 925: 925] Allocate a new trap: 0xc0028115f0 14 D0713 08:48:04.915466 374228 usertrap_amd64.go:225] [ 925: 925] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:04.915676 374228 task_exit.go:204] [ 925: 925] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.915842 374228 task_signals.go:204] [ 925: 926] Signal 925, PID: 926, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.915852 374228 task_exit.go:204] [ 925: 925] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.915952 374228 task_signals.go:204] [ 925: 927] Signal 925, PID: 927, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.915976 374228 task_signals.go:204] [ 925: 929] Signal 925, PID: 929, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.916032 374228 task_signals.go:204] [ 925: 928] Signal 925, PID: 928, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.916075 374228 task_exit.go:204] [ 925: 927] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.916297 374228 task_exit.go:204] [ 925: 927] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.916361 374228 task_exit.go:204] [ 925: 927] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.916496 374228 task_exit.go:204] [ 925: 926] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.916616 374228 task_exit.go:204] [ 925: 926] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.916663 374228 task_exit.go:204] [ 925: 926] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.916746 374228 task_exit.go:204] [ 925: 928] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.916838 374228 task_exit.go:204] [ 925: 928] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.916875 374228 task_exit.go:204] [ 925: 928] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.917007 374228 task_exit.go:204] [ 925: 929] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.922739 374228 task_exit.go:204] [ 925: 929] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.922803 374228 task_exit.go:204] [ 925: 929] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.922881 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.923111 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.923245 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.923292 374228 task_exit.go:204] [ 925: 925] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.925826 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.930214 374228 syscalls.go:262] [ 930: 930] Allocating stack with size of 8388608 bytes D0713 08:48:04.930774 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.932307 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.932420 374228 usertrap_amd64.go:106] [ 930: 930] Map a usertrap vma at 60000 D0713 08:48:04.932702 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 1 D0713 08:48:04.932813 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:48:04.933610 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.933653 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 2 D0713 08:48:04.933699 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:48:04.935031 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.935087 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 3 D0713 08:48:04.935158 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:48:04.943511 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:04.943562 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 4 D0713 08:48:04.943618 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:48:04.945110 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:04.945153 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 5 D0713 08:48:04.945223 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:48:04.945399 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b214:sysno 13 D0713 08:48:04.945454 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 6 D0713 08:48:04.945531 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:48:04.949028 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:04.949087 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 7 D0713 08:48:04.949157 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:48:04.949800 374228 usertrap_amd64.go:212] [ 930: 931] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:04.949885 374228 usertrap_amd64.go:122] [ 930: 931] Allocate a new trap: 0xc001697b00 8 D0713 08:48:04.949979 374228 usertrap_amd64.go:225] [ 930: 931] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:48:04.950828 374228 usertrap_amd64.go:212] [ 930: 931] Found the pattern at ip 46af76:sysno 35 D0713 08:48:04.950918 374228 usertrap_amd64.go:122] [ 930: 931] Allocate a new trap: 0xc001697b00 9 D0713 08:48:04.951019 374228 usertrap_amd64.go:225] [ 930: 931] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:48:04.951192 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:04.951238 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 10 D0713 08:48:04.951305 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:48:04.962576 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46af29:sysno 293 D0713 08:48:04.962630 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 11 D0713 08:48:04.962693 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46af29 trap addr 60370 ([184 37 1 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:48:04.966567 374228 usertrap_amd64.go:212] [ 930: 931] Found the pattern at ip 46b020:sysno 39 D0713 08:48:04.966631 374228 usertrap_amd64.go:122] [ 930: 931] Allocate a new trap: 0xc001697b00 12 D0713 08:48:04.966731 374228 usertrap_amd64.go:225] [ 930: 931] Apply the binary patch addr 46b020 trap addr 603c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:48:04.966964 374228 usertrap_amd64.go:212] [ 930: 931] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:04.967030 374228 usertrap_amd64.go:122] [ 930: 931] Allocate a new trap: 0xc001697b00 13 D0713 08:48:04.967105 374228 usertrap_amd64.go:225] [ 930: 931] Apply the binary patch addr 46b04f trap addr 60410 ([184 234 0 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:48:04.967261 374228 task_signals.go:470] [ 930: 930] Notified of signal 23 D0713 08:48:04.967413 374228 task_signals.go:220] [ 930: 930] Signal 23: delivering to handler D0713 08:48:04.978070 374228 usertrap_amd64.go:212] [ 930: 930] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:04.978141 374228 usertrap_amd64.go:122] [ 930: 930] Allocate a new trap: 0xc001697b00 14 D0713 08:48:04.978212 374228 usertrap_amd64.go:225] [ 930: 930] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:48:04.978435 374228 task_exit.go:204] [ 930: 930] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.978695 374228 task_exit.go:204] [ 930: 930] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.978650 374228 task_signals.go:204] [ 930: 932] Signal 930, PID: 932, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.978692 374228 task_signals.go:204] [ 930: 933] Signal 930, PID: 933, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.978941 374228 task_exit.go:204] [ 930: 932] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.979060 374228 task_signals.go:204] [ 930: 935] Signal 930, PID: 935, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.979076 374228 task_signals.go:204] [ 930: 931] Signal 930, PID: 931, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.979241 374228 task_exit.go:204] [ 930: 935] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.979478 374228 task_signals.go:204] [ 930: 934] Signal 930, PID: 934, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:04.979577 374228 task_exit.go:204] [ 930: 935] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.979674 374228 task_exit.go:204] [ 930: 935] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.979825 374228 task_exit.go:204] [ 930: 933] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.980059 374228 task_exit.go:204] [ 930: 933] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.980147 374228 task_exit.go:204] [ 930: 933] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.980284 374228 task_exit.go:204] [ 930: 934] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.980380 374228 task_exit.go:204] [ 930: 931] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:04.980571 374228 task_exit.go:204] [ 930: 934] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.980671 374228 task_exit.go:204] [ 930: 934] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.980966 374228 task_exit.go:204] [ 930: 932] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.981047 374228 task_exit.go:204] [ 930: 932] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.987068 374228 task_exit.go:204] [ 930: 931] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:04.987201 374228 task_exit.go:204] [ 930: 931] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.987352 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:04.987468 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:04.987569 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:04.987726 374228 task_exit.go:204] [ 930: 930] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:04.990105 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.994633 374228 syscalls.go:262] [ 936: 936] Allocating stack with size of 8388608 bytes D0713 08:48:04.995375 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:04.997106 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:04.997193 374228 usertrap_amd64.go:106] [ 936: 936] Map a usertrap vma at 61000 D0713 08:48:04.997390 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 1 D0713 08:48:04.997469 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:04.998167 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:04.998209 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 2 D0713 08:48:04.998260 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:04.999162 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:04.999212 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 3 D0713 08:48:04.999278 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:05.009617 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.009684 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 4 D0713 08:48:05.009779 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:05.011236 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.011320 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 5 D0713 08:48:05.011389 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:05.011529 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.011571 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 6 D0713 08:48:05.011621 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:05.016406 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.016477 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 7 D0713 08:48:05.016556 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:05.017359 374228 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.017468 374228 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc0028119e0 8 D0713 08:48:05.017543 374228 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:05.018399 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.018482 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 9 D0713 08:48:05.018560 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:05.018913 374228 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.019004 374228 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc0028119e0 10 D0713 08:48:05.019096 374228 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:05.030277 374228 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.030359 374228 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc0028119e0 11 D0713 08:48:05.030422 374228 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:05.030580 374228 usertrap_amd64.go:212] [ 936: 937] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.030640 374228 usertrap_amd64.go:122] [ 936: 937] Allocate a new trap: 0xc0028119e0 12 D0713 08:48:05.030688 374228 usertrap_amd64.go:225] [ 936: 937] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:05.030883 374228 task_signals.go:470] [ 936: 936] Notified of signal 23 D0713 08:48:05.031070 374228 task_signals.go:220] [ 936: 936] Signal 23: delivering to handler D0713 08:48:05.034683 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.034770 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 13 D0713 08:48:05.034829 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:05.041654 374228 task_signals.go:470] [ 936: 936] Notified of signal 23 D0713 08:48:05.041841 374228 task_signals.go:179] [ 936: 936] Restarting syscall 202: interrupted by signal 23 D0713 08:48:05.041931 374228 task_signals.go:220] [ 936: 936] Signal 23: delivering to handler D0713 08:48:05.051908 374228 usertrap_amd64.go:212] [ 936: 936] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.052018 374228 usertrap_amd64.go:122] [ 936: 936] Allocate a new trap: 0xc0028119e0 14 D0713 08:48:05.052139 374228 usertrap_amd64.go:225] [ 936: 936] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:05.052401 374228 task_exit.go:204] [ 936: 936] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.052604 374228 task_signals.go:204] [ 936: 940] Signal 936, PID: 940, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.052675 374228 task_signals.go:204] [ 936: 937] Signal 936, PID: 937, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.052727 374228 task_signals.go:204] [ 936: 938] Signal 936, PID: 938, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.052777 374228 task_signals.go:204] [ 936: 939] Signal 936, PID: 939, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.052794 374228 task_exit.go:204] [ 936: 936] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.052863 374228 task_exit.go:204] [ 936: 939] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.053017 374228 task_exit.go:204] [ 936: 939] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.053079 374228 task_exit.go:204] [ 936: 939] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.053224 374228 task_exit.go:204] [ 936: 937] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.053396 374228 task_exit.go:204] [ 936: 937] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.053457 374228 task_exit.go:204] [ 936: 937] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.053586 374228 task_exit.go:204] [ 936: 938] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.053746 374228 task_exit.go:204] [ 936: 938] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.053787 374228 task_exit.go:204] [ 936: 938] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.053885 374228 task_exit.go:204] [ 936: 940] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.059750 374228 task_exit.go:204] [ 936: 940] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.059878 374228 task_exit.go:204] [ 936: 940] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.059968 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.060135 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:05.060196 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.060845 374228 task_exit.go:204] [ 936: 936] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.063683 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.071302 374228 syscalls.go:262] [ 941: 941] Allocating stack with size of 8388608 bytes D0713 08:48:05.071570 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:05.072090 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.072534 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:05.072898 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:05.073114 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:05.075043 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.075197 374228 usertrap_amd64.go:106] [ 941: 941] Map a usertrap vma at 63000 D0713 08:48:05.075472 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 1 D0713 08:48:05.075624 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:05.078917 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.079022 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 2 D0713 08:48:05.079135 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:05.080502 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.080576 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 3 D0713 08:48:05.080633 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:05.090900 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.090994 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 4 D0713 08:48:05.091072 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:05.092992 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.093098 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 5 D0713 08:48:05.093184 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:05.093339 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.093433 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 6 D0713 08:48:05.093505 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:05.098056 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.098142 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 7 D0713 08:48:05.098247 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:05.098867 374228 usertrap_amd64.go:212] [ 941: 942] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.098953 374228 usertrap_amd64.go:122] [ 941: 942] Allocate a new trap: 0xc002811d40 8 D0713 08:48:05.099027 374228 usertrap_amd64.go:225] [ 941: 942] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:05.099813 374228 usertrap_amd64.go:212] [ 941: 942] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.099879 374228 usertrap_amd64.go:122] [ 941: 942] Allocate a new trap: 0xc002811d40 9 D0713 08:48:05.100034 374228 usertrap_amd64.go:225] [ 941: 942] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:05.100225 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.100308 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 10 D0713 08:48:05.100372 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:05.101645 374228 usertrap_amd64.go:212] [ 941: 942] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.101724 374228 usertrap_amd64.go:122] [ 941: 942] Allocate a new trap: 0xc002811d40 11 D0713 08:48:05.101775 374228 usertrap_amd64.go:225] [ 941: 942] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:05.101940 374228 usertrap_amd64.go:212] [ 941: 942] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.101977 374228 usertrap_amd64.go:122] [ 941: 942] Allocate a new trap: 0xc002811d40 12 D0713 08:48:05.102032 374228 usertrap_amd64.go:225] [ 941: 942] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:05.102208 374228 task_signals.go:470] [ 941: 941] Notified of signal 23 D0713 08:48:05.102401 374228 task_signals.go:220] [ 941: 941] Signal 23: delivering to handler D0713 08:48:05.113677 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.113760 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 13 D0713 08:48:05.113817 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:05.114124 374228 task_signals.go:470] [ 941: 941] Notified of signal 23 D0713 08:48:05.114280 374228 task_signals.go:220] [ 941: 941] Signal 23: delivering to handler D0713 08:48:05.114776 374228 task_signals.go:470] [ 941: 941] Notified of signal 23 D0713 08:48:05.114995 374228 task_signals.go:179] [ 941: 941] Restarting syscall 202: interrupted by signal 23 D0713 08:48:05.115067 374228 task_signals.go:220] [ 941: 941] Signal 23: delivering to handler D0713 08:48:05.127690 374228 task_signals.go:470] [ 941: 941] Notified of signal 23 D0713 08:48:05.129829 374228 task_signals.go:220] [ 941: 941] Signal 23: delivering to handler D0713 08:48:05.130914 374228 usertrap_amd64.go:212] [ 941: 941] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.130988 374228 usertrap_amd64.go:122] [ 941: 941] Allocate a new trap: 0xc002811d40 14 D0713 08:48:05.131057 374228 usertrap_amd64.go:225] [ 941: 941] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:05.131313 374228 task_exit.go:204] [ 941: 941] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.131604 374228 task_exit.go:204] [ 941: 941] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.131702 374228 task_signals.go:204] [ 941: 943] Signal 941, PID: 943, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.131797 374228 task_signals.go:204] [ 941: 944] Signal 941, PID: 944, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.131945 374228 task_exit.go:204] [ 941: 943] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.132078 374228 task_signals.go:204] [ 941: 942] Signal 941, PID: 942, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.132229 374228 task_exit.go:204] [ 941: 942] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.132330 374228 task_signals.go:204] [ 941: 945] Signal 941, PID: 945, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.132422 374228 task_exit.go:204] [ 941: 945] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.132549 374228 task_exit.go:204] [ 941: 944] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.132737 374228 task_exit.go:204] [ 941: 943] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.132934 374228 task_exit.go:204] [ 941: 943] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.133158 374228 task_exit.go:204] [ 941: 945] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.133226 374228 task_exit.go:204] [ 941: 945] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.133324 374228 task_exit.go:204] [ 941: 942] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.133406 374228 task_exit.go:204] [ 941: 942] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.138219 374228 task_exit.go:204] [ 941: 944] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.138348 374228 task_exit.go:204] [ 941: 944] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.138467 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.138650 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:05.138707 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.138813 374228 task_exit.go:204] [ 941: 941] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.141636 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.148691 374228 syscalls.go:262] [ 946: 946] Allocating stack with size of 8388608 bytes D0713 08:48:05.149541 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:05.149679 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.149923 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:05.150284 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:05.150416 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:05.150829 374228 task_signals.go:470] [ 7: 20] Notified of signal 23 D0713 08:48:05.150955 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:05.152008 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.152148 374228 usertrap_amd64.go:106] [ 946: 946] Map a usertrap vma at 67000 D0713 08:48:05.152418 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 1 D0713 08:48:05.152507 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:05.153312 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.153361 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 2 D0713 08:48:05.153404 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:05.154511 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.154611 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 3 D0713 08:48:05.154693 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:05.164733 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.164872 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 4 D0713 08:48:05.165028 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:05.166747 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.166809 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 5 D0713 08:48:05.166866 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:05.167227 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.167272 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 6 D0713 08:48:05.167358 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:05.172334 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.172401 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 7 D0713 08:48:05.172449 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:05.173225 374228 usertrap_amd64.go:212] [ 946: 947] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.173334 374228 usertrap_amd64.go:122] [ 946: 947] Allocate a new trap: 0xc002811e30 8 D0713 08:48:05.173428 374228 usertrap_amd64.go:225] [ 946: 947] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:05.174571 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.174680 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 9 D0713 08:48:05.174791 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46b57c trap addr 672d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:05.175020 374228 usertrap_amd64.go:212] [ 946: 947] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.175101 374228 usertrap_amd64.go:122] [ 946: 947] Allocate a new trap: 0xc002811e30 10 D0713 08:48:05.175211 374228 usertrap_amd64.go:225] [ 946: 947] Apply the binary patch addr 46af76 trap addr 67320 ([184 35 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:05.188391 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.188485 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 11 D0713 08:48:05.188594 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:05.189155 374228 usertrap_amd64.go:212] [ 946: 947] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.189208 374228 usertrap_amd64.go:122] [ 946: 947] Allocate a new trap: 0xc002811e30 12 D0713 08:48:05.189281 374228 usertrap_amd64.go:225] [ 946: 947] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:05.189508 374228 usertrap_amd64.go:212] [ 946: 947] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.189571 374228 usertrap_amd64.go:122] [ 946: 947] Allocate a new trap: 0xc002811e30 13 D0713 08:48:05.189637 374228 usertrap_amd64.go:225] [ 946: 947] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:05.189891 374228 task_signals.go:470] [ 946: 946] Notified of signal 23 D0713 08:48:05.190207 374228 task_signals.go:220] [ 946: 946] Signal 23: delivering to handler D0713 08:48:05.201999 374228 task_signals.go:470] [ 946: 946] Notified of signal 23 D0713 08:48:05.202724 374228 task_signals.go:220] [ 946: 946] Signal 23: delivering to handler D0713 08:48:05.209473 374228 usertrap_amd64.go:212] [ 946: 946] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.209601 374228 usertrap_amd64.go:122] [ 946: 946] Allocate a new trap: 0xc002811e30 14 D0713 08:48:05.209704 374228 usertrap_amd64.go:225] [ 946: 946] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:05.209959 374228 task_exit.go:204] [ 946: 946] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.210107 374228 task_signals.go:204] [ 946: 947] Signal 946, PID: 947, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.210249 374228 task_signals.go:204] [ 946: 949] Signal 946, PID: 949, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.210268 374228 task_signals.go:204] [ 946: 950] Signal 946, PID: 950, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.210324 374228 task_exit.go:204] [ 946: 947] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.210251 374228 task_signals.go:204] [ 946: 948] Signal 946, PID: 948, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.210421 374228 task_exit.go:204] [ 946: 950] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.210648 374228 task_exit.go:204] [ 946: 950] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.210707 374228 task_exit.go:204] [ 946: 950] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.210932 374228 task_exit.go:204] [ 946: 949] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.211140 374228 task_exit.go:204] [ 946: 949] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.211214 374228 task_exit.go:204] [ 946: 949] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.211384 374228 task_exit.go:204] [ 946: 948] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.211655 374228 task_exit.go:204] [ 946: 947] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.211799 374228 task_exit.go:204] [ 946: 947] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.211922 374228 task_exit.go:204] [ 946: 946] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.217420 374228 task_exit.go:204] [ 946: 948] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.217516 374228 task_exit.go:204] [ 946: 948] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.217612 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.217779 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:05.217849 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.217947 374228 task_exit.go:204] [ 946: 946] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.220506 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.226029 374228 syscalls.go:262] [ 951: 951] Allocating stack with size of 8388608 bytes D0713 08:48:05.226616 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.230788 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.230939 374228 usertrap_amd64.go:106] [ 951: 951] Map a usertrap vma at 61000 D0713 08:48:05.231277 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 1 D0713 08:48:05.231403 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:05.232317 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.232416 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 2 D0713 08:48:05.232502 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:05.233913 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.233987 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 3 D0713 08:48:05.234049 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:05.246963 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.247068 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 4 D0713 08:48:05.247194 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:05.249346 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.249453 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 5 D0713 08:48:05.249503 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:05.249646 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.249723 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 6 D0713 08:48:05.249783 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:05.256190 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.256304 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 7 D0713 08:48:05.256393 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:05.257240 374228 usertrap_amd64.go:212] [ 951: 952] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.257371 374228 usertrap_amd64.go:122] [ 951: 952] Allocate a new trap: 0xc001342e10 8 D0713 08:48:05.257473 374228 usertrap_amd64.go:225] [ 951: 952] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:05.258589 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.258665 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 9 D0713 08:48:05.258967 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:05.259100 374228 usertrap_amd64.go:212] [ 951: 952] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.259189 374228 usertrap_amd64.go:122] [ 951: 952] Allocate a new trap: 0xc001342e10 10 D0713 08:48:05.259267 374228 usertrap_amd64.go:225] [ 951: 952] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:05.269825 374228 usertrap_amd64.go:212] [ 951: 952] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.269915 374228 usertrap_amd64.go:122] [ 951: 952] Allocate a new trap: 0xc001342e10 11 D0713 08:48:05.269964 374228 usertrap_amd64.go:225] [ 951: 952] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:05.270222 374228 usertrap_amd64.go:212] [ 951: 952] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.270271 374228 usertrap_amd64.go:122] [ 951: 952] Allocate a new trap: 0xc001342e10 12 D0713 08:48:05.270329 374228 usertrap_amd64.go:225] [ 951: 952] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:05.270508 374228 task_signals.go:470] [ 951: 951] Notified of signal 23 D0713 08:48:05.271597 374228 task_signals.go:220] [ 951: 951] Signal 23: delivering to handler D0713 08:48:05.272621 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.272736 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 13 D0713 08:48:05.272867 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:05.283028 374228 task_signals.go:470] [ 951: 951] Notified of signal 23 D0713 08:48:05.283964 374228 task_signals.go:220] [ 951: 951] Signal 23: delivering to handler D0713 08:48:05.290193 374228 usertrap_amd64.go:212] [ 951: 951] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.290361 374228 usertrap_amd64.go:122] [ 951: 951] Allocate a new trap: 0xc001342e10 14 D0713 08:48:05.290474 374228 usertrap_amd64.go:225] [ 951: 951] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:05.290787 374228 task_exit.go:204] [ 951: 951] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.291009 374228 task_exit.go:204] [ 951: 951] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.291003 374228 task_signals.go:204] [ 951: 954] Signal 951, PID: 954, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.291129 374228 task_signals.go:204] [ 951: 955] Signal 951, PID: 955, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.291190 374228 task_exit.go:204] [ 951: 954] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.291321 374228 task_signals.go:204] [ 951: 952] Signal 951, PID: 952, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.291471 374228 task_exit.go:204] [ 951: 952] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.291650 374228 task_signals.go:204] [ 951: 953] Signal 951, PID: 953, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.291855 374228 task_exit.go:204] [ 951: 953] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.291997 374228 task_exit.go:204] [ 951: 955] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.292283 374228 task_exit.go:204] [ 951: 952] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.292392 374228 task_exit.go:204] [ 951: 952] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.292633 374228 task_exit.go:204] [ 951: 953] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.292684 374228 task_exit.go:204] [ 951: 953] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.292850 374228 task_exit.go:204] [ 951: 954] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.292896 374228 task_exit.go:204] [ 951: 954] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.297912 374228 task_exit.go:204] [ 951: 955] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.298005 374228 task_exit.go:204] [ 951: 955] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.298095 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.298276 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:05.298368 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.298324 374228 task_exit.go:204] [ 951: 951] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.301774 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.306020 374228 syscalls.go:262] [ 956: 956] Allocating stack with size of 8388608 bytes D0713 08:48:05.306643 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.308642 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.308747 374228 usertrap_amd64.go:106] [ 956: 956] Map a usertrap vma at 61000 D0713 08:48:05.309095 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 1 D0713 08:48:05.309191 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:05.309998 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.310041 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 2 D0713 08:48:05.310089 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:05.311382 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.311447 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 3 D0713 08:48:05.311533 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:05.321651 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.321714 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 4 D0713 08:48:05.321781 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:05.323800 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.323858 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 5 D0713 08:48:05.323933 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:05.324111 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.324154 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 6 D0713 08:48:05.324219 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:05.330887 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.330943 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 7 D0713 08:48:05.331044 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:05.331760 374228 usertrap_amd64.go:212] [ 956: 957] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.331870 374228 usertrap_amd64.go:122] [ 956: 957] Allocate a new trap: 0xc001342ff0 8 D0713 08:48:05.331987 374228 usertrap_amd64.go:225] [ 956: 957] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:05.332983 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.333059 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 9 D0713 08:48:05.333126 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:05.333563 374228 usertrap_amd64.go:212] [ 956: 957] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.333612 374228 usertrap_amd64.go:122] [ 956: 957] Allocate a new trap: 0xc001342ff0 10 D0713 08:48:05.333689 374228 usertrap_amd64.go:225] [ 956: 957] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:05.334563 374228 usertrap_amd64.go:212] [ 956: 957] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.334652 374228 usertrap_amd64.go:122] [ 956: 957] Allocate a new trap: 0xc001342ff0 11 D0713 08:48:05.334797 374228 usertrap_amd64.go:225] [ 956: 957] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:05.335226 374228 usertrap_amd64.go:212] [ 956: 957] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.335306 374228 usertrap_amd64.go:122] [ 956: 957] Allocate a new trap: 0xc001342ff0 12 D0713 08:48:05.335382 374228 usertrap_amd64.go:225] [ 956: 957] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:05.335693 374228 task_signals.go:470] [ 956: 959] Notified of signal 23 D0713 08:48:05.336011 374228 task_signals.go:179] [ 956: 959] Restarting syscall 202: interrupted by signal 23 D0713 08:48:05.336106 374228 task_signals.go:220] [ 956: 959] Signal 23: delivering to handler D0713 08:48:05.346358 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.346432 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 13 D0713 08:48:05.346497 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:05.358709 374228 task_signals.go:470] [ 956: 956] Notified of signal 23 D0713 08:48:05.358946 374228 task_signals.go:220] [ 956: 956] Signal 23: delivering to handler I0713 08:48:05.364750 374228 compat.go:120] Unsupported syscall open_tree(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/open_tree for more information. D0713 08:48:05.365032 374228 usertrap_amd64.go:212] [ 956: 956] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.365111 374228 usertrap_amd64.go:122] [ 956: 956] Allocate a new trap: 0xc001342ff0 14 D0713 08:48:05.365177 374228 usertrap_amd64.go:225] [ 956: 956] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:05.365507 374228 task_exit.go:204] [ 956: 956] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.365766 374228 task_signals.go:204] [ 956: 960] Signal 956, PID: 960, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.365826 374228 task_signals.go:204] [ 956: 957] Signal 956, PID: 957, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.365998 374228 task_signals.go:204] [ 956: 958] Signal 956, PID: 958, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.366025 374228 task_exit.go:204] [ 956: 957] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.366215 374228 task_signals.go:204] [ 956: 959] Signal 956, PID: 959, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.366342 374228 task_exit.go:204] [ 956: 956] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.366471 374228 task_exit.go:204] [ 956: 960] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.366582 374228 task_exit.go:204] [ 956: 960] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.366618 374228 task_exit.go:204] [ 956: 960] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.366761 374228 task_exit.go:204] [ 956: 958] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.367032 374228 task_exit.go:204] [ 956: 959] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.367296 374228 task_exit.go:204] [ 956: 957] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.367367 374228 task_exit.go:204] [ 956: 957] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.367575 374228 task_exit.go:204] [ 956: 958] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.367728 374228 task_exit.go:204] [ 956: 958] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.373439 374228 task_exit.go:204] [ 956: 959] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.373543 374228 task_exit.go:204] [ 956: 959] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.373678 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.373813 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:05.373899 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.374528 374228 task_exit.go:204] [ 956: 956] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.377617 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.383194 374228 syscalls.go:262] [ 961: 961] Allocating stack with size of 8388608 bytes D0713 08:48:05.383827 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.384233 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:05.384476 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.385884 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.385991 374228 usertrap_amd64.go:106] [ 961: 961] Map a usertrap vma at 61000 D0713 08:48:05.386238 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 1 D0713 08:48:05.386341 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:05.387199 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.387257 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 2 D0713 08:48:05.387333 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:05.388755 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.388826 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 3 D0713 08:48:05.388924 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:05.398911 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.398990 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 4 D0713 08:48:05.399042 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:05.400686 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.400756 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 5 D0713 08:48:05.400802 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:05.400929 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.401033 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 6 D0713 08:48:05.401092 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:05.405605 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.405660 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 7 D0713 08:48:05.405752 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:05.406438 374228 usertrap_amd64.go:212] [ 961: 962] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.406522 374228 usertrap_amd64.go:122] [ 961: 962] Allocate a new trap: 0xc0008ac990 8 D0713 08:48:05.406608 374228 usertrap_amd64.go:225] [ 961: 962] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:05.407503 374228 usertrap_amd64.go:212] [ 961: 962] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.407575 374228 usertrap_amd64.go:122] [ 961: 962] Allocate a new trap: 0xc0008ac990 9 D0713 08:48:05.407652 374228 usertrap_amd64.go:225] [ 961: 962] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:05.408856 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.408978 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 10 D0713 08:48:05.409089 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:05.419969 374228 usertrap_amd64.go:212] [ 961: 962] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.420069 374228 usertrap_amd64.go:122] [ 961: 962] Allocate a new trap: 0xc0008ac990 11 D0713 08:48:05.420171 374228 usertrap_amd64.go:225] [ 961: 962] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:05.420330 374228 usertrap_amd64.go:212] [ 961: 962] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.420375 374228 usertrap_amd64.go:122] [ 961: 962] Allocate a new trap: 0xc0008ac990 12 D0713 08:48:05.420432 374228 usertrap_amd64.go:225] [ 961: 962] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:05.420534 374228 task_signals.go:470] [ 961: 961] Notified of signal 23 D0713 08:48:05.420676 374228 task_signals.go:220] [ 961: 961] Signal 23: delivering to handler D0713 08:48:05.423115 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.423181 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 13 D0713 08:48:05.423249 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:05.430912 374228 task_signals.go:470] [ 961: 961] Notified of signal 23 D0713 08:48:05.431025 374228 task_signals.go:220] [ 961: 961] Signal 23: delivering to handler D0713 08:48:05.440311 374228 usertrap_amd64.go:212] [ 961: 961] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.440450 374228 usertrap_amd64.go:122] [ 961: 961] Allocate a new trap: 0xc0008ac990 14 D0713 08:48:05.440528 374228 usertrap_amd64.go:225] [ 961: 961] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:05.440731 374228 task_exit.go:204] [ 961: 961] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.440839 374228 task_signals.go:204] [ 961: 964] Signal 961, PID: 964, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.440868 374228 task_exit.go:204] [ 961: 961] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.441061 374228 task_signals.go:204] [ 961: 962] Signal 961, PID: 962, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.441138 374228 task_signals.go:204] [ 961: 965] Signal 961, PID: 965, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.441254 374228 task_exit.go:204] [ 961: 964] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.441394 374228 task_signals.go:204] [ 961: 963] Signal 961, PID: 963, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.441466 374228 task_exit.go:204] [ 961: 965] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.441588 374228 task_exit.go:204] [ 961: 962] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.441759 374228 task_exit.go:204] [ 961: 964] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.441811 374228 task_exit.go:204] [ 961: 964] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.442015 374228 task_exit.go:204] [ 961: 965] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.442071 374228 task_exit.go:204] [ 961: 965] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.442197 374228 task_exit.go:204] [ 961: 963] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.442478 374228 task_exit.go:204] [ 961: 962] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.442559 374228 task_exit.go:204] [ 961: 962] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.448034 374228 task_exit.go:204] [ 961: 963] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.448092 374228 task_exit.go:204] [ 961: 963] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.448189 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.448313 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:05.448406 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.449216 374228 task_exit.go:204] [ 961: 961] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.469083 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:05.469220 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.500775 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:05.500885 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.518431 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:05.518623 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.519637 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.523785 374228 syscalls.go:262] [ 966: 966] Allocating stack with size of 8388608 bytes D0713 08:48:05.524437 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.526534 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.526681 374228 usertrap_amd64.go:106] [ 966: 966] Map a usertrap vma at 68000 D0713 08:48:05.526974 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 1 D0713 08:48:05.527118 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:48:05.527933 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.527982 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 2 D0713 08:48:05.528033 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:48:05.529642 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.529725 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 3 D0713 08:48:05.529791 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:48:05.540622 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.540720 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 4 D0713 08:48:05.540832 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:48:05.542852 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.542993 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 5 D0713 08:48:05.543081 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:48:05.543289 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.543332 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 6 D0713 08:48:05.543389 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:48:05.547963 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.548066 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 7 D0713 08:48:05.548134 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:48:05.548886 374228 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.549024 374228 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc0010d8480 8 D0713 08:48:05.549125 374228 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:48:05.550102 374228 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.550186 374228 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc0010d8480 9 D0713 08:48:05.550274 374228 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:48:05.550463 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.550526 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 10 D0713 08:48:05.550573 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:48:05.550815 374228 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.550880 374228 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc0010d8480 11 D0713 08:48:05.550943 374228 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:48:05.551153 374228 usertrap_amd64.go:212] [ 966: 967] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.551248 374228 usertrap_amd64.go:122] [ 966: 967] Allocate a new trap: 0xc0010d8480 12 D0713 08:48:05.551312 374228 usertrap_amd64.go:225] [ 966: 967] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:48:05.551613 374228 task_signals.go:470] [ 966: 969] Notified of signal 23 D0713 08:48:05.551865 374228 task_signals.go:179] [ 966: 969] Restarting syscall 202: interrupted by signal 23 D0713 08:48:05.551952 374228 task_signals.go:220] [ 966: 969] Signal 23: delivering to handler D0713 08:48:05.563575 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.563668 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 13 D0713 08:48:05.563685 374228 task_signals.go:470] [ 966: 966] Notified of signal 23 D0713 08:48:05.563765 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:48:05.563899 374228 task_signals.go:220] [ 966: 966] Signal 23: delivering to handler D0713 08:48:05.564381 374228 task_signals.go:470] [ 966: 966] Notified of signal 23 D0713 08:48:05.564661 374228 task_signals.go:220] [ 966: 966] Signal 23: delivering to handler I0713 08:48:05.581081 374228 compat.go:120] Unsupported syscall sys_437(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_437 for more information. D0713 08:48:05.581284 374228 usertrap_amd64.go:212] [ 966: 966] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.581343 374228 usertrap_amd64.go:122] [ 966: 966] Allocate a new trap: 0xc0010d8480 14 D0713 08:48:05.581409 374228 usertrap_amd64.go:225] [ 966: 966] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:48:05.581624 374228 task_exit.go:204] [ 966: 966] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.581812 374228 task_exit.go:204] [ 966: 966] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.581812 374228 task_signals.go:204] [ 966: 970] Signal 966, PID: 970, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.581773 374228 task_signals.go:204] [ 966: 968] Signal 966, PID: 968, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.581932 374228 task_exit.go:204] [ 966: 970] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.582025 374228 task_signals.go:204] [ 966: 967] Signal 966, PID: 967, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.582218 374228 task_signals.go:204] [ 966: 969] Signal 966, PID: 969, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.582266 374228 task_exit.go:204] [ 966: 970] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.582340 374228 task_exit.go:204] [ 966: 970] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.582469 374228 task_exit.go:204] [ 966: 968] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.582597 374228 task_exit.go:204] [ 966: 967] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.582757 374228 task_exit.go:204] [ 966: 969] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.583020 374228 task_exit.go:204] [ 966: 968] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.583069 374228 task_exit.go:204] [ 966: 968] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.583295 374228 task_exit.go:204] [ 966: 967] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.583381 374228 task_exit.go:204] [ 966: 967] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.588619 374228 task_exit.go:204] [ 966: 969] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.588708 374228 task_exit.go:204] [ 966: 969] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.588830 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.589009 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:05.589097 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.589703 374228 task_exit.go:204] [ 966: 966] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.592355 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.597291 374228 syscalls.go:262] [ 971: 971] Allocating stack with size of 8388608 bytes D0713 08:48:05.597967 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.599311 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:05.599409 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 23 D0713 08:48:05.599452 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.600505 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.600597 374228 usertrap_amd64.go:106] [ 971: 971] Map a usertrap vma at 69000 D0713 08:48:05.600832 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 1 D0713 08:48:05.600923 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:05.601670 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.601708 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 2 D0713 08:48:05.601761 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:05.602786 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.602830 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 3 D0713 08:48:05.602893 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:05.612429 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.612546 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 4 D0713 08:48:05.612673 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:05.614651 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.614726 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 5 D0713 08:48:05.614817 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:05.615008 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.615050 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 6 D0713 08:48:05.615126 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:05.618553 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.618630 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 7 D0713 08:48:05.618710 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:05.619582 374228 usertrap_amd64.go:212] [ 971: 972] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.619673 374228 usertrap_amd64.go:122] [ 971: 972] Allocate a new trap: 0xc0013ef7d0 8 D0713 08:48:05.619781 374228 usertrap_amd64.go:225] [ 971: 972] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:05.620493 374228 usertrap_amd64.go:212] [ 971: 972] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.620565 374228 usertrap_amd64.go:122] [ 971: 972] Allocate a new trap: 0xc0013ef7d0 9 D0713 08:48:05.620633 374228 usertrap_amd64.go:225] [ 971: 972] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:05.621002 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.621134 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 10 D0713 08:48:05.621202 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:05.621484 374228 usertrap_amd64.go:212] [ 971: 974] Found the pattern at ip 46b6e0:sysno 24 D0713 08:48:05.621540 374228 usertrap_amd64.go:122] [ 971: 974] Allocate a new trap: 0xc0013ef7d0 11 D0713 08:48:05.621717 374228 usertrap_amd64.go:225] [ 971: 974] Apply the binary patch addr 46b6e0 trap addr 69370 ([184 24 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:05.632426 374228 usertrap_amd64.go:212] [ 971: 972] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.632515 374228 usertrap_amd64.go:122] [ 971: 972] Allocate a new trap: 0xc0013ef7d0 12 D0713 08:48:05.632604 374228 usertrap_amd64.go:225] [ 971: 972] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:05.632711 374228 usertrap_amd64.go:212] [ 971: 972] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.632758 374228 usertrap_amd64.go:122] [ 971: 972] Allocate a new trap: 0xc0013ef7d0 13 D0713 08:48:05.632810 374228 usertrap_amd64.go:225] [ 971: 972] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:05.633028 374228 task_signals.go:470] [ 971: 971] Notified of signal 23 D0713 08:48:05.633187 374228 task_signals.go:220] [ 971: 971] Signal 23: delivering to handler D0713 08:48:05.635553 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.635667 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 14 D0713 08:48:05.635741 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46af29 trap addr 69460 ([184 37 1 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:05.645488 374228 task_signals.go:470] [ 971: 971] Notified of signal 23 D0713 08:48:05.646106 374228 task_signals.go:220] [ 971: 971] Signal 23: delivering to handler I0713 08:48:05.650685 374228 compat.go:120] Unsupported syscall perf_event_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/perf_event_open for more information. D0713 08:48:05.650891 374228 usertrap_amd64.go:212] [ 971: 971] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.650963 374228 usertrap_amd64.go:122] [ 971: 971] Allocate a new trap: 0xc0013ef7d0 15 D0713 08:48:05.651069 374228 usertrap_amd64.go:225] [ 971: 971] Apply the binary patch addr 46ae44 trap addr 694b0 ([184 231 0 0 0 15 5] -> [255 36 37 176 148 6 0]) D0713 08:48:05.651290 374228 task_exit.go:204] [ 971: 971] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.651505 374228 task_signals.go:204] [ 971: 973] Signal 971, PID: 973, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.651618 374228 task_signals.go:204] [ 971: 972] Signal 971, PID: 972, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.651640 374228 task_signals.go:204] [ 971: 976] Signal 971, PID: 976, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.651711 374228 task_exit.go:204] [ 971: 973] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.651856 374228 task_signals.go:204] [ 971: 975] Signal 971, PID: 975, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.652091 374228 task_signals.go:204] [ 971: 974] Signal 971, PID: 974, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.652198 374228 task_exit.go:204] [ 971: 973] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.652260 374228 task_exit.go:204] [ 971: 973] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.652418 374228 task_exit.go:204] [ 971: 974] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.652591 374228 task_exit.go:204] [ 971: 974] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.652649 374228 task_exit.go:204] [ 971: 974] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.652734 374228 task_exit.go:204] [ 971: 975] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.652842 374228 task_exit.go:204] [ 971: 975] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.652880 374228 task_exit.go:204] [ 971: 975] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.653005 374228 task_exit.go:204] [ 971: 972] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.653162 374228 task_exit.go:204] [ 971: 972] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.653200 374228 task_exit.go:204] [ 971: 972] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.653274 374228 task_exit.go:204] [ 971: 976] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.653342 374228 task_exit.go:204] [ 971: 971] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.659490 374228 task_exit.go:204] [ 971: 976] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.659610 374228 task_exit.go:204] [ 971: 976] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.659702 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.659846 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:05.659898 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.660429 374228 task_exit.go:204] [ 971: 971] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.663310 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.668913 374228 syscalls.go:262] [ 977: 977] Allocating stack with size of 8388608 bytes D0713 08:48:05.669746 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.670803 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:05.671002 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 23 D0713 08:48:05.671068 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.672490 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.672621 374228 usertrap_amd64.go:106] [ 977: 977] Map a usertrap vma at 69000 D0713 08:48:05.672867 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 1 D0713 08:48:05.673003 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:05.673887 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.673941 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 2 D0713 08:48:05.674010 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:05.675374 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.675432 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 3 D0713 08:48:05.675524 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:05.686287 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.686395 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 4 D0713 08:48:05.686474 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:05.688516 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.688612 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 5 D0713 08:48:05.688672 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:05.688832 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.688879 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 6 D0713 08:48:05.689010 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:05.692833 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.692895 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 7 D0713 08:48:05.693001 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:05.693702 374228 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.693777 374228 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc00077d0b0 8 D0713 08:48:05.693861 374228 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:05.694549 374228 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.694627 374228 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc00077d0b0 9 D0713 08:48:05.694699 374228 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:05.695090 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.695157 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 10 D0713 08:48:05.695264 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:05.707968 374228 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.708075 374228 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc00077d0b0 11 D0713 08:48:05.708156 374228 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:05.708366 374228 usertrap_amd64.go:212] [ 977: 978] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.708418 374228 usertrap_amd64.go:122] [ 977: 978] Allocate a new trap: 0xc00077d0b0 12 D0713 08:48:05.708514 374228 usertrap_amd64.go:225] [ 977: 978] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:05.708730 374228 task_signals.go:470] [ 977: 977] Notified of signal 23 D0713 08:48:05.708727 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.708822 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 13 D0713 08:48:05.708890 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:05.709053 374228 task_signals.go:220] [ 977: 977] Signal 23: delivering to handler D0713 08:48:05.709543 374228 task_signals.go:470] [ 977: 977] Notified of signal 23 D0713 08:48:05.709638 374228 task_signals.go:220] [ 977: 977] Signal 23: delivering to handler D0713 08:48:05.710007 374228 task_signals.go:470] [ 977: 977] Notified of signal 23 D0713 08:48:05.710168 374228 task_signals.go:179] [ 977: 977] Restarting syscall 202: interrupted by signal 23 D0713 08:48:05.710250 374228 task_signals.go:220] [ 977: 977] Signal 23: delivering to handler D0713 08:48:05.721011 374228 task_signals.go:470] [ 977: 977] Notified of signal 23 D0713 08:48:05.721262 374228 task_signals.go:179] [ 977: 977] Restarting syscall 202: interrupted by signal 23 D0713 08:48:05.721386 374228 task_signals.go:220] [ 977: 977] Signal 23: delivering to handler I0713 08:48:05.724866 374228 compat.go:120] Unsupported syscall personality(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/personality for more information. D0713 08:48:05.725190 374228 usertrap_amd64.go:212] [ 977: 977] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.725249 374228 usertrap_amd64.go:122] [ 977: 977] Allocate a new trap: 0xc00077d0b0 14 D0713 08:48:05.725347 374228 usertrap_amd64.go:225] [ 977: 977] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:05.725727 374228 task_exit.go:204] [ 977: 977] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.725981 374228 task_signals.go:204] [ 977: 979] Signal 977, PID: 979, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.726004 374228 task_signals.go:204] [ 977: 978] Signal 977, PID: 978, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.726189 374228 task_signals.go:204] [ 977: 981] Signal 977, PID: 981, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.726233 374228 task_signals.go:204] [ 977: 980] Signal 977, PID: 980, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.726299 374228 task_exit.go:204] [ 977: 977] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.726398 374228 task_exit.go:204] [ 977: 979] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.726513 374228 task_exit.go:204] [ 977: 978] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.726629 374228 task_exit.go:204] [ 977: 981] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.726844 374228 task_exit.go:204] [ 977: 981] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.726896 374228 task_exit.go:204] [ 977: 981] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.727081 374228 task_exit.go:204] [ 977: 980] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.727327 374228 task_exit.go:204] [ 977: 978] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.727382 374228 task_exit.go:204] [ 977: 978] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.727624 374228 task_exit.go:204] [ 977: 979] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.727697 374228 task_exit.go:204] [ 977: 979] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.733317 374228 task_exit.go:204] [ 977: 980] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.733385 374228 task_exit.go:204] [ 977: 980] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.733498 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.733734 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:05.733856 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.734599 374228 task_exit.go:204] [ 977: 977] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.737466 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.743808 374228 syscalls.go:262] [ 982: 982] Allocating stack with size of 8388608 bytes D0713 08:48:05.744148 374228 task_signals.go:481] [ 7: 7] No task notified of signal 23 D0713 08:48:05.744869 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.745341 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.745716 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:05.745829 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.747129 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.747237 374228 usertrap_amd64.go:106] [ 982: 982] Map a usertrap vma at 69000 D0713 08:48:05.747526 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 1 D0713 08:48:05.747661 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:05.748792 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.748855 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 2 D0713 08:48:05.748910 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:05.750416 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.750490 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 3 D0713 08:48:05.750558 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:05.760157 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.760257 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 4 D0713 08:48:05.760316 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:05.762240 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.762287 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 5 D0713 08:48:05.762362 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:05.762493 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.762533 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 6 D0713 08:48:05.762594 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:05.768636 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.768693 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 7 D0713 08:48:05.768781 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:05.769766 374228 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.769854 374228 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc00077d500 8 D0713 08:48:05.769947 374228 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:05.770475 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.770532 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 9 D0713 08:48:05.770601 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:05.771026 374228 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.771117 374228 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc00077d500 10 D0713 08:48:05.771195 374228 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:05.781601 374228 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.781679 374228 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc00077d500 11 D0713 08:48:05.781744 374228 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:05.781927 374228 usertrap_amd64.go:212] [ 982: 983] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.781982 374228 usertrap_amd64.go:122] [ 982: 983] Allocate a new trap: 0xc00077d500 12 D0713 08:48:05.782073 374228 usertrap_amd64.go:225] [ 982: 983] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:05.782199 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.782256 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 13 D0713 08:48:05.782276 374228 task_signals.go:470] [ 982: 982] Notified of signal 23 D0713 08:48:05.782316 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:05.782398 374228 task_signals.go:220] [ 982: 982] Signal 23: delivering to handler D0713 08:48:05.782671 374228 task_signals.go:470] [ 982: 982] Notified of signal 23 D0713 08:48:05.782824 374228 task_signals.go:220] [ 982: 982] Signal 23: delivering to handler D0713 08:48:05.783343 374228 task_signals.go:470] [ 982: 982] Notified of signal 23 D0713 08:48:05.783465 374228 task_signals.go:220] [ 982: 982] Signal 23: delivering to handler D0713 08:48:05.794892 374228 task_signals.go:470] [ 982: 982] Notified of signal 23 D0713 08:48:05.796506 374228 task_signals.go:220] [ 982: 982] Signal 23: delivering to handler I0713 08:48:05.797474 374228 compat.go:120] Unsupported syscall sys_438(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_438 for more information. D0713 08:48:05.797640 374228 usertrap_amd64.go:212] [ 982: 982] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.797710 374228 usertrap_amd64.go:122] [ 982: 982] Allocate a new trap: 0xc00077d500 14 D0713 08:48:05.797803 374228 usertrap_amd64.go:225] [ 982: 982] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:05.798050 374228 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.798223 374228 task_signals.go:204] [ 982: 984] Signal 982, PID: 984, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.798243 374228 task_signals.go:204] [ 982: 983] Signal 982, PID: 983, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.798320 374228 task_signals.go:204] [ 982: 985] Signal 982, PID: 985, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.798370 374228 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.798363 374228 task_signals.go:204] [ 982: 986] Signal 982, PID: 986, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.798467 374228 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.798604 374228 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.798683 374228 task_exit.go:204] [ 982: 983] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.798769 374228 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.798893 374228 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.798931 374228 task_exit.go:204] [ 982: 985] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.798986 374228 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.799089 374228 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.799121 374228 task_exit.go:204] [ 982: 984] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.799194 374228 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.804848 374228 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.804916 374228 task_exit.go:204] [ 982: 986] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.805055 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.805224 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:05.805279 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.805776 374228 task_exit.go:204] [ 982: 982] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.808800 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.812643 374228 syscalls.go:262] [ 987: 987] Allocating stack with size of 8388608 bytes D0713 08:48:05.813231 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.815032 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.815137 374228 usertrap_amd64.go:106] [ 987: 987] Map a usertrap vma at 62000 D0713 08:48:05.815349 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 1 D0713 08:48:05.815431 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:48:05.816162 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.816215 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 2 D0713 08:48:05.816266 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:48:05.817413 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.817466 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 3 D0713 08:48:05.817537 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:48:05.827180 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.827277 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 4 D0713 08:48:05.827344 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:48:05.829097 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.829171 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 5 D0713 08:48:05.829301 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:48:05.829520 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.829572 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 6 D0713 08:48:05.829641 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:48:05.833458 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.833526 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 7 D0713 08:48:05.833578 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:48:05.834279 374228 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.834350 374228 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc0008ad530 8 D0713 08:48:05.834423 374228 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:48:05.835615 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.835811 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 9 D0713 08:48:05.835899 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46b57c trap addr 622d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:48:05.836154 374228 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.836223 374228 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc0008ad530 10 D0713 08:48:05.836288 374228 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:48:05.848159 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.848248 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 11 D0713 08:48:05.848318 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:48:05.848486 374228 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.848556 374228 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc0008ad530 12 D0713 08:48:05.848647 374228 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:48:05.849088 374228 usertrap_amd64.go:212] [ 987: 988] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.849161 374228 usertrap_amd64.go:122] [ 987: 988] Allocate a new trap: 0xc0008ad530 13 D0713 08:48:05.849246 374228 usertrap_amd64.go:225] [ 987: 988] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:48:05.849485 374228 task_signals.go:470] [ 987: 987] Notified of signal 23 D0713 08:48:05.849575 374228 task_signals.go:220] [ 987: 987] Signal 23: delivering to handler D0713 08:48:05.860996 374228 task_signals.go:470] [ 987: 987] Notified of signal 23 D0713 08:48:05.862251 374228 task_signals.go:220] [ 987: 987] Signal 23: delivering to handler I0713 08:48:05.863114 374228 compat.go:120] Unsupported syscall pidfd_open(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_open for more information. D0713 08:48:05.863288 374228 usertrap_amd64.go:212] [ 987: 987] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.863345 374228 usertrap_amd64.go:122] [ 987: 987] Allocate a new trap: 0xc0008ad530 14 D0713 08:48:05.863419 374228 usertrap_amd64.go:225] [ 987: 987] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:48:05.863646 374228 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.863797 374228 task_signals.go:204] [ 987: 989] Signal 987, PID: 989, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.863838 374228 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.863949 374228 task_signals.go:204] [ 987: 991] Signal 987, PID: 991, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.863992 374228 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.864101 374228 task_signals.go:204] [ 987: 990] Signal 987, PID: 990, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.864208 374228 task_signals.go:204] [ 987: 992] Signal 987, PID: 992, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.864237 374228 task_signals.go:204] [ 987: 988] Signal 987, PID: 988, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.864360 374228 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.864403 374228 task_exit.go:204] [ 987: 989] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.864547 374228 task_exit.go:204] [ 987: 992] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.864697 374228 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.864923 374228 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.865142 374228 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.865195 374228 task_exit.go:204] [ 987: 990] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.865305 374228 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.865561 374228 task_exit.go:204] [ 987: 992] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.865634 374228 task_exit.go:204] [ 987: 992] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.865725 374228 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.865771 374228 task_exit.go:204] [ 987: 991] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.870244 374228 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.870328 374228 task_exit.go:204] [ 987: 988] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.870421 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.870552 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:05.870622 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.871157 374228 task_exit.go:204] [ 987: 987] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.873576 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.878886 374228 syscalls.go:262] [ 993: 993] Allocating stack with size of 8388608 bytes D0713 08:48:05.879517 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.881616 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.881730 374228 usertrap_amd64.go:106] [ 993: 993] Map a usertrap vma at 63000 D0713 08:48:05.882068 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 1 D0713 08:48:05.882164 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:05.882899 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.882943 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 2 D0713 08:48:05.883004 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:05.884056 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.884096 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 3 D0713 08:48:05.884138 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:05.892494 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.892559 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 4 D0713 08:48:05.892621 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:05.894630 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.894698 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 5 D0713 08:48:05.894787 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:05.894936 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.895003 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 6 D0713 08:48:05.895088 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:05.900658 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.900722 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 7 D0713 08:48:05.900768 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:05.901583 374228 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.901666 374228 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc0008ad770 8 D0713 08:48:05.901739 374228 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:05.902432 374228 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.902502 374228 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc0008ad770 9 D0713 08:48:05.902564 374228 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:05.902736 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.902807 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 10 D0713 08:48:05.903231 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:05.914143 374228 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.914210 374228 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc0008ad770 11 D0713 08:48:05.914272 374228 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:05.914419 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.914500 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 12 D0713 08:48:05.914594 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46af29 trap addr 633c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:05.914858 374228 usertrap_amd64.go:212] [ 993: 994] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.914928 374228 usertrap_amd64.go:122] [ 993: 994] Allocate a new trap: 0xc0008ad770 13 D0713 08:48:05.914998 374228 usertrap_amd64.go:225] [ 993: 994] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:05.915123 374228 task_signals.go:470] [ 993: 993] Notified of signal 23 D0713 08:48:05.915339 374228 task_signals.go:179] [ 993: 993] Restarting syscall 202: interrupted by signal 23 D0713 08:48:05.915401 374228 task_signals.go:220] [ 993: 993] Signal 23: delivering to handler D0713 08:48:05.926438 374228 task_signals.go:470] [ 993: 993] Notified of signal 23 D0713 08:48:05.928092 374228 task_signals.go:220] [ 993: 993] Signal 23: delivering to handler I0713 08:48:05.929377 374228 compat.go:120] Unsupported syscall pidfd_send_signal(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pidfd_send_signal for more information. D0713 08:48:05.929548 374228 usertrap_amd64.go:212] [ 993: 993] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.929623 374228 usertrap_amd64.go:122] [ 993: 993] Allocate a new trap: 0xc0008ad770 14 D0713 08:48:05.929706 374228 usertrap_amd64.go:225] [ 993: 993] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:05.929902 374228 task_exit.go:204] [ 993: 993] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.930019 374228 task_signals.go:204] [ 993: 997] Signal 993, PID: 997, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.930065 374228 task_signals.go:204] [ 993: 996] Signal 993, PID: 996, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.930105 374228 task_signals.go:204] [ 993: 994] Signal 993, PID: 994, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.930141 374228 task_signals.go:204] [ 993: 995] Signal 993, PID: 995, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.930147 374228 task_exit.go:204] [ 993: 997] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.930328 374228 task_exit.go:204] [ 993: 994] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.930458 374228 task_exit.go:204] [ 993: 995] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.930584 374228 task_exit.go:204] [ 993: 994] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.930656 374228 task_exit.go:204] [ 993: 994] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.930893 374228 task_exit.go:204] [ 993: 997] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.930959 374228 task_exit.go:204] [ 993: 997] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.931082 374228 task_exit.go:204] [ 993: 993] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.931229 374228 task_exit.go:204] [ 993: 996] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.931436 374228 task_exit.go:204] [ 993: 995] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.931499 374228 task_exit.go:204] [ 993: 995] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.937318 374228 task_exit.go:204] [ 993: 996] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.937404 374228 task_exit.go:204] [ 993: 996] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.937490 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.937613 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:05.937684 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:05.938238 374228 task_exit.go:204] [ 993: 993] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.940456 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.946937 374228 syscalls.go:262] [ 998: 998] Allocating stack with size of 8388608 bytes D0713 08:48:05.947748 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:05.948081 374228 task_signals.go:481] [ 7: 7] No task notified of signal 23 D0713 08:48:05.948311 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.948749 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:05.948826 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:05.949796 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:05.949907 374228 usertrap_amd64.go:106] [ 998: 998] Map a usertrap vma at 65000 D0713 08:48:05.950215 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 1 D0713 08:48:05.950341 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:48:05.951139 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:05.951200 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 2 D0713 08:48:05.951267 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:48:05.952387 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:05.952445 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 3 D0713 08:48:05.952501 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:48:05.961012 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:05.961058 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 4 D0713 08:48:05.961140 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:48:05.962784 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:05.962863 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 5 D0713 08:48:05.962982 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:48:05.963187 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b214:sysno 13 D0713 08:48:05.963257 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 6 D0713 08:48:05.963309 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:48:05.967109 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:05.967167 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 7 D0713 08:48:05.967228 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:48:05.967934 374228 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:05.967988 374228 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc002a52600 8 D0713 08:48:05.968104 374228 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:48:05.969057 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:05.969174 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 9 D0713 08:48:05.969275 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:48:05.969616 374228 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46af76:sysno 35 D0713 08:48:05.969725 374228 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc002a52600 10 D0713 08:48:05.969845 374228 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:48:05.979732 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46af29:sysno 293 D0713 08:48:05.979789 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 11 D0713 08:48:05.979836 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46af29 trap addr 65370 ([184 37 1 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:48:05.980237 374228 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b020:sysno 39 D0713 08:48:05.980290 374228 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc002a52600 12 D0713 08:48:05.980375 374228 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b020 trap addr 653c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:48:05.980528 374228 usertrap_amd64.go:212] [ 998: 999] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:05.980601 374228 usertrap_amd64.go:122] [ 998: 999] Allocate a new trap: 0xc002a52600 13 D0713 08:48:05.980692 374228 usertrap_amd64.go:225] [ 998: 999] Apply the binary patch addr 46b04f trap addr 65410 ([184 234 0 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:48:05.980876 374228 task_signals.go:470] [ 998: 998] Notified of signal 23 D0713 08:48:05.980980 374228 task_signals.go:220] [ 998: 998] Signal 23: delivering to handler D0713 08:48:05.992888 374228 usertrap_amd64.go:212] [ 998: 998] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:05.992979 374228 usertrap_amd64.go:122] [ 998: 998] Allocate a new trap: 0xc002a52600 14 D0713 08:48:05.993069 374228 usertrap_amd64.go:225] [ 998: 998] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:48:05.993257 374228 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.993395 374228 task_signals.go:204] [ 998: 1002] Signal 998, PID: 1002, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.993397 374228 task_signals.go:204] [ 998: 999] Signal 998, PID: 999, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.993477 374228 task_signals.go:204] [ 998: 1001] Signal 998, PID: 1001, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.993505 374228 task_signals.go:204] [ 998: 1000] Signal 998, PID: 1000, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:05.993638 374228 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.993813 374228 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.993872 374228 task_exit.go:204] [ 998: 999] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.994023 374228 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.994217 374228 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.994288 374228 task_exit.go:204] [ 998: 1002] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.994425 374228 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.994554 374228 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.994709 374228 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.994749 374228 task_exit.go:204] [ 998: 1001] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.994847 374228 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:05.999631 374228 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:05.999688 374228 task_exit.go:204] [ 998: 1000] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:05.999785 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:05.999904 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:05.999959 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.000529 374228 task_exit.go:204] [ 998: 998] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.003445 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.011991 374228 task_signals.go:481] [ 7: 7] No task notified of signal 23 D0713 08:48:06.012477 374228 syscalls.go:262] [ 1003: 1003] Allocating stack with size of 8388608 bytes D0713 08:48:06.013183 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.013414 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:06.013936 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:06.014110 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:06.015707 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.015914 374228 usertrap_amd64.go:106] [ 1003: 1003] Map a usertrap vma at 66000 D0713 08:48:06.016298 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 1 D0713 08:48:06.016439 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:06.017623 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.017698 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 2 D0713 08:48:06.017810 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:06.019551 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.019603 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 3 D0713 08:48:06.019681 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:06.031463 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.031539 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 4 D0713 08:48:06.031613 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:06.033370 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.033446 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 5 D0713 08:48:06.033524 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:06.033687 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.033747 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 6 D0713 08:48:06.033803 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:06.037859 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.037940 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 7 D0713 08:48:06.038037 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:06.038703 374228 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.038791 374228 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc002a52060 8 D0713 08:48:06.038861 374228 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:06.039569 374228 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.039643 374228 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc002a52060 9 D0713 08:48:06.039999 374228 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:06.040157 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.040269 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 10 D0713 08:48:06.040357 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:06.051985 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.052066 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 11 D0713 08:48:06.052129 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:06.054363 374228 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.054473 374228 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc002a52060 12 D0713 08:48:06.054583 374228 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:06.054824 374228 usertrap_amd64.go:212] [ 1003: 1004] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.054884 374228 usertrap_amd64.go:122] [ 1003: 1004] Allocate a new trap: 0xc002a52060 13 D0713 08:48:06.054959 374228 usertrap_amd64.go:225] [ 1003: 1004] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:06.055129 374228 task_signals.go:470] [ 1003: 1003] Notified of signal 23 D0713 08:48:06.057068 374228 task_signals.go:220] [ 1003: 1003] Signal 23: delivering to handler D0713 08:48:06.067447 374228 usertrap_amd64.go:212] [ 1003: 1003] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.067528 374228 usertrap_amd64.go:122] [ 1003: 1003] Allocate a new trap: 0xc002a52060 14 D0713 08:48:06.067639 374228 usertrap_amd64.go:225] [ 1003: 1003] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:06.067879 374228 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.068116 374228 task_signals.go:204] [ 1003: 1005] Signal 1003, PID: 1005, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.068155 374228 task_signals.go:204] [ 1003: 1007] Signal 1003, PID: 1007, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.068276 374228 task_signals.go:204] [ 1003: 1006] Signal 1003, PID: 1006, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.068318 374228 task_signals.go:204] [ 1003: 1004] Signal 1003, PID: 1004, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.068416 374228 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.068588 374228 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.068741 374228 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.068841 374228 task_exit.go:204] [ 1003: 1005] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.069020 374228 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.069145 374228 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.069310 374228 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.069779 374228 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.069845 374228 task_exit.go:204] [ 1003: 1006] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.070037 374228 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.070157 374228 task_exit.go:204] [ 1003: 1004] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.075159 374228 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.075235 374228 task_exit.go:204] [ 1003: 1007] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.075314 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.075465 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:06.075509 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.075813 374228 task_exit.go:204] [ 1003: 1003] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.078604 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.084259 374228 syscalls.go:262] [ 1008: 1008] Allocating stack with size of 8388608 bytes D0713 08:48:06.085550 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.085907 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:06.086059 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:06.087408 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.087537 374228 usertrap_amd64.go:106] [ 1008: 1008] Map a usertrap vma at 66000 D0713 08:48:06.087822 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 1 D0713 08:48:06.087939 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:06.089004 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.089064 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 2 D0713 08:48:06.089122 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:06.090216 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.090285 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 3 D0713 08:48:06.090339 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:06.101838 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.101898 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 4 D0713 08:48:06.101955 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:06.103554 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.103596 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 5 D0713 08:48:06.103639 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:06.103804 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.103859 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 6 D0713 08:48:06.103910 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:06.107370 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.107419 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 7 D0713 08:48:06.107469 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:06.108048 374228 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.108107 374228 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc002a52330 8 D0713 08:48:06.108212 374228 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:06.108596 374228 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.108673 374228 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc002a52330 9 D0713 08:48:06.108732 374228 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:06.109080 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.109182 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 10 D0713 08:48:06.109290 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:06.120654 374228 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.120752 374228 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc002a52330 11 D0713 08:48:06.120823 374228 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:06.121033 374228 usertrap_amd64.go:212] [ 1008: 1009] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.121175 374228 usertrap_amd64.go:122] [ 1008: 1009] Allocate a new trap: 0xc002a52330 12 D0713 08:48:06.121355 374228 usertrap_amd64.go:225] [ 1008: 1009] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:06.121686 374228 task_signals.go:470] [ 1008: 1008] Notified of signal 23 D0713 08:48:06.121890 374228 task_signals.go:220] [ 1008: 1008] Signal 23: delivering to handler D0713 08:48:06.125693 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.125776 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 13 D0713 08:48:06.125843 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:06.133082 374228 task_signals.go:470] [ 1008: 1008] Notified of signal 23 D0713 08:48:06.137062 374228 task_signals.go:220] [ 1008: 1008] Signal 23: delivering to handler D0713 08:48:06.147252 374228 usertrap_amd64.go:212] [ 1008: 1008] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.147391 374228 usertrap_amd64.go:122] [ 1008: 1008] Allocate a new trap: 0xc002a52330 14 D0713 08:48:06.147496 374228 usertrap_amd64.go:225] [ 1008: 1008] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:06.147783 374228 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.148053 374228 task_signals.go:204] [ 1008: 1009] Signal 1008, PID: 1009, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.148134 374228 task_signals.go:204] [ 1008: 1012] Signal 1008, PID: 1012, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.148143 374228 task_signals.go:204] [ 1008: 1010] Signal 1008, PID: 1010, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.148196 374228 task_signals.go:204] [ 1008: 1011] Signal 1008, PID: 1011, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.148213 374228 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.148438 374228 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.148621 374228 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.148763 374228 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.148860 374228 task_exit.go:204] [ 1008: 1009] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.149062 374228 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.149283 374228 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.149350 374228 task_exit.go:204] [ 1008: 1012] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.149455 374228 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.149529 374228 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.149574 374228 task_exit.go:204] [ 1008: 1010] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.154550 374228 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.154631 374228 task_exit.go:204] [ 1008: 1011] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.154741 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.154867 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:06.154952 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.155474 374228 task_exit.go:204] [ 1008: 1008] Transitioning from exit state TaskExitZombie to TaskExitDead I0713 08:48:06.156056 374228 compat.go:120] Unsupported syscall pkey_alloc(0x0,0x0,0x0,0x0,0x0,0x0). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_alloc for more information. D0713 08:48:06.158556 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.163459 374228 syscalls.go:262] [ 1013: 1013] Allocating stack with size of 8388608 bytes D0713 08:48:06.164096 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.164908 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:06.165126 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:06.165728 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.165834 374228 usertrap_amd64.go:106] [ 1013: 1013] Map a usertrap vma at 64000 D0713 08:48:06.166048 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 1 D0713 08:48:06.166140 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:06.166813 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.166858 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 2 D0713 08:48:06.166904 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:06.167762 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.167804 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 3 D0713 08:48:06.167849 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:06.178472 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.178562 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 4 D0713 08:48:06.178631 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:06.180209 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.180293 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 5 D0713 08:48:06.180356 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:06.180520 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.180567 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 6 D0713 08:48:06.180618 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:06.184311 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.184399 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 7 D0713 08:48:06.184458 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:06.185252 374228 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.185324 374228 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc000bac510 8 D0713 08:48:06.185380 374228 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:06.186400 374228 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.186469 374228 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc000bac510 9 D0713 08:48:06.186682 374228 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:06.186779 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.186811 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 10 D0713 08:48:06.186919 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:06.199780 374228 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.199903 374228 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc000bac510 11 D0713 08:48:06.199993 374228 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:06.200167 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.200230 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 12 D0713 08:48:06.200348 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46af29 trap addr 643c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:06.200778 374228 usertrap_amd64.go:212] [ 1013: 1014] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.200890 374228 usertrap_amd64.go:122] [ 1013: 1014] Allocate a new trap: 0xc000bac510 13 D0713 08:48:06.201016 374228 usertrap_amd64.go:225] [ 1013: 1014] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:06.201242 374228 task_signals.go:470] [ 1013: 1013] Notified of signal 23 D0713 08:48:06.201341 374228 task_signals.go:220] [ 1013: 1013] Signal 23: delivering to handler D0713 08:48:06.211647 374228 task_signals.go:470] [ 1013: 1013] Notified of signal 23 D0713 08:48:06.211834 374228 task_signals.go:220] [ 1013: 1013] Signal 23: delivering to handler I0713 08:48:06.216633 374228 compat.go:120] Unsupported syscall pkey_free(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_free for more information. D0713 08:48:06.216837 374228 usertrap_amd64.go:212] [ 1013: 1013] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.216881 374228 usertrap_amd64.go:122] [ 1013: 1013] Allocate a new trap: 0xc000bac510 14 D0713 08:48:06.216964 374228 usertrap_amd64.go:225] [ 1013: 1013] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:06.217175 374228 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.217338 374228 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.217422 374228 task_signals.go:204] [ 1013: 1015] Signal 1013, PID: 1015, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.217464 374228 task_signals.go:204] [ 1013: 1016] Signal 1013, PID: 1016, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.217570 374228 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.217727 374228 task_signals.go:204] [ 1013: 1014] Signal 1013, PID: 1014, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.217806 374228 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.217811 374228 task_signals.go:204] [ 1013: 1017] Signal 1013, PID: 1017, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.217901 374228 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.218056 374228 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.218125 374228 task_exit.go:204] [ 1013: 1017] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.218273 374228 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.218599 374228 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.218650 374228 task_exit.go:204] [ 1013: 1015] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.218785 374228 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.218873 374228 task_exit.go:204] [ 1013: 1014] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.222909 374228 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.222987 374228 task_exit.go:204] [ 1013: 1016] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.223062 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.223346 374228 task_exit.go:204] [ 1013: 1013] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.223647 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.223712 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.225776 374228 task_stop.go:118] [ 7: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.232922 374228 syscalls.go:262] [ 1018: 1018] Allocating stack with size of 8388608 bytes D0713 08:48:06.233731 374228 task_stop.go:138] [ 7: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.234797 374228 task_signals.go:470] [ 7: 21] Notified of signal 23 D0713 08:48:06.234933 374228 task_signals.go:220] [ 7: 21] Signal 23: delivering to handler D0713 08:48:06.235734 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.235855 374228 usertrap_amd64.go:106] [ 1018: 1018] Map a usertrap vma at 63000 D0713 08:48:06.236103 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 1 D0713 08:48:06.236214 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:06.236858 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.236913 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 2 D0713 08:48:06.237022 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:06.238308 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.238382 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 3 D0713 08:48:06.238485 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:06.248253 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.248330 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 4 D0713 08:48:06.248389 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:06.250138 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.250217 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 5 D0713 08:48:06.250298 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:06.250505 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.250554 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 6 D0713 08:48:06.250642 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:06.254811 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.254869 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 7 D0713 08:48:06.254924 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:06.255700 374228 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.255764 374228 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc002a527e0 8 D0713 08:48:06.255843 374228 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:06.256478 374228 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.256550 374228 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc002a527e0 9 D0713 08:48:06.256623 374228 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:06.257565 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.257620 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 10 D0713 08:48:06.257679 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:06.258635 374228 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.258691 374228 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc002a527e0 11 D0713 08:48:06.258846 374228 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:06.258982 374228 usertrap_amd64.go:212] [ 1018: 1019] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.259034 374228 usertrap_amd64.go:122] [ 1018: 1019] Allocate a new trap: 0xc002a527e0 12 D0713 08:48:06.259095 374228 usertrap_amd64.go:225] [ 1018: 1019] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:06.259321 374228 task_signals.go:470] [ 1018: 1018] Notified of signal 23 D0713 08:48:06.259469 374228 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler D0713 08:48:06.271351 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.271452 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 13 D0713 08:48:06.271513 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:06.271587 374228 task_signals.go:470] [ 1018: 1018] Notified of signal 23 D0713 08:48:06.271826 374228 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler D0713 08:48:06.286297 374228 task_signals.go:470] [ 1018: 1018] Notified of signal 23 D0713 08:48:06.289058 374228 task_signals.go:220] [ 1018: 1018] Signal 23: delivering to handler I0713 08:48:06.293745 374228 compat.go:120] Unsupported syscall pkey_mprotect(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/pkey_mprotect for more information. D0713 08:48:06.293950 374228 usertrap_amd64.go:212] [ 1018: 1018] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.294082 374228 usertrap_amd64.go:122] [ 1018: 1018] Allocate a new trap: 0xc002a527e0 14 D0713 08:48:06.294204 374228 usertrap_amd64.go:225] [ 1018: 1018] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:06.294456 374228 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.294628 374228 task_signals.go:204] [ 1018: 1022] Signal 1018, PID: 1022, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.294675 374228 task_signals.go:204] [ 1018: 1021] Signal 1018, PID: 1021, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.294738 374228 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.294722 374228 task_signals.go:204] [ 1018: 1020] Signal 1018, PID: 1020, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.294858 374228 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.294963 374228 task_signals.go:204] [ 1018: 1019] Signal 1018, PID: 1019, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.295112 374228 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.295309 374228 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.295474 374228 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.295516 374228 task_exit.go:204] [ 1018: 1022] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.295652 374228 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.295880 374228 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.296184 374228 task_exit.go:204] [ 1018: 1021] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.296460 374228 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.296529 374228 task_exit.go:204] [ 1018: 1020] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.302051 374228 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.302146 374228 task_exit.go:204] [ 1018: 1019] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.302257 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.302432 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.302530 374228 task_exit.go:204] [ 1018: 1018] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.302524 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.305931 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.313081 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:06.313738 374228 syscalls.go:262] [ 1023: 1023] Allocating stack with size of 8388608 bytes D0713 08:48:06.314648 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.315065 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:06.316889 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.317128 374228 usertrap_amd64.go:106] [ 1023: 1023] Map a usertrap vma at 69000 D0713 08:48:06.317492 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 1 D0713 08:48:06.317636 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:06.318936 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.319043 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 2 D0713 08:48:06.319161 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:06.320799 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.320870 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 3 D0713 08:48:06.320978 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:06.332723 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.332848 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 4 D0713 08:48:06.332994 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:06.335000 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.335059 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 5 D0713 08:48:06.335134 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:06.335297 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.335341 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 6 D0713 08:48:06.335449 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:06.341524 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.341614 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 7 D0713 08:48:06.341695 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:06.342649 374228 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.342769 374228 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc000baca80 8 D0713 08:48:06.342854 374228 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:06.343728 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.343798 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 9 D0713 08:48:06.344031 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:06.344229 374228 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.344278 374228 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc000baca80 10 D0713 08:48:06.344357 374228 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:06.346114 374228 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.346192 374228 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc000baca80 11 D0713 08:48:06.346278 374228 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:06.346578 374228 usertrap_amd64.go:212] [ 1023: 1024] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.346628 374228 usertrap_amd64.go:122] [ 1023: 1024] Allocate a new trap: 0xc000baca80 12 D0713 08:48:06.346684 374228 usertrap_amd64.go:225] [ 1023: 1024] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:06.346856 374228 task_signals.go:470] [ 1023: 1023] Notified of signal 23 D0713 08:48:06.346964 374228 task_signals.go:220] [ 1023: 1023] Signal 23: delivering to handler D0713 08:48:06.357639 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.357750 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 13 D0713 08:48:06.357827 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:06.358135 374228 task_signals.go:470] [ 1023: 1023] Notified of signal 23 D0713 08:48:06.358343 374228 task_signals.go:220] [ 1023: 1023] Signal 23: delivering to handler D0713 08:48:06.370736 374228 task_signals.go:470] [ 1023: 1023] Notified of signal 23 D0713 08:48:06.370990 374228 task_signals.go:179] [ 1023: 1023] Restarting syscall 202: interrupted by signal 23 D0713 08:48:06.371091 374228 task_signals.go:220] [ 1023: 1023] Signal 23: delivering to handler D0713 08:48:06.374558 374228 usertrap_amd64.go:212] [ 1023: 1023] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.374631 374228 usertrap_amd64.go:122] [ 1023: 1023] Allocate a new trap: 0xc000baca80 14 D0713 08:48:06.374686 374228 usertrap_amd64.go:225] [ 1023: 1023] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:06.374906 374228 task_exit.go:204] [ 1023: 1023] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.375082 374228 task_exit.go:204] [ 1023: 1023] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.375084 374228 task_signals.go:204] [ 1023: 1025] Signal 1023, PID: 1025, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.375260 374228 task_exit.go:204] [ 1023: 1025] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.375251 374228 task_signals.go:204] [ 1023: 1026] Signal 1023, PID: 1026, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.375265 374228 task_signals.go:204] [ 1023: 1024] Signal 1023, PID: 1024, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.375407 374228 task_exit.go:204] [ 1023: 1026] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.375592 374228 task_signals.go:204] [ 1023: 1027] Signal 1023, PID: 1027, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.375712 374228 task_exit.go:204] [ 1023: 1025] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.375812 374228 task_exit.go:204] [ 1023: 1025] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.376007 374228 task_exit.go:204] [ 1023: 1024] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.376194 374228 task_exit.go:204] [ 1023: 1024] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.376265 374228 task_exit.go:204] [ 1023: 1024] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.376364 374228 task_exit.go:204] [ 1023: 1027] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.376585 374228 task_exit.go:204] [ 1023: 1026] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.376722 374228 task_exit.go:204] [ 1023: 1026] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.382580 374228 task_exit.go:204] [ 1023: 1027] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.382660 374228 task_exit.go:204] [ 1023: 1027] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.382770 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.382963 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.383046 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.383170 374228 task_exit.go:204] [ 1023: 1023] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.386158 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.391985 374228 syscalls.go:262] [ 1028: 1028] Allocating stack with size of 8388608 bytes D0713 08:48:06.392916 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.393112 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:06.393240 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:06.393583 374228 task_signals.go:470] [ 7: 20] Notified of signal 23 D0713 08:48:06.393657 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:06.395785 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.395926 374228 usertrap_amd64.go:106] [ 1028: 1028] Map a usertrap vma at 64000 D0713 08:48:06.396215 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 1 D0713 08:48:06.396334 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:06.397253 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.397301 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 2 D0713 08:48:06.397362 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:06.398602 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.398652 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 3 D0713 08:48:06.398734 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:06.407934 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.408020 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 4 D0713 08:48:06.408078 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:06.409682 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.409752 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 5 D0713 08:48:06.409812 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:06.409954 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.409998 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 6 D0713 08:48:06.410052 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:06.414216 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.414286 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 7 D0713 08:48:06.414341 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:06.415015 374228 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.415073 374228 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc000048a80 8 D0713 08:48:06.415176 374228 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:06.415838 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.415891 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 9 D0713 08:48:06.416113 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:06.416246 374228 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.416313 374228 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc000048a80 10 D0713 08:48:06.416391 374228 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:06.428723 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.428812 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 11 D0713 08:48:06.428876 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:06.429104 374228 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.429147 374228 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc000048a80 12 D0713 08:48:06.429232 374228 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:06.429598 374228 usertrap_amd64.go:212] [ 1028: 1029] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.429673 374228 usertrap_amd64.go:122] [ 1028: 1029] Allocate a new trap: 0xc000048a80 13 D0713 08:48:06.429771 374228 usertrap_amd64.go:225] [ 1028: 1029] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:06.429925 374228 task_signals.go:470] [ 1028: 1028] Notified of signal 23 D0713 08:48:06.430003 374228 task_signals.go:220] [ 1028: 1028] Signal 23: delivering to handler D0713 08:48:06.440704 374228 task_signals.go:470] [ 1028: 1028] Notified of signal 23 D0713 08:48:06.440823 374228 task_signals.go:179] [ 1028: 1028] Restarting syscall 202: interrupted by signal 23 D0713 08:48:06.440916 374228 task_signals.go:220] [ 1028: 1028] Signal 23: delivering to handler D0713 08:48:06.443885 374228 usertrap_amd64.go:212] [ 1028: 1028] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.443941 374228 usertrap_amd64.go:122] [ 1028: 1028] Allocate a new trap: 0xc000048a80 14 D0713 08:48:06.444022 374228 usertrap_amd64.go:225] [ 1028: 1028] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:06.444304 374228 task_exit.go:204] [ 1028: 1028] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.444447 374228 task_exit.go:204] [ 1028: 1028] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.444527 374228 task_signals.go:204] [ 1028: 1029] Signal 1028, PID: 1029, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.444581 374228 task_signals.go:204] [ 1028: 1030] Signal 1028, PID: 1030, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.444657 374228 task_exit.go:204] [ 1028: 1029] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.444551 374228 task_signals.go:204] [ 1028: 1031] Signal 1028, PID: 1031, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.444854 374228 task_signals.go:204] [ 1028: 1033] Signal 1028, PID: 1033, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.444892 374228 task_signals.go:204] [ 1028: 1032] Signal 1028, PID: 1032, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.445037 374228 task_exit.go:204] [ 1028: 1029] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.445090 374228 task_exit.go:204] [ 1028: 1029] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.445221 374228 task_exit.go:204] [ 1028: 1030] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.445369 374228 task_exit.go:204] [ 1028: 1030] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.445420 374228 task_exit.go:204] [ 1028: 1030] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.445551 374228 task_exit.go:204] [ 1028: 1033] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.445749 374228 task_exit.go:204] [ 1028: 1033] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.445817 374228 task_exit.go:204] [ 1028: 1033] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.445898 374228 task_exit.go:204] [ 1028: 1031] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.446025 374228 task_exit.go:204] [ 1028: 1031] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.446078 374228 task_exit.go:204] [ 1028: 1031] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.446189 374228 task_exit.go:204] [ 1028: 1032] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.452153 374228 task_exit.go:204] [ 1028: 1032] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.452224 374228 task_exit.go:204] [ 1028: 1032] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.452304 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.452537 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.452611 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.452833 374228 task_exit.go:204] [ 1028: 1028] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.455363 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.460188 374228 syscalls.go:262] [ 1034: 1034] Allocating stack with size of 8388608 bytes D0713 08:48:06.460796 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.463047 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.463198 374228 usertrap_amd64.go:106] [ 1034: 1034] Map a usertrap vma at 64000 D0713 08:48:06.463468 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 1 D0713 08:48:06.463576 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:06.464330 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.464397 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 2 D0713 08:48:06.464439 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:06.465634 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.465711 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 3 D0713 08:48:06.465787 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:06.475764 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.475854 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 4 D0713 08:48:06.475947 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:06.482417 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.482514 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 5 D0713 08:48:06.482601 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:06.482849 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.482899 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 6 D0713 08:48:06.483002 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:06.488579 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.488687 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 7 D0713 08:48:06.488785 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:06.489702 374228 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.489790 374228 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc000048d20 8 D0713 08:48:06.489856 374228 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:06.490792 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.490851 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 9 D0713 08:48:06.490975 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:06.491297 374228 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.491368 374228 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc000048d20 10 D0713 08:48:06.491467 374228 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:06.503747 374228 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.503813 374228 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc000048d20 11 D0713 08:48:06.503886 374228 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:06.504021 374228 usertrap_amd64.go:212] [ 1034: 1035] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.504080 374228 usertrap_amd64.go:122] [ 1034: 1035] Allocate a new trap: 0xc000048d20 12 D0713 08:48:06.504136 374228 usertrap_amd64.go:225] [ 1034: 1035] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:06.504287 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.504331 374228 task_signals.go:470] [ 1034: 1034] Notified of signal 23 D0713 08:48:06.504367 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 13 D0713 08:48:06.504442 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:06.504563 374228 task_signals.go:220] [ 1034: 1034] Signal 23: delivering to handler D0713 08:48:06.505150 374228 task_signals.go:470] [ 1034: 1034] Notified of signal 23 D0713 08:48:06.505253 374228 task_signals.go:220] [ 1034: 1034] Signal 23: delivering to handler D0713 08:48:06.518228 374228 task_signals.go:470] [ 1034: 1034] Notified of signal 23 D0713 08:48:06.518356 374228 task_signals.go:220] [ 1034: 1034] Signal 23: delivering to handler D0713 08:48:06.519049 374228 usertrap_amd64.go:212] [ 1034: 1034] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.519129 374228 usertrap_amd64.go:122] [ 1034: 1034] Allocate a new trap: 0xc000048d20 14 D0713 08:48:06.519200 374228 usertrap_amd64.go:225] [ 1034: 1034] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:06.519409 374228 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.519552 374228 task_signals.go:204] [ 1034: 1039] Signal 1034, PID: 1039, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.519587 374228 task_signals.go:204] [ 1034: 1038] Signal 1034, PID: 1038, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.519640 374228 task_signals.go:204] [ 1034: 1037] Signal 1034, PID: 1037, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.519685 374228 task_signals.go:204] [ 1034: 1036] Signal 1034, PID: 1036, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.519695 374228 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.519837 374228 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.519926 374228 task_signals.go:204] [ 1034: 1035] Signal 1034, PID: 1035, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.520015 374228 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.520124 374228 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.520288 374228 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.520338 374228 task_exit.go:204] [ 1034: 1036] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.520428 374228 task_exit.go:204] [ 1034: 1039] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.520547 374228 task_exit.go:204] [ 1034: 1039] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.520587 374228 task_exit.go:204] [ 1034: 1039] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.520732 374228 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.520844 374228 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.520893 374228 task_exit.go:204] [ 1034: 1038] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.521064 374228 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.521111 374228 task_exit.go:204] [ 1034: 1037] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.526282 374228 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.526371 374228 task_exit.go:204] [ 1034: 1035] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.526575 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.526794 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.526838 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.526964 374228 task_exit.go:204] [ 1034: 1034] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.529455 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.535285 374228 syscalls.go:262] [ 1040: 1040] Allocating stack with size of 8388608 bytes D0713 08:48:06.536038 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.537584 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.537693 374228 usertrap_amd64.go:106] [ 1040: 1040] Map a usertrap vma at 63000 D0713 08:48:06.537942 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 1 D0713 08:48:06.538033 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:06.538710 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.538767 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 2 D0713 08:48:06.538844 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:06.540074 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.540132 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 3 D0713 08:48:06.540190 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:06.549813 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.549872 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 4 D0713 08:48:06.549973 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:06.552266 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.552341 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 5 D0713 08:48:06.552402 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:06.552575 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.552624 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 6 D0713 08:48:06.552696 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:06.556890 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.556986 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 7 D0713 08:48:06.557061 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:06.557852 374228 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.557922 374228 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc002a53170 8 D0713 08:48:06.557975 374228 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:06.558762 374228 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.558829 374228 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc002a53170 9 D0713 08:48:06.558873 374228 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:06.559237 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.559328 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 10 D0713 08:48:06.559389 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:06.570481 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.570547 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 11 D0713 08:48:06.570600 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46af29 trap addr 63370 ([184 37 1 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:06.572055 374228 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.572113 374228 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc002a53170 12 D0713 08:48:06.572215 374228 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b020 trap addr 633c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:06.572497 374228 usertrap_amd64.go:212] [ 1040: 1041] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.572541 374228 usertrap_amd64.go:122] [ 1040: 1041] Allocate a new trap: 0xc002a53170 13 D0713 08:48:06.572592 374228 usertrap_amd64.go:225] [ 1040: 1041] Apply the binary patch addr 46b04f trap addr 63410 ([184 234 0 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:06.572771 374228 task_signals.go:470] [ 1040: 1040] Notified of signal 23 D0713 08:48:06.573049 374228 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler D0713 08:48:06.584229 374228 task_signals.go:470] [ 1040: 1040] Notified of signal 23 D0713 08:48:06.584864 374228 task_signals.go:220] [ 1040: 1040] Signal 23: delivering to handler D0713 08:48:06.585718 374228 usertrap_amd64.go:212] [ 1040: 1040] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.585782 374228 usertrap_amd64.go:122] [ 1040: 1040] Allocate a new trap: 0xc002a53170 14 D0713 08:48:06.585847 374228 usertrap_amd64.go:225] [ 1040: 1040] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:06.586092 374228 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.586302 374228 task_signals.go:204] [ 1040: 1042] Signal 1040, PID: 1042, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.586318 374228 task_signals.go:204] [ 1040: 1044] Signal 1040, PID: 1044, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.586382 374228 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.586460 374228 task_signals.go:204] [ 1040: 1043] Signal 1040, PID: 1043, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.586494 374228 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.586598 374228 task_signals.go:204] [ 1040: 1041] Signal 1040, PID: 1041, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.586699 374228 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.586822 374228 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.587024 374228 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.587068 374228 task_exit.go:204] [ 1040: 1042] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.587166 374228 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.587220 374228 task_exit.go:204] [ 1040: 1044] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.587307 374228 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.587508 374228 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.587558 374228 task_exit.go:204] [ 1040: 1041] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.592814 374228 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.592878 374228 task_exit.go:204] [ 1040: 1043] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.593061 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.593179 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.593230 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.593385 374228 task_exit.go:204] [ 1040: 1040] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.595542 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.603623 374228 task_signals.go:481] [ 7: 20] No task notified of signal 23 D0713 08:48:06.604787 374228 syscalls.go:262] [ 1045: 1045] Allocating stack with size of 8388608 bytes D0713 08:48:06.605641 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.606323 374228 task_signals.go:220] [ 7: 20] Signal 23: delivering to handler D0713 08:48:06.607732 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.607851 374228 usertrap_amd64.go:106] [ 1045: 1045] Map a usertrap vma at 61000 D0713 08:48:06.608096 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 1 D0713 08:48:06.608270 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:06.609192 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.609265 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 2 D0713 08:48:06.609348 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:06.610478 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.610529 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 3 D0713 08:48:06.610613 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:06.620895 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.620989 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 4 D0713 08:48:06.621062 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:06.623242 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.623316 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 5 D0713 08:48:06.623389 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:06.623645 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.623693 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 6 D0713 08:48:06.623790 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) executing program D0713 08:48:06.629604 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.629673 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 7 D0713 08:48:06.629765 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:06.630483 374228 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.630617 374228 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0010d8b10 8 D0713 08:48:06.630774 374228 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:06.631817 374228 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.631914 374228 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0010d8b10 9 D0713 08:48:06.631981 374228 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:06.632113 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.632150 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 10 D0713 08:48:06.632201 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:06.632992 374228 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.633070 374228 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0010d8b10 11 D0713 08:48:06.633146 374228 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:06.633370 374228 usertrap_amd64.go:212] [ 1045: 1046] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.633428 374228 usertrap_amd64.go:122] [ 1045: 1046] Allocate a new trap: 0xc0010d8b10 12 D0713 08:48:06.633505 374228 usertrap_amd64.go:225] [ 1045: 1046] Apply the binary patch addr 46b04f trap addr 613c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:06.633748 374228 task_signals.go:470] [ 1045: 1045] Notified of signal 23 D0713 08:48:06.633859 374228 task_signals.go:220] [ 1045: 1045] Signal 23: delivering to handler D0713 08:48:06.643978 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.644038 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 13 D0713 08:48:06.644087 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46af29 trap addr 61410 ([184 37 1 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:06.646187 374228 task_signals.go:470] [ 1045: 1045] Notified of signal 23 D0713 08:48:06.646278 374228 task_signals.go:220] [ 1045: 1045] Signal 23: delivering to handler D0713 08:48:06.660065 374228 usertrap_amd64.go:212] [ 1045: 1045] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.660165 374228 usertrap_amd64.go:122] [ 1045: 1045] Allocate a new trap: 0xc0010d8b10 14 D0713 08:48:06.660270 374228 usertrap_amd64.go:225] [ 1045: 1045] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:06.660444 374228 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.660554 374228 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.660546 374228 task_signals.go:204] [ 1045: 1048] Signal 1045, PID: 1048, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.660683 374228 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.660685 374228 task_signals.go:204] [ 1045: 1049] Signal 1045, PID: 1049, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.660894 374228 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.661096 374228 task_signals.go:204] [ 1045: 1046] Signal 1045, PID: 1046, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.661220 374228 task_signals.go:204] [ 1045: 1047] Signal 1045, PID: 1047, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.661276 374228 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.661331 374228 task_exit.go:204] [ 1045: 1049] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.661476 374228 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.661550 374228 task_exit.go:204] [ 1045: 1048] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.661658 374228 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.661789 374228 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.662105 374228 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.662192 374228 task_exit.go:204] [ 1045: 1047] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.667731 374228 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.667807 374228 task_exit.go:204] [ 1045: 1046] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.667920 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.668062 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.668176 374228 task_exit.go:204] [ 1045: 1045] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.668711 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:06.668820 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:06.671164 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.676095 374228 syscalls.go:262] [ 1050: 1050] Allocating stack with size of 8388608 bytes D0713 08:48:06.677008 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.681291 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.681468 374228 usertrap_amd64.go:106] [ 1050: 1050] Map a usertrap vma at 63000 D0713 08:48:06.681794 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 1 D0713 08:48:06.681929 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:06.683004 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.683075 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 2 D0713 08:48:06.683163 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:06.684610 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.684686 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 3 D0713 08:48:06.684761 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:06.696751 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.696869 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 4 D0713 08:48:06.696978 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:06.698989 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.699071 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 5 D0713 08:48:06.699176 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:06.699368 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.699528 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 6 D0713 08:48:06.699710 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:06.704910 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.705024 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 7 D0713 08:48:06.705111 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:06.706026 374228 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.706120 374228 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0008acc30 8 D0713 08:48:06.706227 374228 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:06.706781 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.706847 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 9 D0713 08:48:06.706995 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:06.707785 374228 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.707843 374228 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0008acc30 10 D0713 08:48:06.707893 374228 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:06.718560 374228 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.718713 374228 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0008acc30 11 D0713 08:48:06.718802 374228 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:06.718968 374228 usertrap_amd64.go:212] [ 1050: 1051] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.719024 374228 usertrap_amd64.go:122] [ 1050: 1051] Allocate a new trap: 0xc0008acc30 12 D0713 08:48:06.719103 374228 usertrap_amd64.go:225] [ 1050: 1051] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:06.719297 374228 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0713 08:48:06.719492 374228 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler D0713 08:48:06.721734 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.721801 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 13 D0713 08:48:06.721866 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:06.729972 374228 task_signals.go:470] [ 1050: 1050] Notified of signal 23 D0713 08:48:06.731413 374228 task_signals.go:220] [ 1050: 1050] Signal 23: delivering to handler D0713 08:48:06.736031 374228 usertrap_amd64.go:212] [ 1050: 1050] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.736140 374228 usertrap_amd64.go:122] [ 1050: 1050] Allocate a new trap: 0xc0008acc30 14 D0713 08:48:06.736210 374228 usertrap_amd64.go:225] [ 1050: 1050] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:06.736404 374228 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.736529 374228 task_signals.go:204] [ 1050: 1052] Signal 1050, PID: 1052, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.736626 374228 task_signals.go:204] [ 1050: 1055] Signal 1050, PID: 1055, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.736636 374228 task_signals.go:204] [ 1050: 1054] Signal 1050, PID: 1054, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.736618 374228 task_signals.go:204] [ 1050: 1051] Signal 1050, PID: 1051, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.736661 374228 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.736814 374228 task_signals.go:204] [ 1050: 1053] Signal 1050, PID: 1053, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.736852 374228 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.736999 374228 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.737228 374228 task_exit.go:204] [ 1050: 1055] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.737361 374228 task_exit.go:204] [ 1050: 1055] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.737400 374228 task_exit.go:204] [ 1050: 1055] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.737499 374228 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.737605 374228 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.737656 374228 task_exit.go:204] [ 1050: 1054] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.737747 374228 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.737960 374228 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.738025 374228 task_exit.go:204] [ 1050: 1052] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.738197 374228 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.738258 374228 task_exit.go:204] [ 1050: 1053] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.743633 374228 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.743718 374228 task_exit.go:204] [ 1050: 1051] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.743798 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.743943 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.744014 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.744119 374228 task_exit.go:204] [ 1050: 1050] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.746648 374228 task_stop.go:118] [ 7: 20] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.751369 374228 syscalls.go:262] [ 1056: 1056] Allocating stack with size of 8388608 bytes D0713 08:48:06.752035 374228 task_stop.go:138] [ 7: 20] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.753676 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.753806 374228 usertrap_amd64.go:106] [ 1056: 1056] Map a usertrap vma at 6a000 D0713 08:48:06.754061 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 1 D0713 08:48:06.754170 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:06.755104 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.755151 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 2 D0713 08:48:06.755203 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:06.756516 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.756566 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 3 D0713 08:48:06.756633 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:06.767022 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.767104 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 4 D0713 08:48:06.767175 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:06.768991 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.769054 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 5 D0713 08:48:06.769127 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:06.769353 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.769409 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 6 D0713 08:48:06.769455 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:06.773537 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.773600 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 7 D0713 08:48:06.773661 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:06.774742 374228 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.774855 374228 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0000495c0 8 D0713 08:48:06.774962 374228 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:06.775451 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.775532 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 9 D0713 08:48:06.775796 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:06.775947 374228 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.776040 374228 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0000495c0 10 D0713 08:48:06.776112 374228 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:06.777892 374228 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.777966 374228 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0000495c0 11 D0713 08:48:06.778048 374228 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:06.778229 374228 usertrap_amd64.go:212] [ 1056: 1057] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.778303 374228 usertrap_amd64.go:122] [ 1056: 1057] Allocate a new trap: 0xc0000495c0 12 D0713 08:48:06.778369 374228 usertrap_amd64.go:225] [ 1056: 1057] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:06.778551 374228 task_signals.go:470] [ 1056: 1056] Notified of signal 23 D0713 08:48:06.779553 374228 task_signals.go:220] [ 1056: 1056] Signal 23: delivering to handler D0713 08:48:06.791127 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.791196 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 13 D0713 08:48:06.791248 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:06.793599 374228 task_signals.go:470] [ 1056: 1056] Notified of signal 23 D0713 08:48:06.793991 374228 task_signals.go:220] [ 1056: 1056] Signal 23: delivering to handler D0713 08:48:06.807390 374228 usertrap_amd64.go:212] [ 1056: 1056] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.807477 374228 usertrap_amd64.go:122] [ 1056: 1056] Allocate a new trap: 0xc0000495c0 14 D0713 08:48:06.807551 374228 usertrap_amd64.go:225] [ 1056: 1056] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:06.807763 374228 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.807940 374228 task_signals.go:204] [ 1056: 1061] Signal 1056, PID: 1061, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.807942 374228 task_signals.go:204] [ 1056: 1059] Signal 1056, PID: 1059, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.807996 374228 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.807938 374228 task_signals.go:204] [ 1056: 1060] Signal 1056, PID: 1060, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.808105 374228 task_signals.go:204] [ 1056: 1057] Signal 1056, PID: 1057, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.808205 374228 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.808332 374228 task_exit.go:204] [ 1056: 1061] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.808423 374228 task_signals.go:204] [ 1056: 1058] Signal 1056, PID: 1058, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.808493 374228 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.808598 374228 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.808651 374228 task_exit.go:204] [ 1056: 1058] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.808778 374228 task_exit.go:204] [ 1056: 1061] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.808832 374228 task_exit.go:204] [ 1056: 1061] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.808985 374228 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.809139 374228 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.809195 374228 task_exit.go:204] [ 1056: 1057] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.809326 374228 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.809465 374228 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.809519 374228 task_exit.go:204] [ 1056: 1060] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.815247 374228 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.815330 374228 task_exit.go:204] [ 1056: 1059] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.815498 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.815649 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.815699 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.815943 374228 task_exit.go:204] [ 1056: 1056] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.818784 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.822853 374228 syscalls.go:262] [ 1062: 1062] Allocating stack with size of 8388608 bytes D0713 08:48:06.823472 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.825299 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.825402 374228 usertrap_amd64.go:106] [ 1062: 1062] Map a usertrap vma at 63000 D0713 08:48:06.825614 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 1 D0713 08:48:06.825725 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:06.826514 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.826557 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 2 D0713 08:48:06.826618 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:06.828113 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.828159 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 3 D0713 08:48:06.828216 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:06.838116 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.838210 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 4 D0713 08:48:06.838295 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:06.840011 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.840075 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 5 D0713 08:48:06.840148 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:06.840363 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.840402 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 6 D0713 08:48:06.840458 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:06.843507 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.843555 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 7 D0713 08:48:06.843622 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:06.844298 374228 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.844359 374228 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc002a538c0 8 D0713 08:48:06.844446 374228 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:06.845414 374228 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.845501 374228 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc002a538c0 9 D0713 08:48:06.845694 374228 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46af76 trap addr 632d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:06.845881 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.845931 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 10 D0713 08:48:06.845990 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46b57c trap addr 63320 ([184 202 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:06.858132 374228 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.858256 374228 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc002a538c0 11 D0713 08:48:06.858337 374228 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:06.858506 374228 usertrap_amd64.go:212] [ 1062: 1063] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.858547 374228 usertrap_amd64.go:122] [ 1062: 1063] Allocate a new trap: 0xc002a538c0 12 D0713 08:48:06.858590 374228 usertrap_amd64.go:225] [ 1062: 1063] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:06.858764 374228 task_signals.go:470] [ 1062: 1062] Notified of signal 23 D0713 08:48:06.858852 374228 task_signals.go:220] [ 1062: 1062] Signal 23: delivering to handler D0713 08:48:06.859369 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.859422 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 13 D0713 08:48:06.859483 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:06.872182 374228 task_signals.go:470] [ 1062: 1062] Notified of signal 23 D0713 08:48:06.874378 374228 task_signals.go:220] [ 1062: 1062] Signal 23: delivering to handler I0713 08:48:06.875406 374228 compat.go:120] Unsupported syscall sys_440(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_440 for more information. D0713 08:48:06.875592 374228 usertrap_amd64.go:212] [ 1062: 1062] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.875660 374228 usertrap_amd64.go:122] [ 1062: 1062] Allocate a new trap: 0xc002a538c0 14 D0713 08:48:06.875749 374228 usertrap_amd64.go:225] [ 1062: 1062] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:06.875967 374228 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.876146 374228 task_signals.go:204] [ 1062: 1066] Signal 1062, PID: 1066, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.876135 374228 task_signals.go:204] [ 1062: 1063] Signal 1062, PID: 1063, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.876257 374228 task_signals.go:204] [ 1062: 1064] Signal 1062, PID: 1064, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.876281 374228 task_signals.go:204] [ 1062: 1065] Signal 1062, PID: 1065, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.876342 374228 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.876526 374228 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.876707 374228 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.876919 374228 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.876988 374228 task_exit.go:204] [ 1062: 1066] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.877167 374228 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.877318 374228 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.877496 374228 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.877582 374228 task_exit.go:204] [ 1062: 1064] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.877779 374228 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.877869 374228 task_exit.go:204] [ 1062: 1063] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.883364 374228 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.883438 374228 task_exit.go:204] [ 1062: 1065] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.883565 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.883896 374228 task_exit.go:204] [ 1062: 1062] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.883903 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.883967 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.884329 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:06.884594 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:06.887180 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.892271 374228 syscalls.go:262] [ 1067: 1067] Allocating stack with size of 8388608 bytes D0713 08:48:06.893079 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.894903 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.894987 374228 usertrap_amd64.go:106] [ 1067: 1067] Map a usertrap vma at 66000 D0713 08:48:06.895217 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 1 D0713 08:48:06.895302 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:06.896006 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.896077 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 2 D0713 08:48:06.896155 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:06.897458 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.897521 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 3 D0713 08:48:06.897584 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:06.907108 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.907164 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 4 D0713 08:48:06.907230 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:06.909369 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.909420 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 5 D0713 08:48:06.909482 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:06.909699 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.909756 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 6 D0713 08:48:06.909813 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:06.913959 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.913996 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 7 D0713 08:48:06.914059 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:06.914695 374228 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.914750 374228 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc002b8b260 8 D0713 08:48:06.914806 374228 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:06.915511 374228 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.915564 374228 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc002b8b260 9 D0713 08:48:06.915638 374228 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:06.915850 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.915921 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 10 D0713 08:48:06.916259 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:06.928098 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.928164 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 11 D0713 08:48:06.928250 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:06.933628 374228 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.933705 374228 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc002b8b260 12 D0713 08:48:06.933777 374228 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:06.933957 374228 usertrap_amd64.go:212] [ 1067: 1068] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.934005 374228 usertrap_amd64.go:122] [ 1067: 1068] Allocate a new trap: 0xc002b8b260 13 D0713 08:48:06.934075 374228 usertrap_amd64.go:225] [ 1067: 1068] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:06.934263 374228 task_signals.go:470] [ 1067: 1067] Notified of signal 23 D0713 08:48:06.934425 374228 task_signals.go:220] [ 1067: 1067] Signal 23: delivering to handler I0713 08:48:06.945345 374228 compat.go:120] Unsupported syscall sys_448(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_448 for more information. D0713 08:48:06.945533 374228 usertrap_amd64.go:212] [ 1067: 1067] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:06.945592 374228 usertrap_amd64.go:122] [ 1067: 1067] Allocate a new trap: 0xc002b8b260 14 D0713 08:48:06.945654 374228 usertrap_amd64.go:225] [ 1067: 1067] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:06.945850 374228 task_exit.go:204] [ 1067: 1067] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.945955 374228 task_signals.go:204] [ 1067: 1069] Signal 1067, PID: 1069, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.945989 374228 task_signals.go:204] [ 1067: 1068] Signal 1067, PID: 1068, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.945989 374228 task_signals.go:204] [ 1067: 1071] Signal 1067, PID: 1071, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.945991 374228 task_exit.go:204] [ 1067: 1067] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.946133 374228 task_exit.go:204] [ 1067: 1069] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.946210 374228 task_signals.go:204] [ 1067: 1070] Signal 1067, PID: 1070, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:06.946296 374228 task_exit.go:204] [ 1067: 1070] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.946436 374228 task_exit.go:204] [ 1067: 1068] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.946611 374228 task_exit.go:204] [ 1067: 1069] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.946667 374228 task_exit.go:204] [ 1067: 1069] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.946881 374228 task_exit.go:204] [ 1067: 1071] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:06.947100 374228 task_exit.go:204] [ 1067: 1068] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.947164 374228 task_exit.go:204] [ 1067: 1068] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.947378 374228 task_exit.go:204] [ 1067: 1070] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.947447 374228 task_exit.go:204] [ 1067: 1070] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.952117 374228 task_exit.go:204] [ 1067: 1071] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:06.952187 374228 task_exit.go:204] [ 1067: 1071] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.952280 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:06.952505 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:06.952564 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:06.953002 374228 task_exit.go:204] [ 1067: 1067] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:06.955711 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.961109 374228 syscalls.go:262] [ 1072: 1072] Allocating stack with size of 8388608 bytes D0713 08:48:06.961979 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:06.963889 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:06.964000 374228 usertrap_amd64.go:106] [ 1072: 1072] Map a usertrap vma at 63000 D0713 08:48:06.964227 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 1 D0713 08:48:06.964318 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:06.965146 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:06.965186 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 2 D0713 08:48:06.965267 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:06.966428 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:06.966480 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 3 D0713 08:48:06.966526 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:06.976165 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:06.976260 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 4 D0713 08:48:06.976308 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:06.977889 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:06.977980 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 5 D0713 08:48:06.978050 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:06.978226 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b214:sysno 13 D0713 08:48:06.978274 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 6 D0713 08:48:06.978320 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:06.984032 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:06.984110 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 7 D0713 08:48:06.984187 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:06.984789 374228 usertrap_amd64.go:212] [ 1072: 1073] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:06.984838 374228 usertrap_amd64.go:122] [ 1072: 1073] Allocate a new trap: 0xc000049740 8 D0713 08:48:06.984995 374228 usertrap_amd64.go:225] [ 1072: 1073] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:06.985654 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:06.985708 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 9 D0713 08:48:06.985939 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:06.986088 374228 usertrap_amd64.go:212] [ 1072: 1073] Found the pattern at ip 46af76:sysno 35 D0713 08:48:06.986149 374228 usertrap_amd64.go:122] [ 1072: 1073] Allocate a new trap: 0xc000049740 10 D0713 08:48:06.986227 374228 usertrap_amd64.go:225] [ 1072: 1073] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:06.987529 374228 usertrap_amd64.go:212] [ 1072: 1073] Found the pattern at ip 46b020:sysno 39 D0713 08:48:06.987622 374228 usertrap_amd64.go:122] [ 1072: 1073] Allocate a new trap: 0xc000049740 11 D0713 08:48:06.987709 374228 usertrap_amd64.go:225] [ 1072: 1073] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:06.987923 374228 usertrap_amd64.go:212] [ 1072: 1073] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:06.987973 374228 usertrap_amd64.go:122] [ 1072: 1073] Allocate a new trap: 0xc000049740 12 D0713 08:48:06.988186 374228 usertrap_amd64.go:225] [ 1072: 1073] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:06.988450 374228 task_signals.go:470] [ 1072: 1072] Notified of signal 23 D0713 08:48:06.988627 374228 task_signals.go:220] [ 1072: 1072] Signal 23: delivering to handler D0713 08:48:06.998961 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46af29:sysno 293 D0713 08:48:06.999037 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 13 D0713 08:48:06.999110 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:06.999189 374228 task_signals.go:470] [ 1072: 1072] Notified of signal 23 D0713 08:48:06.999278 374228 task_signals.go:220] [ 1072: 1072] Signal 23: delivering to handler D0713 08:48:07.000900 374228 task_signals.go:470] [ 1072: 1072] Notified of signal 23 D0713 08:48:07.001163 374228 task_signals.go:220] [ 1072: 1072] Signal 23: delivering to handler D0713 08:48:07.012837 374228 task_signals.go:470] [ 1072: 1072] Notified of signal 23 D0713 08:48:07.015254 374228 task_signals.go:220] [ 1072: 1072] Signal 23: delivering to handler I0713 08:48:07.016404 374228 compat.go:120] Unsupported syscall process_vm_readv(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_readv for more information. D0713 08:48:07.016626 374228 usertrap_amd64.go:212] [ 1072: 1072] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.016711 374228 usertrap_amd64.go:122] [ 1072: 1072] Allocate a new trap: 0xc000049740 14 D0713 08:48:07.016785 374228 usertrap_amd64.go:225] [ 1072: 1072] Apply the binary patch addr 46ae44 trap addr 63460 ([184 231 0 0 0 15 5] -> [255 36 37 96 52 6 0]) D0713 08:48:07.017021 374228 task_exit.go:204] [ 1072: 1072] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.017184 374228 task_signals.go:204] [ 1072: 1073] Signal 1072, PID: 1073, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.017249 374228 task_exit.go:204] [ 1072: 1072] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.017264 374228 task_signals.go:204] [ 1072: 1075] Signal 1072, PID: 1075, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.017386 374228 task_signals.go:204] [ 1072: 1076] Signal 1072, PID: 1076, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.017428 374228 task_exit.go:204] [ 1072: 1073] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.017411 374228 task_signals.go:204] [ 1072: 1074] Signal 1072, PID: 1074, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.017556 374228 task_exit.go:204] [ 1072: 1075] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.017724 374228 task_exit.go:204] [ 1072: 1074] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.017918 374228 task_exit.go:204] [ 1072: 1076] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.018167 374228 task_exit.go:204] [ 1072: 1073] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.018269 374228 task_exit.go:204] [ 1072: 1073] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.018463 374228 task_exit.go:204] [ 1072: 1075] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.018517 374228 task_exit.go:204] [ 1072: 1075] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.018679 374228 task_exit.go:204] [ 1072: 1074] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.018820 374228 task_exit.go:204] [ 1072: 1074] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.023695 374228 task_exit.go:204] [ 1072: 1076] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.023813 374228 task_exit.go:204] [ 1072: 1076] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.023938 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.024245 374228 task_exit.go:204] [ 1072: 1072] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.024267 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.024383 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.027757 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.034913 374228 task_signals.go:481] [ 7: 11] No task notified of signal 23 D0713 08:48:07.035128 374228 syscalls.go:262] [ 1077: 1077] Allocating stack with size of 8388608 bytes D0713 08:48:07.035989 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.036326 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:07.036829 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:07.037008 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:07.038091 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.038249 374228 usertrap_amd64.go:106] [ 1077: 1077] Map a usertrap vma at 69000 D0713 08:48:07.038623 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 1 D0713 08:48:07.038766 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:07.039791 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.039856 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 2 D0713 08:48:07.039935 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:07.041495 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.041557 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 3 D0713 08:48:07.041654 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:07.053757 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.053845 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 4 D0713 08:48:07.053947 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:07.055683 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.055770 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 5 D0713 08:48:07.055856 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:07.056053 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.056095 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 6 D0713 08:48:07.056144 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:07.060091 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.060169 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 7 D0713 08:48:07.060244 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:07.061129 374228 usertrap_amd64.go:212] [ 1077: 1078] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.061219 374228 usertrap_amd64.go:122] [ 1077: 1078] Allocate a new trap: 0xc00047ac90 8 D0713 08:48:07.061308 374228 usertrap_amd64.go:225] [ 1077: 1078] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:07.062505 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.062567 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 9 D0713 08:48:07.062666 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46b57c trap addr 692d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:07.062889 374228 usertrap_amd64.go:212] [ 1077: 1078] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.062943 374228 usertrap_amd64.go:122] [ 1077: 1078] Allocate a new trap: 0xc00047ac90 10 D0713 08:48:07.063009 374228 usertrap_amd64.go:225] [ 1077: 1078] Apply the binary patch addr 46af76 trap addr 69320 ([184 35 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:07.074985 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.075059 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 11 D0713 08:48:07.075149 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:07.076463 374228 usertrap_amd64.go:212] [ 1077: 1078] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.076533 374228 usertrap_amd64.go:122] [ 1077: 1078] Allocate a new trap: 0xc00047ac90 12 D0713 08:48:07.076604 374228 usertrap_amd64.go:225] [ 1077: 1078] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:07.076815 374228 usertrap_amd64.go:212] [ 1077: 1078] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.076881 374228 usertrap_amd64.go:122] [ 1077: 1078] Allocate a new trap: 0xc00047ac90 13 D0713 08:48:07.076990 374228 usertrap_amd64.go:225] [ 1077: 1078] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:07.077264 374228 task_signals.go:470] [ 1077: 1077] Notified of signal 23 D0713 08:48:07.077409 374228 task_signals.go:220] [ 1077: 1077] Signal 23: delivering to handler I0713 08:48:07.090769 374228 compat.go:120] Unsupported syscall process_vm_writev(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/process_vm_writev for more information. D0713 08:48:07.090954 374228 usertrap_amd64.go:212] [ 1077: 1077] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.091015 374228 usertrap_amd64.go:122] [ 1077: 1077] Allocate a new trap: 0xc00047ac90 14 D0713 08:48:07.091089 374228 usertrap_amd64.go:225] [ 1077: 1077] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:07.091347 374228 task_exit.go:204] [ 1077: 1077] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.091538 374228 task_signals.go:204] [ 1077: 1082] Signal 1077, PID: 1082, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.091514 374228 task_signals.go:204] [ 1077: 1078] Signal 1077, PID: 1078, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.091556 374228 task_exit.go:204] [ 1077: 1077] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.091702 374228 task_signals.go:204] [ 1077: 1081] Signal 1077, PID: 1081, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.091757 374228 task_exit.go:204] [ 1077: 1078] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.091901 374228 task_signals.go:204] [ 1077: 1079] Signal 1077, PID: 1079, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.092062 374228 task_signals.go:204] [ 1077: 1080] Signal 1077, PID: 1080, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.092104 374228 task_exit.go:204] [ 1077: 1078] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.092205 374228 task_exit.go:204] [ 1077: 1078] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.092393 374228 task_exit.go:204] [ 1077: 1082] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.092564 374228 task_exit.go:204] [ 1077: 1081] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.092758 374228 task_exit.go:204] [ 1077: 1081] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.092803 374228 task_exit.go:204] [ 1077: 1081] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.092918 374228 task_exit.go:204] [ 1077: 1079] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.093069 374228 task_exit.go:204] [ 1077: 1080] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.093353 374228 task_exit.go:204] [ 1077: 1082] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.093430 374228 task_exit.go:204] [ 1077: 1082] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.093561 374228 task_exit.go:204] [ 1077: 1079] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.093625 374228 task_exit.go:204] [ 1077: 1079] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.098723 374228 task_exit.go:204] [ 1077: 1080] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.098790 374228 task_exit.go:204] [ 1077: 1080] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.098893 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.099164 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.099274 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.099432 374228 task_exit.go:204] [ 1077: 1077] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.102288 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.107308 374228 syscalls.go:262] [ 1083: 1083] Allocating stack with size of 8388608 bytes D0713 08:48:07.108162 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.110222 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.110336 374228 usertrap_amd64.go:106] [ 1083: 1083] Map a usertrap vma at 62000 D0713 08:48:07.111318 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 1 D0713 08:48:07.111451 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:48:07.112546 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.112652 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 2 D0713 08:48:07.112772 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:48:07.114444 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.114549 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 3 D0713 08:48:07.114621 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:48:07.125270 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.125359 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 4 D0713 08:48:07.125454 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:48:07.127298 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.127392 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 5 D0713 08:48:07.127462 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:48:07.127736 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.127813 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 6 D0713 08:48:07.127910 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:48:07.132707 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.132814 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 7 D0713 08:48:07.132906 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:48:07.134697 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.134780 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 8 D0713 08:48:07.134841 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46b57c trap addr 62280 ([184 202 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:48:07.135065 374228 usertrap_amd64.go:212] [ 1083: 1084] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.135186 374228 usertrap_amd64.go:122] [ 1083: 1084] Allocate a new trap: 0xc002a53e90 9 D0713 08:48:07.135315 374228 usertrap_amd64.go:225] [ 1083: 1084] Apply the binary patch addr 46b60c trap addr 622d0 ([184 186 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:48:07.135902 374228 usertrap_amd64.go:212] [ 1083: 1084] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.135970 374228 usertrap_amd64.go:122] [ 1083: 1084] Allocate a new trap: 0xc002a53e90 10 D0713 08:48:07.136072 374228 usertrap_amd64.go:225] [ 1083: 1084] Apply the binary patch addr 46af76 trap addr 62320 ([184 35 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:48:07.149212 374228 usertrap_amd64.go:212] [ 1083: 1084] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.149322 374228 usertrap_amd64.go:122] [ 1083: 1084] Allocate a new trap: 0xc002a53e90 11 D0713 08:48:07.149408 374228 usertrap_amd64.go:225] [ 1083: 1084] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:48:07.149640 374228 usertrap_amd64.go:212] [ 1083: 1084] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.149690 374228 usertrap_amd64.go:122] [ 1083: 1084] Allocate a new trap: 0xc002a53e90 12 D0713 08:48:07.149756 374228 usertrap_amd64.go:225] [ 1083: 1084] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:48:07.149955 374228 task_signals.go:470] [ 1083: 1083] Notified of signal 23 D0713 08:48:07.150126 374228 task_signals.go:220] [ 1083: 1083] Signal 23: delivering to handler D0713 08:48:07.150756 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.150848 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 13 D0713 08:48:07.150909 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:48:07.161155 374228 task_signals.go:470] [ 1083: 1083] Notified of signal 23 D0713 08:48:07.161389 374228 task_signals.go:220] [ 1083: 1083] Signal 23: delivering to handler D0713 08:48:07.167019 374228 usertrap_amd64.go:212] [ 1083: 1083] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.167128 374228 usertrap_amd64.go:122] [ 1083: 1083] Allocate a new trap: 0xc002a53e90 14 D0713 08:48:07.167209 374228 usertrap_amd64.go:225] [ 1083: 1083] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:48:07.167481 374228 task_exit.go:204] [ 1083: 1083] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.167596 374228 task_signals.go:204] [ 1083: 1087] Signal 1083, PID: 1087, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.167618 374228 task_signals.go:204] [ 1083: 1084] Signal 1083, PID: 1084, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.167783 374228 task_signals.go:204] [ 1083: 1086] Signal 1083, PID: 1086, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.167817 374228 task_exit.go:204] [ 1083: 1087] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.167821 374228 task_signals.go:204] [ 1083: 1085] Signal 1083, PID: 1085, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.167974 374228 task_exit.go:204] [ 1083: 1087] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.168019 374228 task_exit.go:204] [ 1083: 1087] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.168155 374228 task_exit.go:204] [ 1083: 1086] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.168282 374228 task_exit.go:204] [ 1083: 1086] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.168320 374228 task_exit.go:204] [ 1083: 1086] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.168444 374228 task_exit.go:204] [ 1083: 1084] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.168586 374228 task_exit.go:204] [ 1083: 1084] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.168648 374228 task_exit.go:204] [ 1083: 1084] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.168752 374228 task_exit.go:204] [ 1083: 1083] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.168866 374228 task_exit.go:204] [ 1083: 1085] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.174736 374228 task_exit.go:204] [ 1083: 1085] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.174799 374228 task_exit.go:204] [ 1083: 1085] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.174915 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.175296 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.175386 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.175798 374228 task_exit.go:204] [ 1083: 1083] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.176254 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:07.176479 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:07.180071 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.186328 374228 syscalls.go:262] [ 1088: 1088] Allocating stack with size of 8388608 bytes D0713 08:48:07.187002 374228 task_signals.go:481] [ 7: 11] No task notified of signal 23 D0713 08:48:07.187246 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.187544 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:07.187972 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:07.188127 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:07.194948 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.195066 374228 usertrap_amd64.go:106] [ 1088: 1088] Map a usertrap vma at 68000 D0713 08:48:07.195414 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 1 D0713 08:48:07.195546 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:48:07.196445 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.196486 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 2 D0713 08:48:07.196559 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:48:07.197780 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.197837 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 3 D0713 08:48:07.197901 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:48:07.208151 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.208259 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 4 D0713 08:48:07.208359 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:48:07.211141 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.211240 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 5 D0713 08:48:07.211314 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:48:07.211516 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.211567 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 6 D0713 08:48:07.211653 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:48:07.216839 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.216925 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 7 D0713 08:48:07.217015 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:48:07.217744 374228 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.217850 374228 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc002b8b950 8 D0713 08:48:07.217940 374228 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:48:07.218895 374228 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.218968 374228 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc002b8b950 9 D0713 08:48:07.219219 374228 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:48:07.219751 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.219864 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 10 D0713 08:48:07.219965 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:48:07.221689 374228 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.221756 374228 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc002b8b950 11 D0713 08:48:07.221824 374228 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:48:07.222183 374228 usertrap_amd64.go:212] [ 1088: 1089] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.222256 374228 usertrap_amd64.go:122] [ 1088: 1089] Allocate a new trap: 0xc002b8b950 12 D0713 08:48:07.222334 374228 usertrap_amd64.go:225] [ 1088: 1089] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:48:07.222618 374228 task_signals.go:470] [ 1088: 1088] Notified of signal 23 D0713 08:48:07.222766 374228 task_signals.go:220] [ 1088: 1088] Signal 23: delivering to handler D0713 08:48:07.234629 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.234729 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 13 D0713 08:48:07.234843 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:48:07.235189 374228 task_signals.go:470] [ 1088: 1088] Notified of signal 23 D0713 08:48:07.235365 374228 task_signals.go:220] [ 1088: 1088] Signal 23: delivering to handler D0713 08:48:07.246776 374228 task_signals.go:470] [ 1088: 1088] Notified of signal 23 D0713 08:48:07.247000 374228 task_signals.go:220] [ 1088: 1088] Signal 23: delivering to handler D0713 08:48:07.252420 374228 usertrap_amd64.go:212] [ 1088: 1088] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.252501 374228 usertrap_amd64.go:122] [ 1088: 1088] Allocate a new trap: 0xc002b8b950 14 D0713 08:48:07.252554 374228 usertrap_amd64.go:225] [ 1088: 1088] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:48:07.252772 374228 task_exit.go:204] [ 1088: 1088] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.252991 374228 task_exit.go:204] [ 1088: 1088] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.253002 374228 task_signals.go:204] [ 1088: 1091] Signal 1088, PID: 1091, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.253077 374228 task_signals.go:204] [ 1088: 1089] Signal 1088, PID: 1089, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.253110 374228 task_signals.go:204] [ 1088: 1092] Signal 1088, PID: 1092, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.253165 374228 task_exit.go:204] [ 1088: 1091] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.253145 374228 task_signals.go:204] [ 1088: 1090] Signal 1088, PID: 1090, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.253359 374228 task_exit.go:204] [ 1088: 1089] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.253565 374228 task_exit.go:204] [ 1088: 1089] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.253622 374228 task_exit.go:204] [ 1088: 1089] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.253850 374228 task_exit.go:204] [ 1088: 1092] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.254059 374228 task_exit.go:204] [ 1088: 1092] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.254127 374228 task_exit.go:204] [ 1088: 1092] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.254274 374228 task_exit.go:204] [ 1088: 1091] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.254327 374228 task_exit.go:204] [ 1088: 1091] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.254469 374228 task_exit.go:204] [ 1088: 1090] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.260417 374228 task_exit.go:204] [ 1088: 1090] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.260515 374228 task_exit.go:204] [ 1088: 1090] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.260604 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.260751 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.260817 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.261223 374228 task_exit.go:204] [ 1088: 1088] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.264186 374228 task_stop.go:118] [ 7: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.268901 374228 syscalls.go:262] [ 1093: 1093] Allocating stack with size of 8388608 bytes D0713 08:48:07.269862 374228 task_stop.go:138] [ 7: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.278210 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.278339 374228 usertrap_amd64.go:106] [ 1093: 1093] Map a usertrap vma at 64000 D0713 08:48:07.278596 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 1 D0713 08:48:07.278707 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:07.279616 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.279680 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 2 D0713 08:48:07.279742 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:07.281414 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.281487 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 3 D0713 08:48:07.281545 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:07.291820 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.291899 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 4 D0713 08:48:07.291976 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:07.293658 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.293746 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 5 D0713 08:48:07.293826 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:07.294014 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.294068 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 6 D0713 08:48:07.294140 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:07.297505 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.297569 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 7 D0713 08:48:07.297653 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:07.298420 374228 usertrap_amd64.go:212] [ 1093: 1094] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.298509 374228 usertrap_amd64.go:122] [ 1093: 1094] Allocate a new trap: 0xc0008adbf0 8 D0713 08:48:07.298595 374228 usertrap_amd64.go:225] [ 1093: 1094] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:07.299520 374228 usertrap_amd64.go:212] [ 1093: 1094] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.299635 374228 usertrap_amd64.go:122] [ 1093: 1094] Allocate a new trap: 0xc0008adbf0 9 D0713 08:48:07.299769 374228 usertrap_amd64.go:225] [ 1093: 1094] Apply the binary patch addr 46af76 trap addr 642d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:07.299904 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.299947 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 10 D0713 08:48:07.300027 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46b57c trap addr 64320 ([184 202 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:07.302215 374228 usertrap_amd64.go:212] [ 1093: 1094] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.302280 374228 usertrap_amd64.go:122] [ 1093: 1094] Allocate a new trap: 0xc0008adbf0 11 D0713 08:48:07.302351 374228 usertrap_amd64.go:225] [ 1093: 1094] Apply the binary patch addr 46b020 trap addr 64370 ([184 39 0 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:07.302658 374228 usertrap_amd64.go:212] [ 1093: 1094] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.302721 374228 usertrap_amd64.go:122] [ 1093: 1094] Allocate a new trap: 0xc0008adbf0 12 D0713 08:48:07.302819 374228 usertrap_amd64.go:225] [ 1093: 1094] Apply the binary patch addr 46b04f trap addr 643c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:07.303021 374228 task_signals.go:470] [ 1093: 1093] Notified of signal 23 D0713 08:48:07.303517 374228 task_signals.go:220] [ 1093: 1093] Signal 23: delivering to handler D0713 08:48:07.314544 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.314587 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 13 D0713 08:48:07.314654 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46af29 trap addr 64410 ([184 37 1 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:07.314754 374228 task_signals.go:470] [ 1093: 1093] Notified of signal 23 D0713 08:48:07.314836 374228 task_signals.go:220] [ 1093: 1093] Signal 23: delivering to handler D0713 08:48:07.315127 374228 task_signals.go:470] [ 1093: 1093] Notified of signal 23 D0713 08:48:07.315202 374228 task_signals.go:220] [ 1093: 1093] Signal 23: delivering to handler D0713 08:48:07.326163 374228 task_signals.go:470] [ 1093: 1093] Notified of signal 23 D0713 08:48:07.326246 374228 task_signals.go:220] [ 1093: 1093] Signal 23: delivering to handler D0713 08:48:07.329234 374228 usertrap_amd64.go:212] [ 1093: 1093] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.329299 374228 usertrap_amd64.go:122] [ 1093: 1093] Allocate a new trap: 0xc0008adbf0 14 D0713 08:48:07.329367 374228 usertrap_amd64.go:225] [ 1093: 1093] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:07.329580 374228 task_exit.go:204] [ 1093: 1093] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.329721 374228 task_signals.go:204] [ 1093: 1095] Signal 1093, PID: 1095, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.329732 374228 task_signals.go:204] [ 1093: 1096] Signal 1093, PID: 1096, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.329780 374228 task_signals.go:204] [ 1093: 1098] Signal 1093, PID: 1098, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.329896 374228 task_signals.go:204] [ 1093: 1094] Signal 1093, PID: 1094, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.330061 374228 task_signals.go:204] [ 1093: 1097] Signal 1093, PID: 1097, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.330148 374228 task_exit.go:204] [ 1093: 1093] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.330259 374228 task_exit.go:204] [ 1093: 1095] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.330434 374228 task_exit.go:204] [ 1093: 1097] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.330748 374228 task_exit.go:204] [ 1093: 1096] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.330915 374228 task_exit.go:204] [ 1093: 1096] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.330979 374228 task_exit.go:204] [ 1093: 1096] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.331079 374228 task_exit.go:204] [ 1093: 1098] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.331146 374228 task_exit.go:204] [ 1093: 1094] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.331470 374228 task_exit.go:204] [ 1093: 1097] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.331579 374228 task_exit.go:204] [ 1093: 1097] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.331793 374228 task_exit.go:204] [ 1093: 1094] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.331875 374228 task_exit.go:204] [ 1093: 1094] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.332023 374228 task_exit.go:204] [ 1093: 1095] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.332093 374228 task_exit.go:204] [ 1093: 1095] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.337207 374228 task_exit.go:204] [ 1093: 1098] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.337316 374228 task_exit.go:204] [ 1093: 1098] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.337440 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.337717 374228 task_exit.go:204] [ 1093: 1093] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.337700 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.337793 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.340589 374228 task_stop.go:118] [ 7: 21] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.347728 374228 syscalls.go:262] [ 1099: 1099] Allocating stack with size of 8388608 bytes D0713 08:48:07.348562 374228 task_stop.go:138] [ 7: 21] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.348933 374228 task_signals.go:470] [ 7: 21] Notified of signal 23 D0713 08:48:07.349168 374228 task_signals.go:220] [ 7: 21] Signal 23: delivering to handler D0713 08:48:07.351085 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.351177 374228 usertrap_amd64.go:106] [ 1099: 1099] Map a usertrap vma at 65000 D0713 08:48:07.351427 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 1 D0713 08:48:07.351549 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b70f trap addr 65050 ([184 204 0 0 0 15 5] -> [255 36 37 80 80 6 0]) D0713 08:48:07.352551 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.352616 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 2 D0713 08:48:07.352738 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46ae93 trap addr 650a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 80 6 0]) D0713 08:48:07.354014 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.354071 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 3 D0713 08:48:07.354124 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b41d trap addr 650f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 80 6 0]) D0713 08:48:07.363693 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.363750 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 4 D0713 08:48:07.363811 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b1d3 trap addr 65140 ([184 14 0 0 0 15 5] -> [255 36 37 64 81 6 0]) D0713 08:48:07.366356 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.366431 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 5 D0713 08:48:07.366525 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46afa0 trap addr 65190 ([184 186 0 0 0 15 5] -> [255 36 37 144 81 6 0]) D0713 08:48:07.366760 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.366810 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 6 D0713 08:48:07.366860 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b214 trap addr 651e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 81 6 0]) D0713 08:48:07.371280 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.371334 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 7 D0713 08:48:07.371386 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b5eb trap addr 65230 ([184 56 0 0 0 15 5] -> [255 36 37 48 82 6 0]) D0713 08:48:07.371975 374228 usertrap_amd64.go:212] [ 1099: 1100] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.372044 374228 usertrap_amd64.go:122] [ 1099: 1100] Allocate a new trap: 0xc002b8bce0 8 D0713 08:48:07.372104 374228 usertrap_amd64.go:225] [ 1099: 1100] Apply the binary patch addr 46b60c trap addr 65280 ([184 186 0 0 0 15 5] -> [255 36 37 128 82 6 0]) D0713 08:48:07.372739 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.372831 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 9 D0713 08:48:07.372897 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46b57c trap addr 652d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 82 6 0]) D0713 08:48:07.373604 374228 usertrap_amd64.go:212] [ 1099: 1100] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.373728 374228 usertrap_amd64.go:122] [ 1099: 1100] Allocate a new trap: 0xc002b8bce0 10 D0713 08:48:07.373802 374228 usertrap_amd64.go:225] [ 1099: 1100] Apply the binary patch addr 46af76 trap addr 65320 ([184 35 0 0 0 15 5] -> [255 36 37 32 83 6 0]) D0713 08:48:07.385313 374228 usertrap_amd64.go:212] [ 1099: 1100] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.385399 374228 usertrap_amd64.go:122] [ 1099: 1100] Allocate a new trap: 0xc002b8bce0 11 D0713 08:48:07.385464 374228 usertrap_amd64.go:225] [ 1099: 1100] Apply the binary patch addr 46b020 trap addr 65370 ([184 39 0 0 0 15 5] -> [255 36 37 112 83 6 0]) D0713 08:48:07.385654 374228 usertrap_amd64.go:212] [ 1099: 1100] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.385703 374228 usertrap_amd64.go:122] [ 1099: 1100] Allocate a new trap: 0xc002b8bce0 12 D0713 08:48:07.385785 374228 usertrap_amd64.go:225] [ 1099: 1100] Apply the binary patch addr 46b04f trap addr 653c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 83 6 0]) D0713 08:48:07.385941 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.385988 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 13 D0713 08:48:07.385990 374228 task_signals.go:470] [ 1099: 1099] Notified of signal 23 D0713 08:48:07.386039 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46af29 trap addr 65410 ([184 37 1 0 0 15 5] -> [255 36 37 16 84 6 0]) D0713 08:48:07.386151 374228 task_signals.go:220] [ 1099: 1099] Signal 23: delivering to handler D0713 08:48:07.397347 374228 task_signals.go:470] [ 1099: 1099] Notified of signal 23 D0713 08:48:07.397467 374228 task_signals.go:220] [ 1099: 1099] Signal 23: delivering to handler D0713 08:48:07.401309 374228 usertrap_amd64.go:212] [ 1099: 1099] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.401392 374228 usertrap_amd64.go:122] [ 1099: 1099] Allocate a new trap: 0xc002b8bce0 14 D0713 08:48:07.401459 374228 usertrap_amd64.go:225] [ 1099: 1099] Apply the binary patch addr 46ae44 trap addr 65460 ([184 231 0 0 0 15 5] -> [255 36 37 96 84 6 0]) D0713 08:48:07.401673 374228 task_exit.go:204] [ 1099: 1099] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.401802 374228 task_signals.go:204] [ 1099: 1102] Signal 1099, PID: 1102, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.401848 374228 task_signals.go:204] [ 1099: 1103] Signal 1099, PID: 1103, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.401943 374228 task_signals.go:204] [ 1099: 1100] Signal 1099, PID: 1100, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.401951 374228 task_signals.go:204] [ 1099: 1101] Signal 1099, PID: 1101, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.401996 374228 task_exit.go:204] [ 1099: 1103] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.402114 374228 task_exit.go:204] [ 1099: 1100] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.402392 374228 task_exit.go:204] [ 1099: 1100] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.402477 374228 task_exit.go:204] [ 1099: 1100] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.402597 374228 task_exit.go:204] [ 1099: 1102] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.402767 374228 task_exit.go:204] [ 1099: 1102] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.402820 374228 task_exit.go:204] [ 1099: 1102] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.402965 374228 task_exit.go:204] [ 1099: 1101] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.403231 374228 task_exit.go:204] [ 1099: 1103] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.403307 374228 task_exit.go:204] [ 1099: 1103] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.403422 374228 task_exit.go:204] [ 1099: 1099] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.408279 374228 task_exit.go:204] [ 1099: 1101] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.408336 374228 task_exit.go:204] [ 1099: 1101] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.408410 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.408633 374228 task_exit.go:204] [ 1099: 1099] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.409035 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.409091 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.412172 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.419435 374228 syscalls.go:262] [ 1104: 1104] Allocating stack with size of 8388608 bytes D0713 08:48:07.419485 374228 task_signals.go:481] [ 7: 11] No task notified of signal 23 D0713 08:48:07.420286 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.420687 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:07.422584 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.422698 374228 usertrap_amd64.go:106] [ 1104: 1104] Map a usertrap vma at 69000 D0713 08:48:07.422951 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 1 D0713 08:48:07.423054 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:07.423915 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.423956 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 2 D0713 08:48:07.424031 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:07.425353 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.425419 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 3 D0713 08:48:07.425472 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:07.434822 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.434884 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 4 D0713 08:48:07.434950 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:07.436742 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.436823 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 5 D0713 08:48:07.436910 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:07.437138 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.437191 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 6 D0713 08:48:07.437299 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:07.443145 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.443200 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 7 D0713 08:48:07.443243 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:07.443922 374228 usertrap_amd64.go:212] [ 1104: 1105] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.443982 374228 usertrap_amd64.go:122] [ 1104: 1105] Allocate a new trap: 0xc001696180 8 D0713 08:48:07.444047 374228 usertrap_amd64.go:225] [ 1104: 1105] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:07.444767 374228 usertrap_amd64.go:212] [ 1104: 1105] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.444854 374228 usertrap_amd64.go:122] [ 1104: 1105] Allocate a new trap: 0xc001696180 9 D0713 08:48:07.445093 374228 usertrap_amd64.go:225] [ 1104: 1105] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:07.445334 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.445427 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 10 D0713 08:48:07.445563 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:07.457303 374228 usertrap_amd64.go:212] [ 1104: 1105] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.457414 374228 usertrap_amd64.go:122] [ 1104: 1105] Allocate a new trap: 0xc001696180 11 D0713 08:48:07.457486 374228 usertrap_amd64.go:225] [ 1104: 1105] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:07.457663 374228 usertrap_amd64.go:212] [ 1104: 1105] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.457716 374228 usertrap_amd64.go:122] [ 1104: 1105] Allocate a new trap: 0xc001696180 12 D0713 08:48:07.457805 374228 usertrap_amd64.go:225] [ 1104: 1105] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:07.458022 374228 task_signals.go:470] [ 1104: 1104] Notified of signal 23 D0713 08:48:07.458189 374228 task_signals.go:220] [ 1104: 1104] Signal 23: delivering to handler D0713 08:48:07.462272 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.462430 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 13 D0713 08:48:07.462529 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:07.469852 374228 task_signals.go:470] [ 1104: 1104] Notified of signal 23 D0713 08:48:07.470323 374228 task_signals.go:179] [ 1104: 1104] Restarting syscall 202: interrupted by signal 23 D0713 08:48:07.470408 374228 task_signals.go:220] [ 1104: 1104] Signal 23: delivering to handler D0713 08:48:07.479317 374228 usertrap_amd64.go:212] [ 1104: 1104] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.479430 374228 usertrap_amd64.go:122] [ 1104: 1104] Allocate a new trap: 0xc001696180 14 D0713 08:48:07.479531 374228 usertrap_amd64.go:225] [ 1104: 1104] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:07.479728 374228 task_exit.go:204] [ 1104: 1104] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.479848 374228 task_signals.go:204] [ 1104: 1108] Signal 1104, PID: 1108, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.479928 374228 task_signals.go:204] [ 1104: 1109] Signal 1104, PID: 1109, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.479982 374228 task_exit.go:204] [ 1104: 1104] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.480207 374228 task_signals.go:204] [ 1104: 1107] Signal 1104, PID: 1107, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.480281 374228 task_exit.go:204] [ 1104: 1108] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.480267 374228 task_signals.go:204] [ 1104: 1105] Signal 1104, PID: 1105, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.480398 374228 task_signals.go:204] [ 1104: 1106] Signal 1104, PID: 1106, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.480478 374228 task_exit.go:204] [ 1104: 1105] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.480619 374228 task_exit.go:204] [ 1104: 1105] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.480655 374228 task_exit.go:204] [ 1104: 1105] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.480799 374228 task_exit.go:204] [ 1104: 1109] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.480978 374228 task_exit.go:204] [ 1104: 1107] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.481098 374228 task_exit.go:204] [ 1104: 1106] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.481342 374228 task_exit.go:204] [ 1104: 1109] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.481409 374228 task_exit.go:204] [ 1104: 1109] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.481542 374228 task_exit.go:204] [ 1104: 1108] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.481606 374228 task_exit.go:204] [ 1104: 1108] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.481787 374228 task_exit.go:204] [ 1104: 1107] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.481837 374228 task_exit.go:204] [ 1104: 1107] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.485799 374228 task_exit.go:204] [ 1104: 1106] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.485883 374228 task_exit.go:204] [ 1104: 1106] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.485994 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.486114 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.486186 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.486223 374228 task_exit.go:204] [ 1104: 1104] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.488974 374228 task_stop.go:118] [ 7: 11] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.495588 374228 syscalls.go:262] [ 1110: 1110] Allocating stack with size of 8388608 bytes D0713 08:48:07.496249 374228 task_stop.go:138] [ 7: 11] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.496561 374228 task_signals.go:470] [ 7: 11] Notified of signal 23 D0713 08:48:07.496714 374228 task_signals.go:220] [ 7: 11] Signal 23: delivering to handler D0713 08:48:07.498450 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.498542 374228 usertrap_amd64.go:106] [ 1110: 1110] Map a usertrap vma at 69000 D0713 08:48:07.498750 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 1 D0713 08:48:07.498847 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:07.499693 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.499753 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 2 D0713 08:48:07.499805 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:07.500981 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.501048 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 3 D0713 08:48:07.501097 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:07.510875 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.510946 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 4 D0713 08:48:07.511017 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:07.513673 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.513752 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 5 D0713 08:48:07.513806 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:07.513969 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.514017 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 6 D0713 08:48:07.514112 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:07.518067 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.518113 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 7 D0713 08:48:07.518158 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:07.518847 374228 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.518939 374228 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc00047b9b0 8 D0713 08:48:07.519055 374228 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:07.519925 374228 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.520027 374228 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc00047b9b0 9 D0713 08:48:07.520120 374228 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:07.520303 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.520367 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 10 D0713 08:48:07.520579 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:07.522100 374228 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.522164 374228 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc00047b9b0 11 D0713 08:48:07.522232 374228 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b020 trap addr 69370 ([184 39 0 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:07.522425 374228 usertrap_amd64.go:212] [ 1110: 1111] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.522469 374228 usertrap_amd64.go:122] [ 1110: 1111] Allocate a new trap: 0xc00047b9b0 12 D0713 08:48:07.522523 374228 usertrap_amd64.go:225] [ 1110: 1111] Apply the binary patch addr 46b04f trap addr 693c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:07.522742 374228 task_signals.go:470] [ 1110: 1110] Notified of signal 23 D0713 08:48:07.522917 374228 task_signals.go:220] [ 1110: 1110] Signal 23: delivering to handler D0713 08:48:07.534130 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.534210 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 13 D0713 08:48:07.534258 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46af29 trap addr 69410 ([184 37 1 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:07.534857 374228 task_signals.go:470] [ 1110: 1110] Notified of signal 23 D0713 08:48:07.535037 374228 task_signals.go:220] [ 1110: 1110] Signal 23: delivering to handler D0713 08:48:07.547410 374228 task_signals.go:470] [ 1110: 1110] Notified of signal 23 D0713 08:48:07.548526 374228 task_signals.go:220] [ 1110: 1110] Signal 23: delivering to handler I0713 08:48:07.549404 374228 compat.go:120] Unsupported syscall quotactl(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/quotactl for more information. D0713 08:48:07.549560 374228 usertrap_amd64.go:212] [ 1110: 1110] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.549612 374228 usertrap_amd64.go:122] [ 1110: 1110] Allocate a new trap: 0xc00047b9b0 14 D0713 08:48:07.549677 374228 usertrap_amd64.go:225] [ 1110: 1110] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:07.549917 374228 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.550027 374228 task_signals.go:204] [ 1110: 1113] Signal 1110, PID: 1113, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.550080 374228 task_signals.go:204] [ 1110: 1111] Signal 1110, PID: 1111, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.550212 374228 task_signals.go:204] [ 1110: 1112] Signal 1110, PID: 1112, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.550235 374228 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.550402 374228 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.550385 374228 task_signals.go:204] [ 1110: 1114] Signal 1110, PID: 1114, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.550530 374228 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.550664 374228 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.550842 374228 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.551037 374228 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.551090 374228 task_exit.go:204] [ 1110: 1111] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.551379 374228 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.551443 374228 task_exit.go:204] [ 1110: 1113] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.551530 374228 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.551576 374228 task_exit.go:204] [ 1110: 1112] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.556798 374228 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.556851 374228 task_exit.go:204] [ 1110: 1114] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.556924 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.557113 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.557197 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.557236 374228 task_exit.go:204] [ 1110: 1110] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.557854 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:07.557933 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:07.558670 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:07.558806 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:07.559354 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:07.559517 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:07.560884 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.565334 374228 syscalls.go:262] [ 1115: 1115] Allocating stack with size of 8388608 bytes D0713 08:48:07.565945 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.567991 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.568124 374228 usertrap_amd64.go:106] [ 1115: 1115] Map a usertrap vma at 64000 D0713 08:48:07.568397 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 1 D0713 08:48:07.568525 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b70f trap addr 64050 ([184 204 0 0 0 15 5] -> [255 36 37 80 64 6 0]) D0713 08:48:07.569333 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.569378 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 2 D0713 08:48:07.569440 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46ae93 trap addr 640a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 64 6 0]) D0713 08:48:07.570615 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.570658 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 3 D0713 08:48:07.570713 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b41d trap addr 640f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 64 6 0]) D0713 08:48:07.581218 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.581287 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 4 D0713 08:48:07.581385 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b1d3 trap addr 64140 ([184 14 0 0 0 15 5] -> [255 36 37 64 65 6 0]) D0713 08:48:07.583392 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.583450 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 5 D0713 08:48:07.583508 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46afa0 trap addr 64190 ([184 186 0 0 0 15 5] -> [255 36 37 144 65 6 0]) D0713 08:48:07.583697 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.583752 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 6 D0713 08:48:07.583804 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b214 trap addr 641e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 65 6 0]) D0713 08:48:07.589017 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.589078 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 7 D0713 08:48:07.589139 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b5eb trap addr 64230 ([184 56 0 0 0 15 5] -> [255 36 37 48 66 6 0]) D0713 08:48:07.589781 374228 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.589876 374228 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc002810300 8 D0713 08:48:07.589972 374228 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46b60c trap addr 64280 ([184 186 0 0 0 15 5] -> [255 36 37 128 66 6 0]) D0713 08:48:07.590957 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.591043 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 9 D0713 08:48:07.591137 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46b57c trap addr 642d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 66 6 0]) D0713 08:48:07.591272 374228 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.591335 374228 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc002810300 10 D0713 08:48:07.591601 374228 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46af76 trap addr 64320 ([184 35 0 0 0 15 5] -> [255 36 37 32 67 6 0]) D0713 08:48:07.603176 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.603248 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 11 D0713 08:48:07.603302 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46af29 trap addr 64370 ([184 37 1 0 0 15 5] -> [255 36 37 112 67 6 0]) D0713 08:48:07.603481 374228 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.603530 374228 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc002810300 12 D0713 08:48:07.603597 374228 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46b020 trap addr 643c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 67 6 0]) D0713 08:48:07.603811 374228 usertrap_amd64.go:212] [ 1115: 1116] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.603875 374228 usertrap_amd64.go:122] [ 1115: 1116] Allocate a new trap: 0xc002810300 13 D0713 08:48:07.603934 374228 usertrap_amd64.go:225] [ 1115: 1116] Apply the binary patch addr 46b04f trap addr 64410 ([184 234 0 0 0 15 5] -> [255 36 37 16 68 6 0]) D0713 08:48:07.604164 374228 task_signals.go:470] [ 1115: 1115] Notified of signal 23 D0713 08:48:07.604255 374228 task_signals.go:220] [ 1115: 1115] Signal 23: delivering to handler D0713 08:48:07.614639 374228 task_signals.go:470] [ 1115: 1115] Notified of signal 23 D0713 08:48:07.614751 374228 task_signals.go:179] [ 1115: 1115] Restarting syscall 202: interrupted by signal 23 D0713 08:48:07.614803 374228 task_signals.go:220] [ 1115: 1115] Signal 23: delivering to handler I0713 08:48:07.618253 374228 compat.go:120] Unsupported syscall sys_443(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/sys_443 for more information. D0713 08:48:07.618407 374228 usertrap_amd64.go:212] [ 1115: 1115] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.618447 374228 usertrap_amd64.go:122] [ 1115: 1115] Allocate a new trap: 0xc002810300 14 D0713 08:48:07.618531 374228 usertrap_amd64.go:225] [ 1115: 1115] Apply the binary patch addr 46ae44 trap addr 64460 ([184 231 0 0 0 15 5] -> [255 36 37 96 68 6 0]) D0713 08:48:07.618701 374228 task_exit.go:204] [ 1115: 1115] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.618795 374228 task_signals.go:204] [ 1115: 1116] Signal 1115, PID: 1116, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.618844 374228 task_signals.go:204] [ 1115: 1118] Signal 1115, PID: 1118, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.618846 374228 task_signals.go:204] [ 1115: 1117] Signal 1115, PID: 1117, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.618876 374228 task_signals.go:204] [ 1115: 1119] Signal 1115, PID: 1119, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.618905 374228 task_exit.go:204] [ 1115: 1116] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.619062 374228 task_exit.go:204] [ 1115: 1118] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.619155 374228 task_exit.go:204] [ 1115: 1117] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.619329 374228 task_exit.go:204] [ 1115: 1118] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.619394 374228 task_exit.go:204] [ 1115: 1118] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.619526 374228 task_exit.go:204] [ 1115: 1117] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.619599 374228 task_exit.go:204] [ 1115: 1117] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.619716 374228 task_exit.go:204] [ 1115: 1116] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.619772 374228 task_exit.go:204] [ 1115: 1116] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.619884 374228 task_exit.go:204] [ 1115: 1115] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.620002 374228 task_exit.go:204] [ 1115: 1119] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.625924 374228 task_exit.go:204] [ 1115: 1119] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.625989 374228 task_exit.go:204] [ 1115: 1119] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.626079 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.626336 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.626406 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.626360 374228 task_exit.go:204] [ 1115: 1115] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.628753 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.633655 374228 syscalls.go:262] [ 1120: 1120] Allocating stack with size of 8388608 bytes D0713 08:48:07.634393 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.635886 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.636013 374228 usertrap_amd64.go:106] [ 1120: 1120] Map a usertrap vma at 62000 D0713 08:48:07.636263 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 1 D0713 08:48:07.636347 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:48:07.637573 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.637641 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 2 D0713 08:48:07.637688 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:48:07.639432 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.639483 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 3 D0713 08:48:07.639535 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:48:07.649565 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.649653 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 4 D0713 08:48:07.649747 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:48:07.651828 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.651890 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 5 D0713 08:48:07.651968 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:48:07.652162 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.652224 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 6 D0713 08:48:07.652271 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:48:07.656108 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.656156 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 7 D0713 08:48:07.656232 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:48:07.656937 374228 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.657019 374228 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000a447b0 8 D0713 08:48:07.657089 374228 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:48:07.658112 374228 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.658166 374228 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000a447b0 9 D0713 08:48:07.658325 374228 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:48:07.658437 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.658497 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 10 D0713 08:48:07.658566 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:48:07.670075 374228 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.670153 374228 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000a447b0 11 D0713 08:48:07.670226 374228 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46b020 trap addr 62370 ([184 39 0 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:48:07.670377 374228 usertrap_amd64.go:212] [ 1120: 1121] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.670415 374228 usertrap_amd64.go:122] [ 1120: 1121] Allocate a new trap: 0xc000a447b0 12 D0713 08:48:07.670456 374228 usertrap_amd64.go:225] [ 1120: 1121] Apply the binary patch addr 46b04f trap addr 623c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:48:07.670545 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.670591 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 13 D0713 08:48:07.670607 374228 task_signals.go:470] [ 1120: 1120] Notified of signal 23 D0713 08:48:07.670634 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46af29 trap addr 62410 ([184 37 1 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:48:07.670715 374228 task_signals.go:220] [ 1120: 1120] Signal 23: delivering to handler D0713 08:48:07.682791 374228 task_signals.go:470] [ 1120: 1120] Notified of signal 23 D0713 08:48:07.683917 374228 task_signals.go:220] [ 1120: 1120] Signal 23: delivering to handler D0713 08:48:07.685024 374228 usertrap_amd64.go:212] [ 1120: 1120] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.685087 374228 usertrap_amd64.go:122] [ 1120: 1120] Allocate a new trap: 0xc000a447b0 14 D0713 08:48:07.685132 374228 usertrap_amd64.go:225] [ 1120: 1120] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:48:07.685306 374228 task_exit.go:204] [ 1120: 1120] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.685396 374228 task_signals.go:204] [ 1120: 1123] Signal 1120, PID: 1123, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.685454 374228 task_signals.go:204] [ 1120: 1125] Signal 1120, PID: 1125, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.685495 374228 task_signals.go:204] [ 1120: 1124] Signal 1120, PID: 1124, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.685473 374228 task_signals.go:204] [ 1120: 1121] Signal 1120, PID: 1121, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.685513 374228 task_exit.go:204] [ 1120: 1123] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.685482 374228 task_signals.go:204] [ 1120: 1122] Signal 1120, PID: 1122, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.685582 374228 task_exit.go:204] [ 1120: 1120] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.685820 374228 task_exit.go:204] [ 1120: 1123] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.685866 374228 task_exit.go:204] [ 1120: 1123] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.685991 374228 task_exit.go:204] [ 1120: 1125] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.686079 374228 task_exit.go:204] [ 1120: 1122] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.686273 374228 task_exit.go:204] [ 1120: 1122] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.686349 374228 task_exit.go:204] [ 1120: 1122] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.686462 374228 task_exit.go:204] [ 1120: 1124] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.686611 374228 task_exit.go:204] [ 1120: 1124] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.686669 374228 task_exit.go:204] [ 1120: 1124] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.686781 374228 task_exit.go:204] [ 1120: 1121] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.687045 374228 task_exit.go:204] [ 1120: 1125] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.687105 374228 task_exit.go:204] [ 1120: 1125] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.691452 374228 task_exit.go:204] [ 1120: 1121] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.691523 374228 task_exit.go:204] [ 1120: 1121] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.691598 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.691737 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.691790 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.691977 374228 task_exit.go:204] [ 1120: 1120] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.694685 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.699105 374228 syscalls.go:262] [ 1126: 1126] Allocating stack with size of 8388608 bytes D0713 08:48:07.699718 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.701802 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.701953 374228 usertrap_amd64.go:106] [ 1126: 1126] Map a usertrap vma at 68000 D0713 08:48:07.702201 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 1 D0713 08:48:07.702298 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:48:07.703180 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.703244 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 2 D0713 08:48:07.703293 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:48:07.704728 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.704829 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 3 D0713 08:48:07.705021 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:48:07.714763 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.714824 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 4 D0713 08:48:07.714881 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:48:07.716536 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.716582 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 5 D0713 08:48:07.716626 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:48:07.717064 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.717110 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 6 D0713 08:48:07.717160 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:48:07.720405 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.720450 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 7 D0713 08:48:07.720525 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:48:07.721171 374228 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.721253 374228 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc0028106f0 8 D0713 08:48:07.721364 374228 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:48:07.722086 374228 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.722141 374228 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc0028106f0 9 D0713 08:48:07.722200 374228 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:48:07.722632 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.722680 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 10 D0713 08:48:07.722754 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:48:07.724103 374228 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.724163 374228 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc0028106f0 11 D0713 08:48:07.724260 374228 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:48:07.724475 374228 usertrap_amd64.go:212] [ 1126: 1127] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.724546 374228 usertrap_amd64.go:122] [ 1126: 1127] Allocate a new trap: 0xc0028106f0 12 D0713 08:48:07.724603 374228 usertrap_amd64.go:225] [ 1126: 1127] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:48:07.724897 374228 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 08:48:07.725043 374228 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0713 08:48:07.734631 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.734693 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 13 D0713 08:48:07.734740 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:48:07.735329 374228 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 08:48:07.735562 374228 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0713 08:48:07.747100 374228 task_signals.go:470] [ 1126: 1126] Notified of signal 23 D0713 08:48:07.747188 374228 task_signals.go:220] [ 1126: 1126] Signal 23: delivering to handler D0713 08:48:07.750908 374228 usertrap_amd64.go:212] [ 1126: 1126] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.750993 374228 usertrap_amd64.go:122] [ 1126: 1126] Allocate a new trap: 0xc0028106f0 14 D0713 08:48:07.751071 374228 usertrap_amd64.go:225] [ 1126: 1126] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:48:07.751291 374228 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.751446 374228 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.751615 374228 task_signals.go:204] [ 1126: 1130] Signal 1126, PID: 1130, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.751694 374228 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.751838 374228 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.751884 374228 task_exit.go:204] [ 1126: 1130] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.752039 374228 task_signals.go:204] [ 1126: 1128] Signal 1126, PID: 1128, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.752136 374228 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.752307 374228 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.752353 374228 task_exit.go:204] [ 1126: 1128] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.752498 374228 task_signals.go:204] [ 1126: 1129] Signal 1126, PID: 1129, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.752583 374228 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.752732 374228 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.752774 374228 task_exit.go:204] [ 1126: 1129] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.752887 374228 task_signals.go:204] [ 1126: 1127] Signal 1126, PID: 1127, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.753005 374228 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.757944 374228 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.758007 374228 task_exit.go:204] [ 1126: 1127] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.758113 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.758281 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.758351 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.758382 374228 task_exit.go:204] [ 1126: 1126] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.760587 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.765220 374228 syscalls.go:262] [ 1131: 1131] Allocating stack with size of 8388608 bytes D0713 08:48:07.765944 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.774113 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.774217 374228 usertrap_amd64.go:106] [ 1131: 1131] Map a usertrap vma at 61000 D0713 08:48:07.774439 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 1 D0713 08:48:07.774558 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:07.775289 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.775355 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 2 D0713 08:48:07.775408 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:07.776664 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.776725 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 3 D0713 08:48:07.776785 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:07.786593 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.786642 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 4 D0713 08:48:07.786686 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:07.788580 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.788626 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 5 D0713 08:48:07.788669 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:07.788795 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.788831 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 6 D0713 08:48:07.788894 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:07.792992 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.793042 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 7 D0713 08:48:07.793094 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:07.793729 374228 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.793787 374228 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc001988120 8 D0713 08:48:07.793853 374228 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:07.794484 374228 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.794537 374228 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc001988120 9 D0713 08:48:07.794663 374228 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:07.794857 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.794937 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 10 D0713 08:48:07.795047 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:07.807396 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.807463 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 11 D0713 08:48:07.807535 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:07.807760 374228 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.807819 374228 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc001988120 12 D0713 08:48:07.807888 374228 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:07.808042 374228 usertrap_amd64.go:212] [ 1131: 1132] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.808092 374228 usertrap_amd64.go:122] [ 1131: 1132] Allocate a new trap: 0xc001988120 13 D0713 08:48:07.808177 374228 usertrap_amd64.go:225] [ 1131: 1132] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:07.808361 374228 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0713 08:48:07.808435 374228 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler D0713 08:48:07.819407 374228 task_signals.go:470] [ 1131: 1131] Notified of signal 23 D0713 08:48:07.821450 374228 task_signals.go:220] [ 1131: 1131] Signal 23: delivering to handler D0713 08:48:07.822352 374228 usertrap_amd64.go:212] [ 1131: 1131] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.822410 374228 usertrap_amd64.go:122] [ 1131: 1131] Allocate a new trap: 0xc001988120 14 D0713 08:48:07.822458 374228 usertrap_amd64.go:225] [ 1131: 1131] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:07.822663 374228 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.822765 374228 task_signals.go:204] [ 1131: 1135] Signal 1131, PID: 1135, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.822820 374228 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.822819 374228 task_signals.go:204] [ 1131: 1134] Signal 1131, PID: 1134, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.822817 374228 task_signals.go:204] [ 1131: 1132] Signal 1131, PID: 1132, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.822900 374228 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.823059 374228 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.823051 374228 task_signals.go:204] [ 1131: 1133] Signal 1131, PID: 1133, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.823163 374228 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.823361 374228 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.823408 374228 task_exit.go:204] [ 1131: 1133] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.823518 374228 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.823605 374228 task_exit.go:204] [ 1131: 1135] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.823732 374228 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.823863 374228 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.823935 374228 task_exit.go:204] [ 1131: 1132] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.829063 374228 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.829132 374228 task_exit.go:204] [ 1131: 1134] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.829204 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.829358 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.829414 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.829747 374228 task_exit.go:204] [ 1131: 1131] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.832999 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.838609 374228 syscalls.go:262] [ 1136: 1136] Allocating stack with size of 8388608 bytes D0713 08:48:07.839215 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.839604 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:07.839680 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:07.840974 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.841082 374228 usertrap_amd64.go:106] [ 1136: 1136] Map a usertrap vma at 6a000 D0713 08:48:07.841403 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 1 D0713 08:48:07.841519 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:07.842237 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.842289 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 2 D0713 08:48:07.842348 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:07.843507 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.843561 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 3 D0713 08:48:07.843601 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:07.853123 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.853205 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 4 D0713 08:48:07.853298 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:07.855100 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.855159 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 5 D0713 08:48:07.855252 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:07.855437 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.855499 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 6 D0713 08:48:07.855581 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:07.860590 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.860651 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 7 D0713 08:48:07.860733 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:07.861551 374228 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.861625 374228 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc000b60c30 8 D0713 08:48:07.861718 374228 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:07.862669 374228 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.862750 374228 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc000b60c30 9 D0713 08:48:07.862988 374228 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:07.863198 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.863266 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 10 D0713 08:48:07.863358 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:07.875527 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.875575 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 11 D0713 08:48:07.875618 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46af29 trap addr 6a370 ([184 37 1 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:07.876838 374228 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.876890 374228 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc000b60c30 12 D0713 08:48:07.877005 374228 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b020 trap addr 6a3c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:07.877249 374228 usertrap_amd64.go:212] [ 1136: 1137] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.877320 374228 usertrap_amd64.go:122] [ 1136: 1137] Allocate a new trap: 0xc000b60c30 13 D0713 08:48:07.877401 374228 usertrap_amd64.go:225] [ 1136: 1137] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:07.877612 374228 task_signals.go:470] [ 1136: 1136] Notified of signal 23 D0713 08:48:07.879568 374228 task_signals.go:220] [ 1136: 1136] Signal 23: delivering to handler D0713 08:48:07.889359 374228 usertrap_amd64.go:212] [ 1136: 1136] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.889418 374228 usertrap_amd64.go:122] [ 1136: 1136] Allocate a new trap: 0xc000b60c30 14 D0713 08:48:07.889475 374228 usertrap_amd64.go:225] [ 1136: 1136] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:07.889661 374228 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.889805 374228 task_signals.go:204] [ 1136: 1138] Signal 1136, PID: 1138, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.889865 374228 task_signals.go:204] [ 1136: 1140] Signal 1136, PID: 1140, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.889840 374228 task_signals.go:204] [ 1136: 1137] Signal 1136, PID: 1137, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.889915 374228 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.889921 374228 task_signals.go:204] [ 1136: 1139] Signal 1136, PID: 1139, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.889982 374228 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.890161 374228 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.890227 374228 task_exit.go:204] [ 1136: 1137] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.890349 374228 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.890462 374228 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.890578 374228 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.890904 374228 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.890988 374228 task_exit.go:204] [ 1136: 1139] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.891068 374228 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.891165 374228 task_exit.go:204] [ 1136: 1138] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.895971 374228 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.896029 374228 task_exit.go:204] [ 1136: 1140] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.896118 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.896261 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.896391 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.896490 374228 task_exit.go:204] [ 1136: 1136] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.899162 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.905262 374228 syscalls.go:262] [ 1141: 1141] Allocating stack with size of 8388608 bytes D0713 08:48:07.906270 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.906577 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:07.906697 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:07.908243 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.908365 374228 usertrap_amd64.go:106] [ 1141: 1141] Map a usertrap vma at 66000 D0713 08:48:07.908621 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 1 D0713 08:48:07.908715 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:07.909591 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.909646 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 2 D0713 08:48:07.909717 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:07.911046 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.911104 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 3 D0713 08:48:07.911175 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:07.921432 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.921493 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 4 D0713 08:48:07.921564 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:07.923297 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.923350 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 5 D0713 08:48:07.923403 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:07.923573 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.923614 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 6 D0713 08:48:07.923658 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:07.928803 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:07.928852 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 7 D0713 08:48:07.928914 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:07.929631 374228 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:07.929680 374228 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc0019883f0 8 D0713 08:48:07.929751 374228 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:07.930396 374228 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46af76:sysno 35 D0713 08:48:07.930443 374228 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc0019883f0 9 D0713 08:48:07.930539 374228 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:07.931172 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:07.931248 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 10 D0713 08:48:07.931312 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:07.942901 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46af29:sysno 293 D0713 08:48:07.942960 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 11 D0713 08:48:07.943004 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:07.943310 374228 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b020:sysno 39 D0713 08:48:07.943388 374228 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc0019883f0 12 D0713 08:48:07.943465 374228 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:07.943656 374228 usertrap_amd64.go:212] [ 1141: 1142] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:07.943722 374228 usertrap_amd64.go:122] [ 1141: 1142] Allocate a new trap: 0xc0019883f0 13 D0713 08:48:07.943773 374228 usertrap_amd64.go:225] [ 1141: 1142] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:07.943942 374228 task_signals.go:470] [ 1141: 1141] Notified of signal 23 D0713 08:48:07.944028 374228 task_signals.go:220] [ 1141: 1141] Signal 23: delivering to handler D0713 08:48:07.956650 374228 task_signals.go:470] [ 1141: 1141] Notified of signal 23 D0713 08:48:07.956779 374228 task_signals.go:220] [ 1141: 1141] Signal 23: delivering to handler D0713 08:48:07.957454 374228 usertrap_amd64.go:212] [ 1141: 1141] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:07.957524 374228 usertrap_amd64.go:122] [ 1141: 1141] Allocate a new trap: 0xc0019883f0 14 D0713 08:48:07.957584 374228 usertrap_amd64.go:225] [ 1141: 1141] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:07.957771 374228 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.957966 374228 task_signals.go:204] [ 1141: 1144] Signal 1141, PID: 1144, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.958044 374228 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.958151 374228 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.958157 374228 task_signals.go:204] [ 1141: 1145] Signal 1141, PID: 1145, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.958255 374228 task_signals.go:204] [ 1141: 1143] Signal 1141, PID: 1143, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.958339 374228 task_signals.go:204] [ 1141: 1142] Signal 1141, PID: 1142, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:07.958386 374228 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.958456 374228 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.958542 374228 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.958599 374228 task_exit.go:204] [ 1141: 1144] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.958777 374228 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.958834 374228 task_exit.go:204] [ 1141: 1143] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.958904 374228 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:07.959165 374228 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.959221 374228 task_exit.go:204] [ 1141: 1145] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.964785 374228 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:07.964862 374228 task_exit.go:204] [ 1141: 1142] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.964931 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:07.965144 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:07.965240 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:07.965376 374228 task_exit.go:204] [ 1141: 1141] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:07.968061 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.972820 374228 syscalls.go:262] [ 1146: 1146] Allocating stack with size of 8388608 bytes D0713 08:48:07.973413 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:07.975340 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:07.975439 374228 usertrap_amd64.go:106] [ 1146: 1146] Map a usertrap vma at 67000 D0713 08:48:07.975670 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 1 D0713 08:48:07.975766 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b70f trap addr 67050 ([184 204 0 0 0 15 5] -> [255 36 37 80 112 6 0]) D0713 08:48:07.976508 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:07.976565 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 2 D0713 08:48:07.976627 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae93 trap addr 670a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 112 6 0]) D0713 08:48:07.977823 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:07.977886 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 3 D0713 08:48:07.977956 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b41d trap addr 670f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 112 6 0]) D0713 08:48:07.992238 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:07.992332 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 4 D0713 08:48:07.992388 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b1d3 trap addr 67140 ([184 14 0 0 0 15 5] -> [255 36 37 64 113 6 0]) D0713 08:48:07.994249 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:07.994350 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 5 D0713 08:48:07.994418 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46afa0 trap addr 67190 ([184 186 0 0 0 15 5] -> [255 36 37 144 113 6 0]) D0713 08:48:07.994646 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b214:sysno 13 D0713 08:48:07.994717 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 6 D0713 08:48:07.994788 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b214 trap addr 671e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 113 6 0]) D0713 08:48:08.000927 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.001043 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 7 D0713 08:48:08.001138 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b5eb trap addr 67230 ([184 56 0 0 0 15 5] -> [255 36 37 48 114 6 0]) D0713 08:48:08.001895 374228 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.001961 374228 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc001696e70 8 D0713 08:48:08.002065 374228 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b60c trap addr 67280 ([184 186 0 0 0 15 5] -> [255 36 37 128 114 6 0]) D0713 08:48:08.003367 374228 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.003450 374228 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc001696e70 9 D0713 08:48:08.003749 374228 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46af76 trap addr 672d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 114 6 0]) D0713 08:48:08.003951 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.004035 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 10 D0713 08:48:08.004141 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46b57c trap addr 67320 ([184 202 0 0 0 15 5] -> [255 36 37 32 115 6 0]) D0713 08:48:08.016981 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.017041 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 11 D0713 08:48:08.017101 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46af29 trap addr 67370 ([184 37 1 0 0 15 5] -> [255 36 37 112 115 6 0]) D0713 08:48:08.020973 374228 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.021058 374228 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc001696e70 12 D0713 08:48:08.021200 374228 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b020 trap addr 673c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 115 6 0]) D0713 08:48:08.021494 374228 usertrap_amd64.go:212] [ 1146: 1147] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.021543 374228 usertrap_amd64.go:122] [ 1146: 1147] Allocate a new trap: 0xc001696e70 13 D0713 08:48:08.021609 374228 usertrap_amd64.go:225] [ 1146: 1147] Apply the binary patch addr 46b04f trap addr 67410 ([184 234 0 0 0 15 5] -> [255 36 37 16 116 6 0]) D0713 08:48:08.021781 374228 task_signals.go:470] [ 1146: 1146] Notified of signal 23 D0713 08:48:08.021925 374228 task_signals.go:220] [ 1146: 1146] Signal 23: delivering to handler D0713 08:48:08.033136 374228 usertrap_amd64.go:212] [ 1146: 1146] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.033203 374228 usertrap_amd64.go:122] [ 1146: 1146] Allocate a new trap: 0xc001696e70 14 D0713 08:48:08.033265 374228 usertrap_amd64.go:225] [ 1146: 1146] Apply the binary patch addr 46ae44 trap addr 67460 ([184 231 0 0 0 15 5] -> [255 36 37 96 116 6 0]) D0713 08:48:08.033508 374228 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.033641 374228 task_signals.go:204] [ 1146: 1150] Signal 1146, PID: 1150, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.033677 374228 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.033776 374228 task_signals.go:204] [ 1146: 1148] Signal 1146, PID: 1148, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.033766 374228 task_signals.go:204] [ 1146: 1147] Signal 1146, PID: 1147, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.033872 374228 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.034035 374228 task_signals.go:204] [ 1146: 1149] Signal 1146, PID: 1149, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.034072 374228 task_signals.go:204] [ 1146: 1151] Signal 1146, PID: 1151, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.034159 374228 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.034313 374228 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.034350 374228 task_exit.go:204] [ 1146: 1149] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.034484 374228 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.034627 374228 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.034864 374228 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.034913 374228 task_exit.go:204] [ 1146: 1147] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.035047 374228 task_exit.go:204] [ 1146: 1151] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.035208 374228 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.035280 374228 task_exit.go:204] [ 1146: 1150] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.035461 374228 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.035522 374228 task_exit.go:204] [ 1146: 1148] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.040222 374228 task_exit.go:204] [ 1146: 1151] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.040272 374228 task_exit.go:204] [ 1146: 1151] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.040435 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.040589 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.040674 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.040830 374228 task_exit.go:204] [ 1146: 1146] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.043853 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.049653 374228 syscalls.go:262] [ 1152: 1152] Allocating stack with size of 8388608 bytes D0713 08:48:08.050373 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.050746 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:08.050918 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.054199 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.054333 374228 usertrap_amd64.go:106] [ 1152: 1152] Map a usertrap vma at 62000 D0713 08:48:08.054603 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 1 D0713 08:48:08.054733 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:48:08.055544 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.055600 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 2 D0713 08:48:08.055670 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:48:08.056891 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.056986 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 3 D0713 08:48:08.057070 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:48:08.065691 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.065771 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 4 D0713 08:48:08.065825 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:48:08.067341 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.067408 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 5 D0713 08:48:08.067475 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:48:08.067662 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.067701 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 6 D0713 08:48:08.067786 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:48:08.071364 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.071409 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 7 D0713 08:48:08.071492 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:48:08.072112 374228 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.072172 374228 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc0023bebd0 8 D0713 08:48:08.072259 374228 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:48:08.075685 374228 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.075795 374228 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc0023bebd0 9 D0713 08:48:08.077118 374228 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:48:08.077441 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.077560 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 10 D0713 08:48:08.077653 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:48:08.088862 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.089041 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 11 D0713 08:48:08.089151 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:48:08.090869 374228 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.091014 374228 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc0023bebd0 12 D0713 08:48:08.091230 374228 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:48:08.091420 374228 usertrap_amd64.go:212] [ 1152: 1153] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.091469 374228 usertrap_amd64.go:122] [ 1152: 1153] Allocate a new trap: 0xc0023bebd0 13 D0713 08:48:08.091529 374228 usertrap_amd64.go:225] [ 1152: 1153] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:48:08.091710 374228 task_signals.go:470] [ 1152: 1152] Notified of signal 23 D0713 08:48:08.093887 374228 task_signals.go:220] [ 1152: 1152] Signal 23: delivering to handler D0713 08:48:08.103805 374228 usertrap_amd64.go:212] [ 1152: 1152] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.103871 374228 usertrap_amd64.go:122] [ 1152: 1152] Allocate a new trap: 0xc0023bebd0 14 D0713 08:48:08.103959 374228 usertrap_amd64.go:225] [ 1152: 1152] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:48:08.104177 374228 task_exit.go:204] [ 1152: 1152] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.104306 374228 task_signals.go:204] [ 1152: 1156] Signal 1152, PID: 1156, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.104340 374228 task_signals.go:204] [ 1152: 1153] Signal 1152, PID: 1153, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.104431 374228 task_signals.go:204] [ 1152: 1154] Signal 1152, PID: 1154, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.104462 374228 task_signals.go:204] [ 1152: 1155] Signal 1152, PID: 1155, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.104463 374228 task_signals.go:204] [ 1152: 1157] Signal 1152, PID: 1157, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.104464 374228 task_exit.go:204] [ 1152: 1152] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.104594 374228 task_exit.go:204] [ 1152: 1154] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.104757 374228 task_exit.go:204] [ 1152: 1154] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.104802 374228 task_exit.go:204] [ 1152: 1154] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.104908 374228 task_exit.go:204] [ 1152: 1153] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.105138 374228 task_exit.go:204] [ 1152: 1155] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.105290 374228 task_exit.go:204] [ 1152: 1156] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.105509 374228 task_exit.go:204] [ 1152: 1156] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.105563 374228 task_exit.go:204] [ 1152: 1156] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.105711 374228 task_exit.go:204] [ 1152: 1155] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.105764 374228 task_exit.go:204] [ 1152: 1155] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.105859 374228 task_exit.go:204] [ 1152: 1153] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.105916 374228 task_exit.go:204] [ 1152: 1153] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.106031 374228 task_exit.go:204] [ 1152: 1157] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.111744 374228 task_exit.go:204] [ 1152: 1157] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.111802 374228 task_exit.go:204] [ 1152: 1157] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.111880 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.112022 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.112075 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.112149 374228 task_exit.go:204] [ 1152: 1152] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.114652 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.119083 374228 syscalls.go:262] [ 1158: 1158] Allocating stack with size of 8388608 bytes D0713 08:48:08.120077 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.121869 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.121970 374228 usertrap_amd64.go:106] [ 1158: 1158] Map a usertrap vma at 66000 D0713 08:48:08.122194 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 1 D0713 08:48:08.122286 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:08.122992 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.123031 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 2 D0713 08:48:08.123094 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:08.124036 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.124086 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 3 D0713 08:48:08.124142 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:08.132512 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.132573 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 4 D0713 08:48:08.132641 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:08.134047 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.134114 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 5 D0713 08:48:08.134203 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:08.134372 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.134419 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 6 D0713 08:48:08.134497 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:08.138484 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.138558 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 7 D0713 08:48:08.138641 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:08.139253 374228 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.139330 374228 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc001696210 8 D0713 08:48:08.139420 374228 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:08.140170 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.140233 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 9 D0713 08:48:08.140325 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:08.140584 374228 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.140636 374228 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc001696210 10 D0713 08:48:08.140702 374228 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:08.151204 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.151266 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 11 D0713 08:48:08.151369 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46af29 trap addr 66370 ([184 37 1 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:08.152877 374228 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.152935 374228 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc001696210 12 D0713 08:48:08.153020 374228 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46b020 trap addr 663c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:08.153194 374228 usertrap_amd64.go:212] [ 1158: 1159] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.153245 374228 usertrap_amd64.go:122] [ 1158: 1159] Allocate a new trap: 0xc001696210 13 D0713 08:48:08.153330 374228 usertrap_amd64.go:225] [ 1158: 1159] Apply the binary patch addr 46b04f trap addr 66410 ([184 234 0 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:08.153497 374228 task_signals.go:470] [ 1158: 1158] Notified of signal 23 D0713 08:48:08.153657 374228 task_signals.go:220] [ 1158: 1158] Signal 23: delivering to handler D0713 08:48:08.166280 374228 usertrap_amd64.go:212] [ 1158: 1158] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.166335 374228 usertrap_amd64.go:122] [ 1158: 1158] Allocate a new trap: 0xc001696210 14 D0713 08:48:08.166418 374228 usertrap_amd64.go:225] [ 1158: 1158] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:08.166612 374228 task_exit.go:204] [ 1158: 1158] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.166798 374228 task_exit.go:204] [ 1158: 1158] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.166768 374228 task_signals.go:204] [ 1158: 1160] Signal 1158, PID: 1160, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.166880 374228 task_signals.go:204] [ 1158: 1159] Signal 1158, PID: 1159, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.166951 374228 task_exit.go:204] [ 1158: 1160] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.167032 374228 task_signals.go:204] [ 1158: 1162] Signal 1158, PID: 1162, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.167117 374228 task_signals.go:204] [ 1158: 1161] Signal 1158, PID: 1161, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.167252 374228 task_exit.go:204] [ 1158: 1162] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.167437 374228 task_exit.go:204] [ 1158: 1162] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.167499 374228 task_exit.go:204] [ 1158: 1162] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.167628 374228 task_exit.go:204] [ 1158: 1159] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.167816 374228 task_exit.go:204] [ 1158: 1159] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.167878 374228 task_exit.go:204] [ 1158: 1159] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.168014 374228 task_exit.go:204] [ 1158: 1161] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.168204 374228 task_exit.go:204] [ 1158: 1160] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.168257 374228 task_exit.go:204] [ 1158: 1160] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.172893 374228 task_exit.go:204] [ 1158: 1161] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.173010 374228 task_exit.go:204] [ 1158: 1161] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.173091 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.173206 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.173248 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.173311 374228 task_exit.go:204] [ 1158: 1158] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.175551 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.180788 374228 syscalls.go:262] [ 1163: 1163] Allocating stack with size of 8388608 bytes D0713 08:48:08.181628 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.183225 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.183359 374228 usertrap_amd64.go:106] [ 1163: 1163] Map a usertrap vma at 68000 D0713 08:48:08.183623 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 1 D0713 08:48:08.183762 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:48:08.184528 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.184583 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 2 D0713 08:48:08.184644 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:48:08.189387 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.189432 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 3 D0713 08:48:08.189488 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:48:08.199118 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.199182 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 4 D0713 08:48:08.199261 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:48:08.200657 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.200704 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 5 D0713 08:48:08.200762 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:48:08.200935 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.201021 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 6 D0713 08:48:08.201086 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:48:08.205006 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.205068 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 7 D0713 08:48:08.205151 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:48:08.205907 374228 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.205985 374228 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc001696420 8 D0713 08:48:08.206052 374228 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:48:08.206704 374228 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.206758 374228 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc001696420 9 D0713 08:48:08.206837 374228 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46af76 trap addr 682d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:48:08.206937 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.206978 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 10 D0713 08:48:08.207195 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46b57c trap addr 68320 ([184 202 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:48:08.218379 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.218431 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 11 D0713 08:48:08.218476 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46af29 trap addr 68370 ([184 37 1 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:48:08.218740 374228 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.218832 374228 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc001696420 12 D0713 08:48:08.218926 374228 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b020 trap addr 683c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:48:08.219183 374228 usertrap_amd64.go:212] [ 1163: 1164] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.219246 374228 usertrap_amd64.go:122] [ 1163: 1164] Allocate a new trap: 0xc001696420 13 D0713 08:48:08.219309 374228 usertrap_amd64.go:225] [ 1163: 1164] Apply the binary patch addr 46b04f trap addr 68410 ([184 234 0 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:48:08.219541 374228 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 08:48:08.219667 374228 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 08:48:08.230051 374228 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 08:48:08.231909 374228 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler D0713 08:48:08.232409 374228 task_signals.go:470] [ 1163: 1163] Notified of signal 23 D0713 08:48:08.232603 374228 task_signals.go:220] [ 1163: 1163] Signal 23: delivering to handler I0713 08:48:08.233195 374228 compat.go:120] Unsupported syscall remap_file_pages(0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef,0xffffffffffffd8ef). It is likely that you can safely ignore this message and that this is not the cause of any error. Please, refer to https://gvisor.dev/c/linux/amd64/remap_file_pages for more information. D0713 08:48:08.233341 374228 usertrap_amd64.go:212] [ 1163: 1163] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.233383 374228 usertrap_amd64.go:122] [ 1163: 1163] Allocate a new trap: 0xc001696420 14 D0713 08:48:08.233460 374228 usertrap_amd64.go:225] [ 1163: 1163] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:48:08.233673 374228 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.233785 374228 task_signals.go:204] [ 1163: 1164] Signal 1163, PID: 1164, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.233833 374228 task_signals.go:204] [ 1163: 1165] Signal 1163, PID: 1165, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.233839 374228 task_signals.go:204] [ 1163: 1168] Signal 1163, PID: 1168, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.233896 374228 task_signals.go:204] [ 1163: 1166] Signal 1163, PID: 1166, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.233940 374228 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.234060 374228 task_signals.go:204] [ 1163: 1167] Signal 1163, PID: 1167, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.234159 374228 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.234279 374228 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.234421 374228 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.234472 374228 task_exit.go:204] [ 1163: 1165] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.234564 374228 task_exit.go:204] [ 1163: 1168] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.234742 374228 task_exit.go:204] [ 1163: 1168] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.234801 374228 task_exit.go:204] [ 1163: 1168] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.234906 374228 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.235032 374228 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.235086 374228 task_exit.go:204] [ 1163: 1166] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.235174 374228 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.235333 374228 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.235377 374228 task_exit.go:204] [ 1163: 1167] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.240373 374228 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.240441 374228 task_exit.go:204] [ 1163: 1164] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.240546 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.240738 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.240876 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.241209 374228 task_exit.go:204] [ 1163: 1163] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.243724 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.249328 374228 syscalls.go:262] [ 1169: 1169] Allocating stack with size of 8388608 bytes D0713 08:48:08.250176 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.252135 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.252321 374228 usertrap_amd64.go:106] [ 1169: 1169] Map a usertrap vma at 6a000 D0713 08:48:08.252604 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 1 D0713 08:48:08.252741 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:08.265935 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.266007 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 2 D0713 08:48:08.266106 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:08.267510 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.267560 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 3 D0713 08:48:08.267622 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:08.276475 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.276533 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 4 D0713 08:48:08.276605 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:08.278281 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.278359 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 5 D0713 08:48:08.278420 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:08.278620 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.278665 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 6 D0713 08:48:08.278744 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:08.282807 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.282869 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 7 D0713 08:48:08.282946 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:08.283580 374228 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.283643 374228 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000a446f0 8 D0713 08:48:08.283710 374228 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:08.284315 374228 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.284386 374228 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000a446f0 9 D0713 08:48:08.284456 374228 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:08.284685 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.284760 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 10 D0713 08:48:08.284823 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:08.296972 374228 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.297036 374228 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000a446f0 11 D0713 08:48:08.297200 374228 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:08.297375 374228 usertrap_amd64.go:212] [ 1169: 1170] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.297439 374228 usertrap_amd64.go:122] [ 1169: 1170] Allocate a new trap: 0xc000a446f0 12 D0713 08:48:08.297500 374228 usertrap_amd64.go:225] [ 1169: 1170] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:08.297721 374228 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 08:48:08.297856 374228 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 08:48:08.301661 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.301777 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 13 D0713 08:48:08.301855 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:08.308761 374228 task_signals.go:470] [ 1169: 1169] Notified of signal 23 D0713 08:48:08.308896 374228 task_signals.go:179] [ 1169: 1169] Restarting syscall 202: interrupted by signal 23 D0713 08:48:08.308995 374228 task_signals.go:220] [ 1169: 1169] Signal 23: delivering to handler D0713 08:48:08.316158 374228 usertrap_amd64.go:212] [ 1169: 1169] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.316235 374228 usertrap_amd64.go:122] [ 1169: 1169] Allocate a new trap: 0xc000a446f0 14 D0713 08:48:08.316328 374228 usertrap_amd64.go:225] [ 1169: 1169] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:08.316644 374228 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.316777 374228 task_signals.go:204] [ 1169: 1173] Signal 1169, PID: 1173, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.316899 374228 task_signals.go:204] [ 1169: 1170] Signal 1169, PID: 1170, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.316907 374228 task_signals.go:204] [ 1169: 1172] Signal 1169, PID: 1172, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.316960 374228 task_signals.go:204] [ 1169: 1171] Signal 1169, PID: 1171, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.317007 374228 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.317235 374228 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.317400 374228 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.317671 374228 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.317922 374228 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.318000 374228 task_exit.go:204] [ 1169: 1171] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.318166 374228 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.318262 374228 task_exit.go:204] [ 1169: 1172] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.318341 374228 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.318410 374228 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.318482 374228 task_exit.go:204] [ 1169: 1173] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.322493 374228 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.322590 374228 task_exit.go:204] [ 1169: 1170] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.322673 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.322821 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.322877 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.322982 374228 task_exit.go:204] [ 1169: 1169] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.325990 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.331424 374228 syscalls.go:262] [ 1174: 1174] Allocating stack with size of 8388608 bytes D0713 08:48:08.332032 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.333119 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:08.333250 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.333947 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:08.334161 374228 task_signals.go:179] [ 7: 14] Restarting syscall 247: interrupted by signal 23 D0713 08:48:08.334286 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.334496 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.334606 374228 usertrap_amd64.go:106] [ 1174: 1174] Map a usertrap vma at 6a000 D0713 08:48:08.334867 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 1 D0713 08:48:08.334973 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:08.335992 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.336054 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 2 D0713 08:48:08.336221 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:08.341557 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.341635 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 3 D0713 08:48:08.341726 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:08.351767 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.351821 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 4 D0713 08:48:08.351880 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:08.353732 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.353790 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 5 D0713 08:48:08.353848 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:08.354042 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.354096 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 6 D0713 08:48:08.354139 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:08.358904 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.358952 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 7 D0713 08:48:08.358997 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:08.359593 374228 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.359651 374228 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc0005cc210 8 D0713 08:48:08.359726 374228 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:08.360594 374228 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.360645 374228 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc0005cc210 9 D0713 08:48:08.360808 374228 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:08.361060 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.361129 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 10 D0713 08:48:08.361206 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:08.363040 374228 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.363098 374228 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc0005cc210 11 D0713 08:48:08.363228 374228 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:08.363580 374228 usertrap_amd64.go:212] [ 1174: 1175] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.363630 374228 usertrap_amd64.go:122] [ 1174: 1175] Allocate a new trap: 0xc0005cc210 12 D0713 08:48:08.363693 374228 usertrap_amd64.go:225] [ 1174: 1175] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:08.363914 374228 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 08:48:08.364325 374228 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 08:48:08.373863 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.373925 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 13 D0713 08:48:08.373988 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:08.375581 374228 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 08:48:08.375718 374228 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 08:48:08.386914 374228 task_signals.go:470] [ 1174: 1174] Notified of signal 23 D0713 08:48:08.387686 374228 task_signals.go:220] [ 1174: 1174] Signal 23: delivering to handler D0713 08:48:08.388666 374228 usertrap_amd64.go:212] [ 1174: 1174] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.388732 374228 usertrap_amd64.go:122] [ 1174: 1174] Allocate a new trap: 0xc0005cc210 14 D0713 08:48:08.388790 374228 usertrap_amd64.go:225] [ 1174: 1174] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:08.389041 374228 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.389166 374228 task_signals.go:204] [ 1174: 1176] Signal 1174, PID: 1176, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.389242 374228 task_signals.go:204] [ 1174: 1179] Signal 1174, PID: 1179, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.389290 374228 task_signals.go:204] [ 1174: 1178] Signal 1174, PID: 1178, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.389317 374228 task_signals.go:204] [ 1174: 1177] Signal 1174, PID: 1177, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.389313 374228 task_signals.go:204] [ 1174: 1175] Signal 1174, PID: 1175, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.389404 374228 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.389550 374228 task_exit.go:204] [ 1174: 1179] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.389659 374228 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.389877 374228 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.390003 374228 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.390177 374228 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.390218 374228 task_exit.go:204] [ 1174: 1175] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.390329 374228 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.390530 374228 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.390595 374228 task_exit.go:204] [ 1174: 1176] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.390788 374228 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.390850 374228 task_exit.go:204] [ 1174: 1177] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.390985 374228 task_exit.go:204] [ 1174: 1179] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.391034 374228 task_exit.go:204] [ 1174: 1179] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.394971 374228 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.395022 374228 task_exit.go:204] [ 1174: 1178] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.395097 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.395197 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.395281 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.395779 374228 task_exit.go:204] [ 1174: 1174] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.398011 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.405284 374228 syscalls.go:262] [ 1180: 1180] Allocating stack with size of 8388608 bytes D0713 08:48:08.405987 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.407195 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.407303 374228 usertrap_amd64.go:106] [ 1180: 1180] Map a usertrap vma at 69000 D0713 08:48:08.407541 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 1 D0713 08:48:08.407659 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b70f trap addr 69050 ([184 204 0 0 0 15 5] -> [255 36 37 80 144 6 0]) D0713 08:48:08.407722 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:08.408427 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.408771 374228 task_signals.go:481] [ 7: 14] No task notified of signal 23 D0713 08:48:08.409093 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.413873 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.413953 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 2 D0713 08:48:08.414032 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae93 trap addr 690a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 144 6 0]) D0713 08:48:08.415481 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.415532 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 3 D0713 08:48:08.415584 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b41d trap addr 690f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 144 6 0]) D0713 08:48:08.426070 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.426145 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 4 D0713 08:48:08.426216 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b1d3 trap addr 69140 ([184 14 0 0 0 15 5] -> [255 36 37 64 145 6 0]) D0713 08:48:08.427613 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.427680 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 5 D0713 08:48:08.427759 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46afa0 trap addr 69190 ([184 186 0 0 0 15 5] -> [255 36 37 144 145 6 0]) D0713 08:48:08.427927 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.427973 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 6 D0713 08:48:08.428027 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b214 trap addr 691e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 145 6 0]) D0713 08:48:08.431168 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.431249 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 7 D0713 08:48:08.431296 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b5eb trap addr 69230 ([184 56 0 0 0 15 5] -> [255 36 37 48 146 6 0]) D0713 08:48:08.431878 374228 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.431935 374228 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc002810a80 8 D0713 08:48:08.432018 374228 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b60c trap addr 69280 ([184 186 0 0 0 15 5] -> [255 36 37 128 146 6 0]) D0713 08:48:08.432594 374228 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.432653 374228 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc002810a80 9 D0713 08:48:08.432810 374228 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46af76 trap addr 692d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 146 6 0]) D0713 08:48:08.433019 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.433068 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 10 D0713 08:48:08.433127 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46b57c trap addr 69320 ([184 202 0 0 0 15 5] -> [255 36 37 32 147 6 0]) D0713 08:48:08.445105 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.445153 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 11 D0713 08:48:08.445199 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46af29 trap addr 69370 ([184 37 1 0 0 15 5] -> [255 36 37 112 147 6 0]) D0713 08:48:08.447098 374228 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.447188 374228 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc002810a80 12 D0713 08:48:08.447308 374228 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b020 trap addr 693c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 147 6 0]) D0713 08:48:08.447541 374228 usertrap_amd64.go:212] [ 1180: 1181] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.447599 374228 usertrap_amd64.go:122] [ 1180: 1181] Allocate a new trap: 0xc002810a80 13 D0713 08:48:08.447658 374228 usertrap_amd64.go:225] [ 1180: 1181] Apply the binary patch addr 46b04f trap addr 69410 ([184 234 0 0 0 15 5] -> [255 36 37 16 148 6 0]) D0713 08:48:08.447893 374228 task_signals.go:470] [ 1180: 1180] Notified of signal 23 D0713 08:48:08.448127 374228 task_signals.go:220] [ 1180: 1180] Signal 23: delivering to handler D0713 08:48:08.462301 374228 task_signals.go:470] [ 1180: 1180] Notified of signal 23 D0713 08:48:08.465116 374228 task_signals.go:220] [ 1180: 1180] Signal 23: delivering to handler D0713 08:48:08.466442 374228 usertrap_amd64.go:212] [ 1180: 1180] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.466534 374228 usertrap_amd64.go:122] [ 1180: 1180] Allocate a new trap: 0xc002810a80 14 D0713 08:48:08.466628 374228 usertrap_amd64.go:225] [ 1180: 1180] Apply the binary patch addr 46ae44 trap addr 69460 ([184 231 0 0 0 15 5] -> [255 36 37 96 148 6 0]) D0713 08:48:08.466819 374228 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.466924 374228 task_signals.go:204] [ 1180: 1182] Signal 1180, PID: 1182, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.467001 374228 task_signals.go:204] [ 1180: 1185] Signal 1180, PID: 1185, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.467055 374228 task_signals.go:204] [ 1180: 1184] Signal 1180, PID: 1184, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.467066 374228 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.467263 374228 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.467350 374228 task_signals.go:204] [ 1180: 1181] Signal 1180, PID: 1181, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.467350 374228 task_signals.go:204] [ 1180: 1183] Signal 1180, PID: 1183, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.467403 374228 task_exit.go:204] [ 1180: 1185] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.467539 374228 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.467774 374228 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.467847 374228 task_exit.go:204] [ 1180: 1184] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.467987 374228 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.468213 374228 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.468256 374228 task_exit.go:204] [ 1180: 1181] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.468382 374228 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.468644 374228 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.468707 374228 task_exit.go:204] [ 1180: 1182] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.468839 374228 task_exit.go:204] [ 1180: 1185] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.468911 374228 task_exit.go:204] [ 1180: 1185] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.473805 374228 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.473876 374228 task_exit.go:204] [ 1180: 1183] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.473979 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.474089 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.474170 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.474255 374228 task_exit.go:204] [ 1180: 1180] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.477211 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.483946 374228 syscalls.go:262] [ 1186: 1186] Allocating stack with size of 8388608 bytes D0713 08:48:08.484643 374228 task_signals.go:481] [ 7: 14] No task notified of signal 23 D0713 08:48:08.484776 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.485038 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.485555 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:08.485779 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.486904 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.487067 374228 usertrap_amd64.go:106] [ 1186: 1186] Map a usertrap vma at 66000 D0713 08:48:08.487467 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 1 D0713 08:48:08.487600 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:08.490434 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.490495 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 2 D0713 08:48:08.490562 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:08.491971 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.492057 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 3 D0713 08:48:08.492157 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:08.502690 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.502791 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 4 D0713 08:48:08.502863 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:08.504897 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.505038 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 5 D0713 08:48:08.505107 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:08.505300 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.505346 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 6 D0713 08:48:08.505410 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:08.512494 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.512558 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 7 D0713 08:48:08.512627 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:08.513618 374228 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.513733 374228 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000a44ae0 8 D0713 08:48:08.513806 374228 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:08.514414 374228 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.514475 374228 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000a44ae0 9 D0713 08:48:08.514723 374228 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46af76 trap addr 662d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:08.514876 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.514959 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 10 D0713 08:48:08.515040 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46b57c trap addr 66320 ([184 202 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:08.516801 374228 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.516869 374228 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000a44ae0 11 D0713 08:48:08.516930 374228 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:08.517221 374228 usertrap_amd64.go:212] [ 1186: 1187] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.517373 374228 usertrap_amd64.go:122] [ 1186: 1187] Allocate a new trap: 0xc000a44ae0 12 D0713 08:48:08.517468 374228 usertrap_amd64.go:225] [ 1186: 1187] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:08.517744 374228 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 08:48:08.517869 374228 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0713 08:48:08.527710 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.527802 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 13 D0713 08:48:08.527854 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:08.529648 374228 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 08:48:08.529801 374228 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0713 08:48:08.543934 374228 task_signals.go:470] [ 1186: 1186] Notified of signal 23 D0713 08:48:08.544722 374228 task_signals.go:220] [ 1186: 1186] Signal 23: delivering to handler D0713 08:48:08.546451 374228 usertrap_amd64.go:212] [ 1186: 1186] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.546549 374228 usertrap_amd64.go:122] [ 1186: 1186] Allocate a new trap: 0xc000a44ae0 14 D0713 08:48:08.546630 374228 usertrap_amd64.go:225] [ 1186: 1186] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:08.546883 374228 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.547092 374228 task_signals.go:204] [ 1186: 1188] Signal 1186, PID: 1188, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.547118 374228 task_signals.go:204] [ 1186: 1190] Signal 1186, PID: 1190, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.547179 374228 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.547189 374228 task_signals.go:204] [ 1186: 1187] Signal 1186, PID: 1187, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.547417 374228 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.547576 374228 task_signals.go:204] [ 1186: 1189] Signal 1186, PID: 1189, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.547804 374228 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.548060 374228 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.548208 374228 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.548416 374228 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.548477 374228 task_exit.go:204] [ 1186: 1190] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.548600 374228 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.548658 374228 task_exit.go:204] [ 1186: 1187] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.548821 374228 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.548867 374228 task_exit.go:204] [ 1186: 1188] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.554504 374228 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.554707 374228 task_exit.go:204] [ 1186: 1189] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.554821 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.555080 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.555191 374228 task_exit.go:204] [ 1186: 1186] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.555232 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.557895 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.563649 374228 syscalls.go:262] [ 1191: 1191] Allocating stack with size of 8388608 bytes D0713 08:48:08.564545 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.566110 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:08.566519 374228 task_signals.go:179] [ 7: 14] Restarting syscall 247: interrupted by signal 23 D0713 08:48:08.566731 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.567976 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.568147 374228 usertrap_amd64.go:106] [ 1191: 1191] Map a usertrap vma at 6a000 D0713 08:48:08.568445 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 1 D0713 08:48:08.568583 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:08.569723 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.569803 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 2 D0713 08:48:08.569909 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:08.571285 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.571341 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 3 D0713 08:48:08.571406 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:08.585959 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.586063 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 4 D0713 08:48:08.586136 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:08.588005 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.588109 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 5 D0713 08:48:08.588197 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:08.588361 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.588416 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 6 D0713 08:48:08.588489 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:08.592623 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.592698 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 7 D0713 08:48:08.592779 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:08.593938 374228 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.594093 374228 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0019890e0 8 D0713 08:48:08.594301 374228 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:08.594810 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.594893 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 9 D0713 08:48:08.594994 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46b57c trap addr 6a2d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:08.595168 374228 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.595239 374228 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0019890e0 10 D0713 08:48:08.595328 374228 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46af76 trap addr 6a320 ([184 35 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:08.597386 374228 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.597478 374228 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0019890e0 11 D0713 08:48:08.597760 374228 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:08.597959 374228 usertrap_amd64.go:212] [ 1191: 1192] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.598034 374228 usertrap_amd64.go:122] [ 1191: 1192] Allocate a new trap: 0xc0019890e0 12 D0713 08:48:08.598096 374228 usertrap_amd64.go:225] [ 1191: 1192] Apply the binary patch addr 46b04f trap addr 6a3c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:08.598316 374228 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 08:48:08.598491 374228 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 08:48:08.610043 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.610148 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 13 D0713 08:48:08.610226 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46af29 trap addr 6a410 ([184 37 1 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:08.610273 374228 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 08:48:08.610366 374228 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 08:48:08.611018 374228 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 08:48:08.611140 374228 task_signals.go:179] [ 1191: 1191] Restarting syscall 202: interrupted by signal 23 D0713 08:48:08.611197 374228 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 08:48:08.625113 374228 task_signals.go:470] [ 1191: 1191] Notified of signal 23 D0713 08:48:08.626848 374228 task_signals.go:220] [ 1191: 1191] Signal 23: delivering to handler D0713 08:48:08.627960 374228 usertrap_amd64.go:212] [ 1191: 1191] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.628017 374228 usertrap_amd64.go:122] [ 1191: 1191] Allocate a new trap: 0xc0019890e0 14 D0713 08:48:08.628072 374228 usertrap_amd64.go:225] [ 1191: 1191] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:08.628268 374228 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.628440 374228 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.628442 374228 task_signals.go:204] [ 1191: 1195] Signal 1191, PID: 1195, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.628439 374228 task_signals.go:204] [ 1191: 1194] Signal 1191, PID: 1194, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.628559 374228 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.628461 374228 task_signals.go:204] [ 1191: 1192] Signal 1191, PID: 1192, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.628547 374228 task_signals.go:204] [ 1191: 1193] Signal 1191, PID: 1193, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.628708 374228 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.628880 374228 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.628971 374228 task_exit.go:204] [ 1191: 1192] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.629142 374228 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.629348 374228 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.629399 374228 task_exit.go:204] [ 1191: 1193] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.629551 374228 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.629790 374228 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.629849 374228 task_exit.go:204] [ 1191: 1195] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.634848 374228 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.634940 374228 task_exit.go:204] [ 1191: 1194] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.635056 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.635244 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.635333 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.635273 374228 task_exit.go:204] [ 1191: 1191] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.638257 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.642269 374228 syscalls.go:262] [ 1196: 1196] Allocating stack with size of 8388608 bytes D0713 08:48:08.643081 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.646281 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.646478 374228 usertrap_amd64.go:106] [ 1196: 1196] Map a usertrap vma at 66000 D0713 08:48:08.646819 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 1 D0713 08:48:08.646989 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b70f trap addr 66050 ([184 204 0 0 0 15 5] -> [255 36 37 80 96 6 0]) D0713 08:48:08.647923 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.647981 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 2 D0713 08:48:08.648054 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae93 trap addr 660a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 96 6 0]) D0713 08:48:08.649480 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.649537 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 3 D0713 08:48:08.649624 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b41d trap addr 660f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 96 6 0]) D0713 08:48:08.661356 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.661503 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 4 D0713 08:48:08.661596 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b1d3 trap addr 66140 ([184 14 0 0 0 15 5] -> [255 36 37 64 97 6 0]) D0713 08:48:08.663384 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.663464 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 5 D0713 08:48:08.663531 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46afa0 trap addr 66190 ([184 186 0 0 0 15 5] -> [255 36 37 144 97 6 0]) D0713 08:48:08.663738 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.663790 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 6 D0713 08:48:08.663863 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b214 trap addr 661e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 97 6 0]) D0713 08:48:08.668655 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.668754 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 7 D0713 08:48:08.668835 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b5eb trap addr 66230 ([184 56 0 0 0 15 5] -> [255 36 37 48 98 6 0]) D0713 08:48:08.669715 374228 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.669818 374228 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc0005ccba0 8 D0713 08:48:08.669958 374228 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b60c trap addr 66280 ([184 186 0 0 0 15 5] -> [255 36 37 128 98 6 0]) D0713 08:48:08.670979 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.671068 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 9 D0713 08:48:08.671143 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46b57c trap addr 662d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 98 6 0]) D0713 08:48:08.672590 374228 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.672673 374228 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc0005ccba0 10 D0713 08:48:08.672771 374228 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46af76 trap addr 66320 ([184 35 0 0 0 15 5] -> [255 36 37 32 99 6 0]) D0713 08:48:08.673150 374228 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.673213 374228 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc0005ccba0 11 D0713 08:48:08.673323 374228 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b020 trap addr 66370 ([184 39 0 0 0 15 5] -> [255 36 37 112 99 6 0]) D0713 08:48:08.673464 374228 usertrap_amd64.go:212] [ 1196: 1197] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.673532 374228 usertrap_amd64.go:122] [ 1196: 1197] Allocate a new trap: 0xc0005ccba0 12 D0713 08:48:08.673615 374228 usertrap_amd64.go:225] [ 1196: 1197] Apply the binary patch addr 46b04f trap addr 663c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 99 6 0]) D0713 08:48:08.673827 374228 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 08:48:08.673937 374228 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 08:48:08.685551 374228 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 08:48:08.685610 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.685887 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 13 D0713 08:48:08.685965 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46af29 trap addr 66410 ([184 37 1 0 0 15 5] -> [255 36 37 16 100 6 0]) D0713 08:48:08.686097 374228 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 08:48:08.686340 374228 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 08:48:08.686487 374228 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 08:48:08.703670 374228 task_signals.go:470] [ 1196: 1196] Notified of signal 23 D0713 08:48:08.703863 374228 task_signals.go:179] [ 1196: 1196] Restarting syscall 202: interrupted by signal 23 D0713 08:48:08.703925 374228 task_signals.go:220] [ 1196: 1196] Signal 23: delivering to handler D0713 08:48:08.704626 374228 sys_signal.go:495] [ 1196: 1196] Restart block missing in restart_syscall(2). Did ptrace inject a return value of ERESTART_RESTARTBLOCK? D0713 08:48:08.704783 374228 usertrap_amd64.go:212] [ 1196: 1196] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.704836 374228 usertrap_amd64.go:122] [ 1196: 1196] Allocate a new trap: 0xc0005ccba0 14 D0713 08:48:08.704921 374228 usertrap_amd64.go:225] [ 1196: 1196] Apply the binary patch addr 46ae44 trap addr 66460 ([184 231 0 0 0 15 5] -> [255 36 37 96 100 6 0]) D0713 08:48:08.705187 374228 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.705370 374228 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.705396 374228 task_signals.go:204] [ 1196: 1198] Signal 1196, PID: 1198, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.705484 374228 task_signals.go:204] [ 1196: 1200] Signal 1196, PID: 1200, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.705502 374228 task_signals.go:204] [ 1196: 1197] Signal 1196, PID: 1197, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.705562 374228 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.705561 374228 task_signals.go:204] [ 1196: 1199] Signal 1196, PID: 1199, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.705660 374228 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.705933 374228 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.706060 374228 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.706446 374228 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.706501 374228 task_exit.go:204] [ 1196: 1200] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.706647 374228 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.706701 374228 task_exit.go:204] [ 1196: 1199] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.706842 374228 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.706908 374228 task_exit.go:204] [ 1196: 1198] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.711273 374228 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.711369 374228 task_exit.go:204] [ 1196: 1197] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.711470 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.711635 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.711712 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.712175 374228 task_exit.go:204] [ 1196: 1196] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.715098 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.721371 374228 syscalls.go:262] [ 1201: 1201] Allocating stack with size of 8388608 bytes D0713 08:48:08.722216 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.722638 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:08.722826 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.724709 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.724853 374228 usertrap_amd64.go:106] [ 1201: 1201] Map a usertrap vma at 60000 D0713 08:48:08.725246 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 1 D0713 08:48:08.725371 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b70f trap addr 60050 ([184 204 0 0 0 15 5] -> [255 36 37 80 0 6 0]) D0713 08:48:08.726429 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.726515 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 2 D0713 08:48:08.726624 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae93 trap addr 600a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 0 6 0]) D0713 08:48:08.728172 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.728257 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 3 D0713 08:48:08.728340 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b41d trap addr 600f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 0 6 0]) D0713 08:48:08.737996 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.738089 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 4 D0713 08:48:08.738152 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b1d3 trap addr 60140 ([184 14 0 0 0 15 5] -> [255 36 37 64 1 6 0]) D0713 08:48:08.739659 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.739710 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 5 D0713 08:48:08.739782 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46afa0 trap addr 60190 ([184 186 0 0 0 15 5] -> [255 36 37 144 1 6 0]) D0713 08:48:08.739946 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.739972 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 6 D0713 08:48:08.740011 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b214 trap addr 601e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 1 6 0]) D0713 08:48:08.743349 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.743427 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 7 D0713 08:48:08.743472 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b5eb trap addr 60230 ([184 56 0 0 0 15 5] -> [255 36 37 48 2 6 0]) D0713 08:48:08.744213 374228 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.744294 374228 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0023be180 8 D0713 08:48:08.744390 374228 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b60c trap addr 60280 ([184 186 0 0 0 15 5] -> [255 36 37 128 2 6 0]) D0713 08:48:08.745294 374228 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.745384 374228 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0023be180 9 D0713 08:48:08.745500 374228 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46af76 trap addr 602d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 2 6 0]) D0713 08:48:08.745893 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.745955 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 10 D0713 08:48:08.746018 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46b57c trap addr 60320 ([184 202 0 0 0 15 5] -> [255 36 37 32 3 6 0]) D0713 08:48:08.758057 374228 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.758168 374228 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0023be180 11 D0713 08:48:08.758237 374228 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b020 trap addr 60370 ([184 39 0 0 0 15 5] -> [255 36 37 112 3 6 0]) D0713 08:48:08.758455 374228 usertrap_amd64.go:212] [ 1201: 1202] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.758511 374228 usertrap_amd64.go:122] [ 1201: 1202] Allocate a new trap: 0xc0023be180 12 D0713 08:48:08.758601 374228 usertrap_amd64.go:225] [ 1201: 1202] Apply the binary patch addr 46b04f trap addr 603c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 3 6 0]) D0713 08:48:08.758843 374228 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 08:48:08.759007 374228 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 08:48:08.761857 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.761936 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 13 D0713 08:48:08.762032 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46af29 trap addr 60410 ([184 37 1 0 0 15 5] -> [255 36 37 16 4 6 0]) D0713 08:48:08.769666 374228 task_signals.go:470] [ 1201: 1201] Notified of signal 23 D0713 08:48:08.772667 374228 task_signals.go:220] [ 1201: 1201] Signal 23: delivering to handler D0713 08:48:08.778913 374228 usertrap_amd64.go:212] [ 1201: 1201] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.779004 374228 usertrap_amd64.go:122] [ 1201: 1201] Allocate a new trap: 0xc0023be180 14 D0713 08:48:08.779086 374228 usertrap_amd64.go:225] [ 1201: 1201] Apply the binary patch addr 46ae44 trap addr 60460 ([184 231 0 0 0 15 5] -> [255 36 37 96 4 6 0]) D0713 08:48:08.779381 374228 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.779567 374228 task_signals.go:204] [ 1201: 1206] Signal 1201, PID: 1206, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.779699 374228 task_signals.go:204] [ 1201: 1204] Signal 1201, PID: 1204, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.779722 374228 task_signals.go:204] [ 1201: 1202] Signal 1201, PID: 1202, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.779744 374228 task_signals.go:204] [ 1201: 1205] Signal 1201, PID: 1205, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.779767 374228 task_signals.go:204] [ 1201: 1203] Signal 1201, PID: 1203, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.779875 374228 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.780081 374228 task_exit.go:204] [ 1201: 1206] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.780275 374228 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.780404 374228 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.780555 374228 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.780818 374228 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.780892 374228 task_exit.go:204] [ 1201: 1205] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.781102 374228 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.781187 374228 task_exit.go:204] [ 1201: 1204] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.781258 374228 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.781430 374228 task_exit.go:204] [ 1201: 1206] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.781471 374228 task_exit.go:204] [ 1201: 1206] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.781643 374228 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.781746 374228 task_exit.go:204] [ 1201: 1202] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.786889 374228 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.787002 374228 task_exit.go:204] [ 1201: 1203] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.787096 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.787232 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.787300 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.787336 374228 task_exit.go:204] [ 1201: 1201] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.789866 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.793872 374228 syscalls.go:262] [ 1207: 1207] Allocating stack with size of 8388608 bytes D0713 08:48:08.794572 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.796343 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.796445 374228 usertrap_amd64.go:106] [ 1207: 1207] Map a usertrap vma at 68000 D0713 08:48:08.796630 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 1 D0713 08:48:08.796716 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b70f trap addr 68050 ([184 204 0 0 0 15 5] -> [255 36 37 80 128 6 0]) D0713 08:48:08.797545 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.797616 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 2 D0713 08:48:08.797688 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46ae93 trap addr 680a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 128 6 0]) D0713 08:48:08.799658 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.799711 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 3 D0713 08:48:08.799760 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b41d trap addr 680f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 128 6 0]) D0713 08:48:08.809901 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.809959 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 4 D0713 08:48:08.810037 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b1d3 trap addr 68140 ([184 14 0 0 0 15 5] -> [255 36 37 64 129 6 0]) D0713 08:48:08.811705 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.811756 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 5 D0713 08:48:08.811805 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46afa0 trap addr 68190 ([184 186 0 0 0 15 5] -> [255 36 37 144 129 6 0]) D0713 08:48:08.811947 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.811986 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 6 D0713 08:48:08.812046 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b214 trap addr 681e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 129 6 0]) D0713 08:48:08.815806 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.815867 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 7 D0713 08:48:08.815925 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b5eb trap addr 68230 ([184 56 0 0 0 15 5] -> [255 36 37 48 130 6 0]) D0713 08:48:08.816496 374228 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.816572 374228 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc001989890 8 D0713 08:48:08.816643 374228 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46b60c trap addr 68280 ([184 186 0 0 0 15 5] -> [255 36 37 128 130 6 0]) D0713 08:48:08.817609 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.817678 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 9 D0713 08:48:08.817757 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46b57c trap addr 682d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 130 6 0]) D0713 08:48:08.818054 374228 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.818097 374228 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc001989890 10 D0713 08:48:08.818149 374228 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46af76 trap addr 68320 ([184 35 0 0 0 15 5] -> [255 36 37 32 131 6 0]) D0713 08:48:08.829347 374228 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.829457 374228 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc001989890 11 D0713 08:48:08.829529 374228 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46b020 trap addr 68370 ([184 39 0 0 0 15 5] -> [255 36 37 112 131 6 0]) D0713 08:48:08.829642 374228 usertrap_amd64.go:212] [ 1207: 1208] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.829745 374228 usertrap_amd64.go:122] [ 1207: 1208] Allocate a new trap: 0xc001989890 12 D0713 08:48:08.829826 374228 usertrap_amd64.go:225] [ 1207: 1208] Apply the binary patch addr 46b04f trap addr 683c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 131 6 0]) D0713 08:48:08.830160 374228 task_signals.go:470] [ 1207: 1207] Notified of signal 23 D0713 08:48:08.830348 374228 task_signals.go:220] [ 1207: 1207] Signal 23: delivering to handler D0713 08:48:08.833192 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.833266 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 13 D0713 08:48:08.833348 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46af29 trap addr 68410 ([184 37 1 0 0 15 5] -> [255 36 37 16 132 6 0]) D0713 08:48:08.841934 374228 task_signals.go:470] [ 1207: 1207] Notified of signal 23 D0713 08:48:08.843856 374228 task_signals.go:220] [ 1207: 1207] Signal 23: delivering to handler D0713 08:48:08.849644 374228 usertrap_amd64.go:212] [ 1207: 1207] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.849738 374228 usertrap_amd64.go:122] [ 1207: 1207] Allocate a new trap: 0xc001989890 14 D0713 08:48:08.849813 374228 usertrap_amd64.go:225] [ 1207: 1207] Apply the binary patch addr 46ae44 trap addr 68460 ([184 231 0 0 0 15 5] -> [255 36 37 96 132 6 0]) D0713 08:48:08.849997 374228 task_exit.go:204] [ 1207: 1207] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.850149 374228 task_signals.go:204] [ 1207: 1209] Signal 1207, PID: 1209, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.850140 374228 task_signals.go:204] [ 1207: 1208] Signal 1207, PID: 1208, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.850235 374228 task_signals.go:204] [ 1207: 1210] Signal 1207, PID: 1210, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.850272 374228 task_signals.go:204] [ 1207: 1212] Signal 1207, PID: 1212, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.850313 374228 task_exit.go:204] [ 1207: 1208] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.850410 374228 task_signals.go:204] [ 1207: 1211] Signal 1207, PID: 1211, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.850464 374228 task_exit.go:204] [ 1207: 1211] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.850659 374228 task_exit.go:204] [ 1207: 1211] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.850772 374228 task_exit.go:204] [ 1207: 1211] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.850931 374228 task_exit.go:204] [ 1207: 1209] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.851049 374228 task_exit.go:204] [ 1207: 1210] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.851158 374228 task_exit.go:204] [ 1207: 1207] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.851345 374228 task_exit.go:204] [ 1207: 1209] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.851402 374228 task_exit.go:204] [ 1207: 1209] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.851539 374228 task_exit.go:204] [ 1207: 1212] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.851809 374228 task_exit.go:204] [ 1207: 1208] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.851871 374228 task_exit.go:204] [ 1207: 1208] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.851998 374228 task_exit.go:204] [ 1207: 1210] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.852041 374228 task_exit.go:204] [ 1207: 1210] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.858142 374228 task_exit.go:204] [ 1207: 1212] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.858243 374228 task_exit.go:204] [ 1207: 1212] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.858338 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.858604 374228 task_signals.go:179] [ 7: 7] Restarting syscall 202: interrupted by signal 17 D0713 08:48:08.858729 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.858616 374228 task_exit.go:204] [ 1207: 1207] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.861737 374228 task_stop.go:118] [ 7: 14] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.867243 374228 syscalls.go:262] [ 1213: 1213] Allocating stack with size of 8388608 bytes D0713 08:48:08.867939 374228 task_stop.go:138] [ 7: 14] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.869870 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.869974 374228 task_signals.go:470] [ 7: 14] Notified of signal 23 D0713 08:48:08.870202 374228 task_signals.go:179] [ 7: 14] Restarting syscall 202: interrupted by signal 23 D0713 08:48:08.870213 374228 usertrap_amd64.go:106] [ 1213: 1213] Map a usertrap vma at 61000 D0713 08:48:08.870268 374228 task_signals.go:220] [ 7: 14] Signal 23: delivering to handler D0713 08:48:08.870603 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 1 D0713 08:48:08.870800 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:08.873127 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.873190 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 2 D0713 08:48:08.873279 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:08.875428 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.875508 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 3 D0713 08:48:08.875574 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:08.885396 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.885493 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 4 D0713 08:48:08.885590 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:08.887304 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.887382 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 5 D0713 08:48:08.887466 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:08.887689 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.887753 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 6 D0713 08:48:08.887848 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:08.892486 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.892566 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 7 D0713 08:48:08.892667 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:08.893787 374228 usertrap_amd64.go:212] [ 1213: 1214] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.893870 374228 usertrap_amd64.go:122] [ 1213: 1214] Allocate a new trap: 0xc001989a70 8 D0713 08:48:08.893939 374228 usertrap_amd64.go:225] [ 1213: 1214] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:08.894852 374228 usertrap_amd64.go:212] [ 1213: 1214] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.894963 374228 usertrap_amd64.go:122] [ 1213: 1214] Allocate a new trap: 0xc001989a70 9 D0713 08:48:08.895037 374228 usertrap_amd64.go:225] [ 1213: 1214] Apply the binary patch addr 46af76 trap addr 612d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:08.895502 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.895563 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 10 D0713 08:48:08.895655 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46b57c trap addr 61320 ([184 202 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:08.907514 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.907594 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 11 D0713 08:48:08.907652 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46af29 trap addr 61370 ([184 37 1 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:08.907785 374228 usertrap_amd64.go:212] [ 1213: 1214] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.907871 374228 usertrap_amd64.go:122] [ 1213: 1214] Allocate a new trap: 0xc001989a70 12 D0713 08:48:08.907964 374228 usertrap_amd64.go:225] [ 1213: 1214] Apply the binary patch addr 46b020 trap addr 613c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:08.908140 374228 usertrap_amd64.go:212] [ 1213: 1214] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.908193 374228 usertrap_amd64.go:122] [ 1213: 1214] Allocate a new trap: 0xc001989a70 13 D0713 08:48:08.908272 374228 usertrap_amd64.go:225] [ 1213: 1214] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:08.908483 374228 task_signals.go:470] [ 1213: 1213] Notified of signal 23 D0713 08:48:08.908744 374228 task_signals.go:220] [ 1213: 1213] Signal 23: delivering to handler D0713 08:48:08.921383 374228 task_signals.go:470] [ 1213: 1213] Notified of signal 23 D0713 08:48:08.923297 374228 task_signals.go:220] [ 1213: 1213] Signal 23: delivering to handler D0713 08:48:08.924280 374228 usertrap_amd64.go:212] [ 1213: 1213] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.924344 374228 usertrap_amd64.go:122] [ 1213: 1213] Allocate a new trap: 0xc001989a70 14 D0713 08:48:08.924432 374228 usertrap_amd64.go:225] [ 1213: 1213] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:08.924611 374228 task_exit.go:204] [ 1213: 1213] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.924853 374228 task_signals.go:204] [ 1213: 1214] Signal 1213, PID: 1214, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.924862 374228 task_signals.go:204] [ 1213: 1217] Signal 1213, PID: 1217, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.925004 374228 task_signals.go:204] [ 1213: 1216] Signal 1213, PID: 1216, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.924926 374228 task_signals.go:204] [ 1213: 1215] Signal 1213, PID: 1215, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.925134 374228 task_exit.go:204] [ 1213: 1213] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.925249 374228 task_exit.go:204] [ 1213: 1214] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.925419 374228 task_exit.go:204] [ 1213: 1217] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.925581 374228 task_exit.go:204] [ 1213: 1216] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.925778 374228 task_exit.go:204] [ 1213: 1216] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.925827 374228 task_exit.go:204] [ 1213: 1216] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.925980 374228 task_exit.go:204] [ 1213: 1215] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.926151 374228 task_exit.go:204] [ 1213: 1214] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.926215 374228 task_exit.go:204] [ 1213: 1214] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.926371 374228 task_exit.go:204] [ 1213: 1217] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.926444 374228 task_exit.go:204] [ 1213: 1217] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.932017 374228 task_exit.go:204] [ 1213: 1215] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.932111 374228 task_exit.go:204] [ 1213: 1215] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.932204 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:08.932334 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:08.932401 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:08.932921 374228 task_exit.go:204] [ 1213: 1213] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.936734 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.942104 374228 syscalls.go:262] [ 1218: 1218] Allocating stack with size of 8388608 bytes D0713 08:48:08.942763 374228 task_signals.go:481] [ 7: 7] No task notified of signal 23 D0713 08:48:08.942879 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:08.943258 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:08.945361 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:08.945462 374228 usertrap_amd64.go:106] [ 1218: 1218] Map a usertrap vma at 6a000 D0713 08:48:08.945713 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 1 D0713 08:48:08.945801 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46b70f trap addr 6a050 ([184 204 0 0 0 15 5] -> [255 36 37 80 160 6 0]) D0713 08:48:08.946552 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:08.946601 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 2 D0713 08:48:08.946666 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46ae93 trap addr 6a0a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 160 6 0]) D0713 08:48:08.948759 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:08.948816 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 3 D0713 08:48:08.948905 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46b41d trap addr 6a0f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 160 6 0]) D0713 08:48:08.959635 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:08.959731 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 4 D0713 08:48:08.959783 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46b1d3 trap addr 6a140 ([184 14 0 0 0 15 5] -> [255 36 37 64 161 6 0]) D0713 08:48:08.961448 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:08.961505 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 5 D0713 08:48:08.961558 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46afa0 trap addr 6a190 ([184 186 0 0 0 15 5] -> [255 36 37 144 161 6 0]) D0713 08:48:08.961728 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46b214:sysno 13 D0713 08:48:08.961795 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 6 D0713 08:48:08.961873 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46b214 trap addr 6a1e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 161 6 0]) D0713 08:48:08.965899 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:08.965955 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 7 D0713 08:48:08.966002 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46b5eb trap addr 6a230 ([184 56 0 0 0 15 5] -> [255 36 37 48 162 6 0]) D0713 08:48:08.966722 374228 usertrap_amd64.go:212] [ 1218: 1219] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:08.966788 374228 usertrap_amd64.go:122] [ 1218: 1219] Allocate a new trap: 0xc000a45560 8 D0713 08:48:08.966859 374228 usertrap_amd64.go:225] [ 1218: 1219] Apply the binary patch addr 46b60c trap addr 6a280 ([184 186 0 0 0 15 5] -> [255 36 37 128 162 6 0]) D0713 08:48:08.967610 374228 usertrap_amd64.go:212] [ 1218: 1219] Found the pattern at ip 46af76:sysno 35 D0713 08:48:08.967741 374228 usertrap_amd64.go:122] [ 1218: 1219] Allocate a new trap: 0xc000a45560 9 D0713 08:48:08.968075 374228 usertrap_amd64.go:225] [ 1218: 1219] Apply the binary patch addr 46af76 trap addr 6a2d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 162 6 0]) D0713 08:48:08.968298 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:08.968399 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 10 D0713 08:48:08.968511 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46b57c trap addr 6a320 ([184 202 0 0 0 15 5] -> [255 36 37 32 163 6 0]) D0713 08:48:08.979570 374228 usertrap_amd64.go:212] [ 1218: 1219] Found the pattern at ip 46b020:sysno 39 D0713 08:48:08.979661 374228 usertrap_amd64.go:122] [ 1218: 1219] Allocate a new trap: 0xc000a45560 11 D0713 08:48:08.979795 374228 usertrap_amd64.go:225] [ 1218: 1219] Apply the binary patch addr 46b020 trap addr 6a370 ([184 39 0 0 0 15 5] -> [255 36 37 112 163 6 0]) D0713 08:48:08.979968 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46af29:sysno 293 D0713 08:48:08.980039 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 12 D0713 08:48:08.980100 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46af29 trap addr 6a3c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 163 6 0]) D0713 08:48:08.980472 374228 usertrap_amd64.go:212] [ 1218: 1219] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:08.980581 374228 usertrap_amd64.go:122] [ 1218: 1219] Allocate a new trap: 0xc000a45560 13 D0713 08:48:08.980701 374228 usertrap_amd64.go:225] [ 1218: 1219] Apply the binary patch addr 46b04f trap addr 6a410 ([184 234 0 0 0 15 5] -> [255 36 37 16 164 6 0]) D0713 08:48:08.981019 374228 task_signals.go:470] [ 1218: 1218] Notified of signal 23 D0713 08:48:08.981220 374228 task_signals.go:220] [ 1218: 1218] Signal 23: delivering to handler D0713 08:48:08.995298 374228 task_signals.go:470] [ 1218: 1218] Notified of signal 23 D0713 08:48:08.996746 374228 task_signals.go:220] [ 1218: 1218] Signal 23: delivering to handler D0713 08:48:08.997944 374228 usertrap_amd64.go:212] [ 1218: 1218] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:08.998020 374228 usertrap_amd64.go:122] [ 1218: 1218] Allocate a new trap: 0xc000a45560 14 D0713 08:48:08.998152 374228 usertrap_amd64.go:225] [ 1218: 1218] Apply the binary patch addr 46ae44 trap addr 6a460 ([184 231 0 0 0 15 5] -> [255 36 37 96 164 6 0]) D0713 08:48:08.998385 374228 task_exit.go:204] [ 1218: 1218] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.998547 374228 task_signals.go:204] [ 1218: 1221] Signal 1218, PID: 1221, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.998618 374228 task_exit.go:204] [ 1218: 1218] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.998707 374228 task_signals.go:204] [ 1218: 1219] Signal 1218, PID: 1219, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.998747 374228 task_signals.go:204] [ 1218: 1222] Signal 1218, PID: 1222, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.998833 374228 task_signals.go:204] [ 1218: 1220] Signal 1218, PID: 1220, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:08.998853 374228 task_exit.go:204] [ 1218: 1221] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.998991 374228 task_exit.go:204] [ 1218: 1220] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.999207 374228 task_exit.go:204] [ 1218: 1219] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.999329 374228 task_exit.go:204] [ 1218: 1222] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:08.999591 374228 task_exit.go:204] [ 1218: 1221] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.999632 374228 task_exit.go:204] [ 1218: 1221] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.999749 374228 task_exit.go:204] [ 1218: 1220] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:08.999798 374228 task_exit.go:204] [ 1218: 1220] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:08.999950 374228 task_exit.go:204] [ 1218: 1219] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.000009 374228 task_exit.go:204] [ 1218: 1219] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.005021 374228 task_exit.go:204] [ 1218: 1222] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.005176 374228 task_exit.go:204] [ 1218: 1222] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.005287 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:09.005448 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:09.005521 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:09.006182 374228 task_exit.go:204] [ 1218: 1218] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.008743 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:09.015331 374228 syscalls.go:262] [ 1223: 1223] Allocating stack with size of 8388608 bytes D0713 08:48:09.015469 374228 task_signals.go:481] [ 7: 7] No task notified of signal 23 D0713 08:48:09.016275 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:09.016638 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:09.018567 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:09.018694 374228 usertrap_amd64.go:106] [ 1223: 1223] Map a usertrap vma at 62000 D0713 08:48:09.019020 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 1 D0713 08:48:09.019155 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46b70f trap addr 62050 ([184 204 0 0 0 15 5] -> [255 36 37 80 32 6 0]) D0713 08:48:09.020279 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:09.020329 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 2 D0713 08:48:09.020415 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46ae93 trap addr 620a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 32 6 0]) D0713 08:48:09.021693 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:09.021773 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 3 D0713 08:48:09.021843 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46b41d trap addr 620f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 32 6 0]) D0713 08:48:09.031708 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:09.031793 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 4 D0713 08:48:09.031882 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46b1d3 trap addr 62140 ([184 14 0 0 0 15 5] -> [255 36 37 64 33 6 0]) D0713 08:48:09.033767 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:09.033818 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 5 D0713 08:48:09.033862 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46afa0 trap addr 62190 ([184 186 0 0 0 15 5] -> [255 36 37 144 33 6 0]) D0713 08:48:09.034003 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46b214:sysno 13 D0713 08:48:09.034068 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 6 D0713 08:48:09.034117 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46b214 trap addr 621e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 33 6 0]) D0713 08:48:09.038087 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:09.038150 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 7 D0713 08:48:09.038203 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46b5eb trap addr 62230 ([184 56 0 0 0 15 5] -> [255 36 37 48 34 6 0]) D0713 08:48:09.038927 374228 usertrap_amd64.go:212] [ 1223: 1224] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:09.038990 374228 usertrap_amd64.go:122] [ 1223: 1224] Allocate a new trap: 0xc000b614a0 8 D0713 08:48:09.039098 374228 usertrap_amd64.go:225] [ 1223: 1224] Apply the binary patch addr 46b60c trap addr 62280 ([184 186 0 0 0 15 5] -> [255 36 37 128 34 6 0]) D0713 08:48:09.039611 374228 usertrap_amd64.go:212] [ 1223: 1224] Found the pattern at ip 46af76:sysno 35 D0713 08:48:09.039723 374228 usertrap_amd64.go:122] [ 1223: 1224] Allocate a new trap: 0xc000b614a0 9 D0713 08:48:09.039843 374228 usertrap_amd64.go:225] [ 1223: 1224] Apply the binary patch addr 46af76 trap addr 622d0 ([184 35 0 0 0 15 5] -> [255 36 37 208 34 6 0]) D0713 08:48:09.040719 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:09.040801 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 10 D0713 08:48:09.040878 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46b57c trap addr 62320 ([184 202 0 0 0 15 5] -> [255 36 37 32 35 6 0]) D0713 08:48:09.053066 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46af29:sysno 293 D0713 08:48:09.053159 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 11 D0713 08:48:09.053212 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46af29 trap addr 62370 ([184 37 1 0 0 15 5] -> [255 36 37 112 35 6 0]) D0713 08:48:09.053352 374228 usertrap_amd64.go:212] [ 1223: 1224] Found the pattern at ip 46b020:sysno 39 D0713 08:48:09.053442 374228 usertrap_amd64.go:122] [ 1223: 1224] Allocate a new trap: 0xc000b614a0 12 D0713 08:48:09.053496 374228 usertrap_amd64.go:225] [ 1223: 1224] Apply the binary patch addr 46b020 trap addr 623c0 ([184 39 0 0 0 15 5] -> [255 36 37 192 35 6 0]) D0713 08:48:09.053656 374228 usertrap_amd64.go:212] [ 1223: 1224] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:09.053721 374228 usertrap_amd64.go:122] [ 1223: 1224] Allocate a new trap: 0xc000b614a0 13 D0713 08:48:09.053764 374228 usertrap_amd64.go:225] [ 1223: 1224] Apply the binary patch addr 46b04f trap addr 62410 ([184 234 0 0 0 15 5] -> [255 36 37 16 36 6 0]) D0713 08:48:09.053902 374228 task_signals.go:470] [ 1223: 1223] Notified of signal 23 D0713 08:48:09.054009 374228 task_signals.go:220] [ 1223: 1223] Signal 23: delivering to handler D0713 08:48:09.066593 374228 task_signals.go:470] [ 1223: 1223] Notified of signal 23 D0713 08:48:09.067655 374228 task_signals.go:220] [ 1223: 1223] Signal 23: delivering to handler D0713 08:48:09.068648 374228 usertrap_amd64.go:212] [ 1223: 1223] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:09.068711 374228 usertrap_amd64.go:122] [ 1223: 1223] Allocate a new trap: 0xc000b614a0 14 D0713 08:48:09.068775 374228 usertrap_amd64.go:225] [ 1223: 1223] Apply the binary patch addr 46ae44 trap addr 62460 ([184 231 0 0 0 15 5] -> [255 36 37 96 36 6 0]) D0713 08:48:09.069009 374228 task_exit.go:204] [ 1223: 1223] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.069153 374228 task_signals.go:204] [ 1223: 1227] Signal 1223, PID: 1227, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:09.069179 374228 task_exit.go:204] [ 1223: 1223] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.069188 374228 task_signals.go:204] [ 1223: 1225] Signal 1223, PID: 1225, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:09.069338 374228 task_exit.go:204] [ 1223: 1227] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.069466 374228 task_signals.go:204] [ 1223: 1224] Signal 1223, PID: 1224, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:09.069474 374228 task_signals.go:204] [ 1223: 1226] Signal 1223, PID: 1226, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:09.069640 374228 task_exit.go:204] [ 1223: 1225] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.069794 374228 task_exit.go:204] [ 1223: 1225] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.069846 374228 task_exit.go:204] [ 1223: 1225] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.070046 374228 task_exit.go:204] [ 1223: 1224] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.070270 374228 task_exit.go:204] [ 1223: 1224] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.070333 374228 task_exit.go:204] [ 1223: 1224] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.070456 374228 task_exit.go:204] [ 1223: 1226] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.070764 374228 task_exit.go:204] [ 1223: 1227] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.070827 374228 task_exit.go:204] [ 1223: 1227] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.076552 374228 task_exit.go:204] [ 1223: 1226] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.076799 374228 task_exit.go:204] [ 1223: 1226] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.076983 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:09.077199 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:09.077268 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:09.077964 374228 task_exit.go:204] [ 1223: 1223] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.080754 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:09.086752 374228 syscalls.go:262] [ 1228: 1228] Allocating stack with size of 8388608 bytes D0713 08:48:09.087440 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:09.087862 374228 task_signals.go:470] [ 7: 7] Notified of signal 23 D0713 08:48:09.088014 374228 task_signals.go:220] [ 7: 7] Signal 23: delivering to handler D0713 08:48:09.088924 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:09.089088 374228 usertrap_amd64.go:106] [ 1228: 1228] Map a usertrap vma at 61000 D0713 08:48:09.089341 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 1 D0713 08:48:09.089473 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46b70f trap addr 61050 ([184 204 0 0 0 15 5] -> [255 36 37 80 16 6 0]) D0713 08:48:09.090174 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:09.090217 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 2 D0713 08:48:09.090261 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46ae93 trap addr 610a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 16 6 0]) D0713 08:48:09.091354 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:09.091397 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 3 D0713 08:48:09.091449 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46b41d trap addr 610f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 16 6 0]) D0713 08:48:09.102032 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:09.102162 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 4 D0713 08:48:09.102239 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46b1d3 trap addr 61140 ([184 14 0 0 0 15 5] -> [255 36 37 64 17 6 0]) D0713 08:48:09.104046 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:09.104108 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 5 D0713 08:48:09.104162 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46afa0 trap addr 61190 ([184 186 0 0 0 15 5] -> [255 36 37 144 17 6 0]) D0713 08:48:09.104317 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46b214:sysno 13 D0713 08:48:09.104364 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 6 D0713 08:48:09.104450 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46b214 trap addr 611e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 17 6 0]) D0713 08:48:09.108561 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:09.108642 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 7 D0713 08:48:09.108703 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46b5eb trap addr 61230 ([184 56 0 0 0 15 5] -> [255 36 37 48 18 6 0]) D0713 08:48:09.109680 374228 usertrap_amd64.go:212] [ 1228: 1229] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:09.109791 374228 usertrap_amd64.go:122] [ 1228: 1229] Allocate a new trap: 0xc000a45b60 8 D0713 08:48:09.109861 374228 usertrap_amd64.go:225] [ 1228: 1229] Apply the binary patch addr 46b60c trap addr 61280 ([184 186 0 0 0 15 5] -> [255 36 37 128 18 6 0]) D0713 08:48:09.111040 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:09.111101 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 9 D0713 08:48:09.111168 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46b57c trap addr 612d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 18 6 0]) D0713 08:48:09.111683 374228 usertrap_amd64.go:212] [ 1228: 1229] Found the pattern at ip 46af76:sysno 35 D0713 08:48:09.111770 374228 usertrap_amd64.go:122] [ 1228: 1229] Allocate a new trap: 0xc000a45b60 10 D0713 08:48:09.111876 374228 usertrap_amd64.go:225] [ 1228: 1229] Apply the binary patch addr 46af76 trap addr 61320 ([184 35 0 0 0 15 5] -> [255 36 37 32 19 6 0]) D0713 08:48:09.123161 374228 usertrap_amd64.go:212] [ 1228: 1229] Found the pattern at ip 46b020:sysno 39 D0713 08:48:09.123278 374228 usertrap_amd64.go:122] [ 1228: 1229] Allocate a new trap: 0xc000a45b60 11 D0713 08:48:09.123390 374228 usertrap_amd64.go:225] [ 1228: 1229] Apply the binary patch addr 46b020 trap addr 61370 ([184 39 0 0 0 15 5] -> [255 36 37 112 19 6 0]) D0713 08:48:09.123699 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46af29:sysno 293 D0713 08:48:09.123794 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 12 D0713 08:48:09.123933 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46af29 trap addr 613c0 ([184 37 1 0 0 15 5] -> [255 36 37 192 19 6 0]) D0713 08:48:09.124131 374228 usertrap_amd64.go:212] [ 1228: 1229] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:09.124221 374228 usertrap_amd64.go:122] [ 1228: 1229] Allocate a new trap: 0xc000a45b60 13 D0713 08:48:09.124320 374228 usertrap_amd64.go:225] [ 1228: 1229] Apply the binary patch addr 46b04f trap addr 61410 ([184 234 0 0 0 15 5] -> [255 36 37 16 20 6 0]) D0713 08:48:09.124587 374228 task_signals.go:470] [ 1228: 1228] Notified of signal 23 D0713 08:48:09.124718 374228 task_signals.go:220] [ 1228: 1228] Signal 23: delivering to handler D0713 08:48:09.135655 374228 task_signals.go:470] [ 1228: 1228] Notified of signal 23 D0713 08:48:09.137034 374228 task_signals.go:220] [ 1228: 1228] Signal 23: delivering to handler D0713 08:48:09.137993 374228 usertrap_amd64.go:212] [ 1228: 1228] Found the pattern at ip 46ae44:sysno 231 D0713 08:48:09.138081 374228 usertrap_amd64.go:122] [ 1228: 1228] Allocate a new trap: 0xc000a45b60 14 D0713 08:48:09.138146 374228 usertrap_amd64.go:225] [ 1228: 1228] Apply the binary patch addr 46ae44 trap addr 61460 ([184 231 0 0 0 15 5] -> [255 36 37 96 20 6 0]) D0713 08:48:09.138332 374228 task_exit.go:204] [ 1228: 1228] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.138465 374228 task_exit.go:204] [ 1228: 1228] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.138530 374228 task_signals.go:204] [ 1228: 1229] Signal 1228, PID: 1229, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:09.138563 374228 task_signals.go:204] [ 1228: 1232] Signal 1228, PID: 1232, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:09.138557 374228 task_signals.go:204] [ 1228: 1230] Signal 1228, PID: 1230, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:09.138640 374228 task_exit.go:204] [ 1228: 1229] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.138785 374228 task_exit.go:204] [ 1228: 1230] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.138908 374228 task_signals.go:204] [ 1228: 1231] Signal 1228, PID: 1231, TID: 0, fault addr: 0x9: terminating thread group D0713 08:48:09.139021 374228 task_exit.go:204] [ 1228: 1230] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.139093 374228 task_exit.go:204] [ 1228: 1230] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.139253 374228 task_exit.go:204] [ 1228: 1229] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.139308 374228 task_exit.go:204] [ 1228: 1229] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.139413 374228 task_exit.go:204] [ 1228: 1232] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.139573 374228 task_exit.go:204] [ 1228: 1232] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.139627 374228 task_exit.go:204] [ 1228: 1232] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.139769 374228 task_exit.go:204] [ 1228: 1231] Transitioning from exit state TaskExitNone to TaskExitInitiated D0713 08:48:09.145056 374228 task_exit.go:204] [ 1228: 1231] Transitioning from exit state TaskExitInitiated to TaskExitZombie D0713 08:48:09.145175 374228 task_exit.go:204] [ 1228: 1231] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.145295 374228 task_signals.go:470] [ 7: 7] Notified of signal 17 D0713 08:48:09.145472 374228 task_signals.go:179] [ 7: 7] Restarting syscall 247: interrupted by signal 17 D0713 08:48:09.145546 374228 task_signals.go:220] [ 7: 7] Signal 17: delivering to handler D0713 08:48:09.146007 374228 task_exit.go:204] [ 1228: 1228] Transitioning from exit state TaskExitZombie to TaskExitDead D0713 08:48:09.148566 374228 task_stop.go:118] [ 7: 7] Entering internal stop (*kernel.vforkStop)(nil) D0713 08:48:09.152580 374228 syscalls.go:262] [ 1233: 1233] Allocating stack with size of 8388608 bytes D0713 08:48:09.153291 374228 task_stop.go:138] [ 7: 7] Leaving internal stop (*kernel.vforkStop)(nil) D0713 08:48:09.155119 374228 usertrap_amd64.go:212] [ 1233: 1233] Found the pattern at ip 46b70f:sysno 204 D0713 08:48:09.155228 374228 usertrap_amd64.go:106] [ 1233: 1233] Map a usertrap vma at 63000 D0713 08:48:09.155441 374228 usertrap_amd64.go:122] [ 1233: 1233] Allocate a new trap: 0xc0005cd470 1 D0713 08:48:09.155537 374228 usertrap_amd64.go:225] [ 1233: 1233] Apply the binary patch addr 46b70f trap addr 63050 ([184 204 0 0 0 15 5] -> [255 36 37 80 48 6 0]) D0713 08:48:09.156400 374228 usertrap_amd64.go:212] [ 1233: 1233] Found the pattern at ip 46ae93:sysno 257 D0713 08:48:09.156458 374228 usertrap_amd64.go:122] [ 1233: 1233] Allocate a new trap: 0xc0005cd470 2 D0713 08:48:09.156522 374228 usertrap_amd64.go:225] [ 1233: 1233] Apply the binary patch addr 46ae93 trap addr 630a0 ([184 1 1 0 0 15 5] -> [255 36 37 160 48 6 0]) D0713 08:48:09.157908 374228 usertrap_amd64.go:212] [ 1233: 1233] Found the pattern at ip 46b41d:sysno 9 D0713 08:48:09.157966 374228 usertrap_amd64.go:122] [ 1233: 1233] Allocate a new trap: 0xc0005cd470 3 D0713 08:48:09.158067 374228 usertrap_amd64.go:225] [ 1233: 1233] Apply the binary patch addr 46b41d trap addr 630f0 ([184 9 0 0 0 15 5] -> [255 36 37 240 48 6 0]) D0713 08:48:09.167618 374228 usertrap_amd64.go:212] [ 1233: 1233] Found the pattern at ip 46b1d3:sysno 14 D0713 08:48:09.167693 374228 usertrap_amd64.go:122] [ 1233: 1233] Allocate a new trap: 0xc0005cd470 4 D0713 08:48:09.167744 374228 usertrap_amd64.go:225] [ 1233: 1233] Apply the binary patch addr 46b1d3 trap addr 63140 ([184 14 0 0 0 15 5] -> [255 36 37 64 49 6 0]) D0713 08:48:09.169360 374228 usertrap_amd64.go:212] [ 1233: 1233] Found the pattern at ip 46afa0:sysno 186 D0713 08:48:09.169473 374228 usertrap_amd64.go:122] [ 1233: 1233] Allocate a new trap: 0xc0005cd470 5 D0713 08:48:09.169558 374228 usertrap_amd64.go:225] [ 1233: 1233] Apply the binary patch addr 46afa0 trap addr 63190 ([184 186 0 0 0 15 5] -> [255 36 37 144 49 6 0]) D0713 08:48:09.169707 374228 usertrap_amd64.go:212] [ 1233: 1233] Found the pattern at ip 46b214:sysno 13 D0713 08:48:09.169741 374228 usertrap_amd64.go:122] [ 1233: 1233] Allocate a new trap: 0xc0005cd470 6 D0713 08:48:09.169780 374228 usertrap_amd64.go:225] [ 1233: 1233] Apply the binary patch addr 46b214 trap addr 631e0 ([184 13 0 0 0 15 5] -> [255 36 37 224 49 6 0]) D0713 08:48:09.174097 374228 usertrap_amd64.go:212] [ 1233: 1233] Found the pattern at ip 46b5eb:sysno 56 D0713 08:48:09.174173 374228 usertrap_amd64.go:122] [ 1233: 1233] Allocate a new trap: 0xc0005cd470 7 D0713 08:48:09.174236 374228 usertrap_amd64.go:225] [ 1233: 1233] Apply the binary patch addr 46b5eb trap addr 63230 ([184 56 0 0 0 15 5] -> [255 36 37 48 50 6 0]) D0713 08:48:09.174956 374228 usertrap_amd64.go:212] [ 1233: 1234] Found the pattern at ip 46b60c:sysno 186 D0713 08:48:09.175055 374228 usertrap_amd64.go:122] [ 1233: 1234] Allocate a new trap: 0xc0005cd470 8 D0713 08:48:09.175138 374228 usertrap_amd64.go:225] [ 1233: 1234] Apply the binary patch addr 46b60c trap addr 63280 ([184 186 0 0 0 15 5] -> [255 36 37 128 50 6 0]) D0713 08:48:09.176158 374228 usertrap_amd64.go:212] [ 1233: 1233] Found the pattern at ip 46b57c:sysno 202 D0713 08:48:09.176244 374228 usertrap_amd64.go:122] [ 1233: 1233] Allocate a new trap: 0xc0005cd470 9 D0713 08:48:09.176497 374228 usertrap_amd64.go:225] [ 1233: 1233] Apply the binary patch addr 46b57c trap addr 632d0 ([184 202 0 0 0 15 5] -> [255 36 37 208 50 6 0]) D0713 08:48:09.176770 374228 usertrap_amd64.go:212] [ 1233: 1234] Found the pattern at ip 46af76:sysno 35 D0713 08:48:09.176823 374228 usertrap_amd64.go:122] [ 1233: 1234] Allocate a new trap: 0xc0005cd470 10 D0713 08:48:09.176891 374228 usertrap_amd64.go:225] [ 1233: 1234] Apply the binary patch addr 46af76 trap addr 63320 ([184 35 0 0 0 15 5] -> [255 36 37 32 51 6 0]) D0713 08:48:09.178340 374228 usertrap_amd64.go:212] [ 1233: 1234] Found the pattern at ip 46b020:sysno 39 D0713 08:48:09.178431 374228 usertrap_amd64.go:122] [ 1233: 1234] Allocate a new trap: 0xc0005cd470 11 D0713 08:48:09.178504 374228 usertrap_amd64.go:225] [ 1233: 1234] Apply the binary patch addr 46b020 trap addr 63370 ([184 39 0 0 0 15 5] -> [255 36 37 112 51 6 0]) D0713 08:48:09.178824 374228 usertrap_amd64.go:212] [ 1233: 1234] Found the pattern at ip 46b04f:sysno 234 D0713 08:48:09.178932 374228 usertrap_amd64.go:122] [ 1233: 1234] Allocate a new trap: 0xc0005cd470 12 D0713 08:48:09.179027 374228 usertrap_amd64.go:225] [ 1233: 1234] Apply the binary patch addr 46b04f trap addr 633c0 ([184 234 0 0 0 15 5] -> [255 36 37 192 51 6 0]) D0713 08:48:09.179230 374228 task_signals.go:470] [ 1233: 1233] Notified of signal 23 D0713 08:48:09.179335 374228 task_signals.go:220] [ 1233: 1233] Signal 23: delivering to handler D0713 08:48:09.189742 374228 usertrap_amd64.go:212] [ 1233: 1233] Found the pattern at ip 46af29:sysno 293 D0713 08:48:09.189810 374228 usertrap_amd64.go:122] [ 1233: 1233] Allocate a new trap: 0xc0005cd470 13 D0713 08:48:09.189888 374228 usertrap_amd64.go:225] [ 1233: 1233] Apply the binary patch addr 46af29 trap addr 63410 ([184 37 1 0 0 15 5] -> [255 36 37 16 52 6 0]) D0713 08:48:09.189914 374228 task_signals.go:470] [ 1233: 1233] Notified of signal 23 D0713 08:48:09.190134 374228 task_signals.go:220] [ 1233: 1233] Signal 23: delivering to handler D0713 08:48:09.190607 374228 task_signals.go:470] [ 1233: 1233] Notified of signal 23 D0713 08:48:09.190760 374228 task_signals.go:220] [ 1233: 1233] Signal 23: delivering to handler D0713 08:48:09.204167 374228 task_signals.go:470] [ 1233: 1233] Notified of signal 23 D0713 08:48:09.205199 374228 task_signals.go:220] [ 1233: 1233] Signal 23: delivering to handler D0713 08:48:09.206215 374228 task_signals.go:309] [ 1233: 1233] failed to restore from a signal frame: bad address D0713 08:48:09.206314 374228 task_signals.go:470] [ 1233: 1233] Notified of signal 11 D0713 08:48:09.206413 374228 task_signals.go:220] [ 1233: 1233] Signal 11: delivering to handler W0713 08:48:09.307808 374402 util.go:64] FATAL ERROR: waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-race-test-0": urpc method "containerManager.WaitPID" failed: EOF waiting on pid 7: waiting on PID 7 in sandbox "ci-gvisor-systrap-1-race-test-0": urpc method "containerManager.WaitPID" failed: EOF W0713 08:48:09.308152 374402 main.go:274] Failure to execute command, err: 1 D0713 08:48:09.323978 1 connection.go:127] sock read failed, closing connection: EOF I0713 08:48:09.324159 1 gofer.go:319] All lisafs servers exited. I0713 08:48:09.324234 1 main.go:265] Exiting with status: 0 W0713 08:48:09.324264 374130 sandbox.go:1111] Wait RPC to container "ci-gvisor-systrap-1-race-test-0" failed: urpc method "containerManager.Wait" failed: EOF. Will try waiting on the sandbox process instead. D0713 08:48:09.325861 374130 container.go:771] Destroy container, cid: ci-gvisor-systrap-1-race-test-0 D0713 08:48:09.326049 374130 container.go:1007] Destroying container, cid: ci-gvisor-systrap-1-race-test-0 D0713 08:48:09.326122 374130 sandbox.go:1403] Destroying root container by destroying sandbox, cid: ci-gvisor-systrap-1-race-test-0 D0713 08:48:09.326155 374130 sandbox.go:1153] Destroying sandbox "ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.326303 374130 container.go:1021] Killing gofer for container, cid: ci-gvisor-systrap-1-race-test-0, PID: 374214 D0713 08:48:09.332334 374130 cgroup.go:549] Deleting cgroup "ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.332528 374130 cgroup.go:557] Removing cgroup controller for key="pids" path="/sys/fs/cgroup/pids/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.332724 374130 cgroup.go:557] Removing cgroup controller for key="systemd" path="/sys/fs/cgroup/systemd/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.332830 374130 cgroup.go:557] Removing cgroup controller for key="cpu" path="/sys/fs/cgroup/cpu/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.332975 374130 cgroup.go:557] Removing cgroup controller for key="net_prio" path="/sys/fs/cgroup/net_prio/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.333078 374130 cgroup.go:557] Removing cgroup controller for key="devices" path="/sys/fs/cgroup/devices/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.333218 374130 cgroup.go:557] Removing cgroup controller for key="freezer" path="/sys/fs/cgroup/freezer/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.333344 374130 cgroup.go:557] Removing cgroup controller for key="cpuacct" path="/sys/fs/cgroup/cpuacct/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.333426 374130 cgroup.go:557] Removing cgroup controller for key="blkio" path="/sys/fs/cgroup/blkio/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.333509 374130 cgroup.go:557] Removing cgroup controller for key="cpuset" path="/sys/fs/cgroup/cpuset/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.333633 374130 cgroup.go:557] Removing cgroup controller for key="perf_event" path="/sys/fs/cgroup/perf_event/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.333797 374130 cgroup.go:557] Removing cgroup controller for key="rdma" path="/sys/fs/cgroup/rdma/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.333908 374130 cgroup.go:557] Removing cgroup controller for key="memory" path="/sys/fs/cgroup/memory/ci-gvisor-systrap-1-race-test-0" D0713 08:48:09.333992 374130 cgroup.go:557] Removing cgroup controller for key="net_cls" path="/sys/fs/cgroup/net_cls/ci-gvisor-systrap-1-race-test-0" I0713 08:48:09.334489 374130 main.go:265] Exiting with status: 9 VM DIAGNOSIS: I0713 08:48:09.578469 376216 main.go:230] *************************** I0713 08:48:09.578584 376216 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-test-0] I0713 08:48:09.578694 376216 main.go:232] Version 0.0.0 I0713 08:48:09.578750 376216 main.go:233] GOOS: linux I0713 08:48:09.578791 376216 main.go:234] GOARCH: amd64 I0713 08:48:09.578848 376216 main.go:235] PID: 376216 I0713 08:48:09.578901 376216 main.go:236] UID: 0, GID: 0 I0713 08:48:09.578960 376216 main.go:237] Configuration: I0713 08:48:09.579007 376216 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/workdir/gvisor_root I0713 08:48:09.579044 376216 main.go:239] Platform: systrap I0713 08:48:09.579089 376216 main.go:240] FileAccess: shared I0713 08:48:09.579121 376216 main.go:241] Directfs: true I0713 08:48:09.579162 376216 main.go:242] Overlay: none I0713 08:48:09.579209 376216 main.go:243] Network: sandbox, logging: false I0713 08:48:09.579294 376216 main.go:244] Strace: false, max size: 1024, syscalls: I0713 08:48:09.579351 376216 main.go:245] IOURING: false I0713 08:48:09.579401 376216 main.go:246] Debug: true I0713 08:48:09.579436 376216 main.go:247] Systemd: false I0713 08:48:09.579473 376216 main.go:248] *************************** W0713 08:48:09.579511 376216 main.go:253] Block the TERM signal. This is only safe in tests! D0713 08:48:09.579643 376216 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 08:48:09.579984 376216 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-test-0": file does not exist loading container "ci-gvisor-systrap-1-race-test-0": file does not exist W0713 08:48:09.580308 376216 main.go:274] Failure to execute command, err: 1 Error collecting stacks: failed to run ["/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" "-root" "/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/workdir/gvisor_root" "-watchdog-action=panic" "-network=none" "-debug" "-debug-log=/dev/stderr" "-platform=systrap" "-file-access=shared" "-overlay2=none" "-network=sandbox" "-num-network-channels=3" "-gso=false" "-net-raw" "-watchdog-action=panic" "-TESTONLY-unsafe-nonroot" "debug" "-stacks" "--ps" "ci-gvisor-systrap-1-race-test-0"]: exit status 128 I0713 08:48:09.578469 376216 main.go:230] *************************** I0713 08:48:09.578584 376216 main.go:231] Args: [/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image -root /syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/workdir/gvisor_root -watchdog-action=panic -network=none -debug -debug-log=/dev/stderr -platform=systrap -file-access=shared -overlay2=none -network=sandbox -num-network-channels=3 -gso=false -net-raw -watchdog-action=panic -TESTONLY-unsafe-nonroot debug -stacks --ps ci-gvisor-systrap-1-race-test-0] I0713 08:48:09.578694 376216 main.go:232] Version 0.0.0 I0713 08:48:09.578750 376216 main.go:233] GOOS: linux I0713 08:48:09.578791 376216 main.go:234] GOARCH: amd64 I0713 08:48:09.578848 376216 main.go:235] PID: 376216 I0713 08:48:09.578901 376216 main.go:236] UID: 0, GID: 0 I0713 08:48:09.578960 376216 main.go:237] Configuration: I0713 08:48:09.579007 376216 main.go:238] RootDir: /syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/workdir/gvisor_root I0713 08:48:09.579044 376216 main.go:239] Platform: systrap I0713 08:48:09.579089 376216 main.go:240] FileAccess: shared I0713 08:48:09.579121 376216 main.go:241] Directfs: true I0713 08:48:09.579162 376216 main.go:242] Overlay: none I0713 08:48:09.579209 376216 main.go:243] Network: sandbox, logging: false I0713 08:48:09.579294 376216 main.go:244] Strace: false, max size: 1024, syscalls: I0713 08:48:09.579351 376216 main.go:245] IOURING: false I0713 08:48:09.579401 376216 main.go:246] Debug: true I0713 08:48:09.579436 376216 main.go:247] Systemd: false I0713 08:48:09.579473 376216 main.go:248] *************************** W0713 08:48:09.579511 376216 main.go:253] Block the TERM signal. This is only safe in tests! D0713 08:48:09.579643 376216 state_file.go:78] Load container, rootDir: "/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/workdir/gvisor_root", id: {SandboxID: ContainerID:ci-gvisor-systrap-1-race-test-0}, opts: {Exact:false SkipCheck:true TryLock:false RootContainer:false} W0713 08:48:09.579984 376216 util.go:64] FATAL ERROR: loading container "ci-gvisor-systrap-1-race-test-0": file does not exist loading container "ci-gvisor-systrap-1-race-test-0": file does not exist W0713 08:48:09.580308 376216 main.go:274] Failure to execute command, err: 1 [11549102.265611] exe[812626] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.316062] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549102.367142] exe[743779] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549103.277443] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.327611] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.372667] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549103.373629] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549106.101121] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.158749] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549106.214409] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.203702] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549111.313805] exe[743787] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.832041] exe[743948] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.896096] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549117.936191] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.147625] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.194975] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549118.239317] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.666464] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.709186] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549121.769134] exe[743818] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.396423] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.447035] exe[782249] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.470585] exe[812628] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549139.507121] exe[743913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.469316] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.516733] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549155.561202] exe[743794] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.841101] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.883653] exe[743781] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.906352] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549161.946285] exe[743785] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.885765] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.938026] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549177.963555] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.014465] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.831133] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.882033] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.884100] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549178.956006] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.456966] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.503734] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549182.962386] warn_bad_vsyscall: 1 callbacks suppressed [11549182.962389] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.012121] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.059746] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549183.080637] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.284008] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.367576] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549187.445261] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549193.339186] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.395517] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.461816] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549193.489679] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.663958] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.712460] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.763669] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549200.788181] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549207.982095] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.032318] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.053090] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549208.095858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549213.428629] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.465578] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549213.503510] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549215.928549] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549216.000149] exe[768801] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549217.237542] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.283499] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549217.346633] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549219.657475] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.701623] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549219.741378] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.937988] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549223.993970] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.015601] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.066260] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549224.088244] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.744875] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.802594] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549235.852978] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.853165] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.897681] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.919524] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549248.957057] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549272.386964] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.430873] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549272.472074] exe[752437] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549284.010961] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.056302] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.080381] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549284.131020] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.676878] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.732251] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549286.778232] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549305.996414] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.039916] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.087233] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549306.108856] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549312.155430] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.212534] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549312.318757] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549322.225490] exe[762988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562bd7b3c839 cs:33 sp:7fa30ef1dee8 ax:0 si:20000040 di:ffffffffff600000 [11549322.630226] exe[764150] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dfd46d0839 cs:33 sp:7faa79d58ee8 ax:0 si:20000040 di:ffffffffff600000 [11549324.167848] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.225685] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549324.290963] exe[744871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.248247] exe[763603] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.295182] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549325.339907] exe[743783] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549332.992606] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.032076] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.055923] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549333.100145] exe[768811] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549335.966184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.011362] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.012156] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.070502] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.114461] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549336.160317] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549338.584854] warn_bad_vsyscall: 2 callbacks suppressed [11549338.584858] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.635465] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.677495] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549338.698822] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3070 di:ffffffffff600000 [11549340.992026] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.047021] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.090860] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.757473] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.798199] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549341.800483] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549348.007006] warn_bad_vsyscall: 1 callbacks suppressed [11549348.007011] exe[810081] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549348.123020] exe[791686] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a045a86839 cs:33 sp:7ed923d53ee8 ax:0 si:20000040 di:ffffffffff600000 [11549350.842435] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901911] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549350.901928] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.014907] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549351.053068] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.180049] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.331135] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.395122] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549363.416889] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549364.967687] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.283036] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.311226] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.607785] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549365.633332] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.913539] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549370.952794] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549371.002201] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.234160] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.271594] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.294407] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.333242] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549375.357403] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.827451] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.879499] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.902128] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.944274] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549384.945164] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.055187] exe[801669] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed61f88839 cs:33 sp:7fe8832e6ee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.056978] exe[807650] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:565118c94839 cs:33 sp:7f5e3a4beee8 ax:0 si:20000040 di:ffffffffff600000 [11549389.354001] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.404830] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549389.452731] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549390.994794] warn_bad_vsyscall: 3 callbacks suppressed [11549390.994799] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.055906] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549391.103464] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.731184] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.798921] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549404.850231] exe[752062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549421.224700] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.287217] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.330715] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.332297] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3097 di:ffffffffff600000 [11549421.364793] exe[733349] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559d6ff74839 cs:33 sp:7fb252079ee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.644237] exe[777007] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564419386839 cs:33 sp:7f341debdee8 ax:0 si:20000040 di:ffffffffff600000 [11549421.652842] exe[812391] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b98a4cd839 cs:33 sp:7fdb944daee8 ax:0 si:20000040 di:ffffffffff600000 [11549422.842044] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.891535] exe[812915] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549422.931486] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.356143] warn_bad_vsyscall: 6 callbacks suppressed [11549426.356147] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.409055] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.429411] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.469059] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.492130] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549426.953107] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.002112] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.051579] exe[752058] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549427.052798] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.523865] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.574374] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.617270] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549438.644076] exe[765133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.542912] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.586509] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.635656] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549443.656472] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.333222] exe[797263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.385051] exe[752079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.407654] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.463938] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.486314] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549444.506017] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549450.523743] warn_bad_vsyscall: 66 callbacks suppressed [11549450.523747] exe[813165] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d13bc63839 cs:33 sp:7fab0d06fee8 ax:0 si:20000040 di:ffffffffff600000 [11549450.715540] exe[807311] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b9a7633839 cs:33 sp:7f1120b17ee8 ax:0 si:20000040 di:ffffffffff600000 [11549455.474323] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.517320] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.539071] exe[752059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549455.582910] exe[775797] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549462.474386] exe[756116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1de600839 cs:33 sp:7fba5c050ee8 ax:0 si:20000040 di:ffffffffff600000 [11549462.926878] exe[794394] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559edb8a0839 cs:33 sp:7f1c503e2ee8 ax:0 si:20000040 di:ffffffffff600000 [11549466.434155] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.490814] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.533742] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549466.534602] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.211071] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.252741] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.291120] exe[765172] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549484.295633] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.635585] exe[752057] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.677652] exe[752102] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549498.719660] exe[752304] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.867443] exe[752453] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.908983] exe[752065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.909927] exe[752064] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549503.964262] exe[812921] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.495137] exe[812931] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.790729] exe[752302] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420cf858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549532.859182] exe[752105] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f81420f0858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.290345] exe[745966] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.357829] exe[744411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549561.426947] exe[743936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b55784a839 cs:33 sp:7f8142111858 ax:0 si:55b5578a3062 di:ffffffffff600000 [11549593.412229] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549593.562650] exe[824206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f07f9f9839 cs:33 sp:7fa04f9a4ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.243778] exe[812951] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564c749ce839 cs:33 sp:7ea297e86ee8 ax:0 si:20000040 di:ffffffffff600000 [11549705.710759] exe[828296] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c970632839 cs:33 sp:7ec3ceeb7ee8 ax:0 si:20000040 di:ffffffffff600000 [11549714.981109] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549715.749772] exe[828708] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55aaca859839 cs:33 sp:7eda45548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.546233] exe[814844] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f5b0f9a839 cs:33 sp:7fc5bfbfeee8 ax:0 si:20000040 di:ffffffffff600000 [11549786.735375] exe[814714] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b554191839 cs:33 sp:7f6febbf8ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.362481] exe[783694] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549813.735183] exe[800231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f82c5de839 cs:33 sp:7faed96e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11549816.546602] exe[821122] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549817.188403] exe[822913] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5628ba7a1839 cs:33 sp:7fbc187cfee8 ax:0 si:20000040 di:ffffffffff600000 [11549840.206573] exe[828178] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fcd7d54839 cs:33 sp:7eba87823ee8 ax:0 si:20000040 di:ffffffffff600000 [11549842.390425] exe[822623] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41ee8 ax:0 si:20000040 di:ffffffffff600000 [11549851.814988] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549851.979785] exe[834049] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037235] exe[831079] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9be858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549852.037247] exe[834454] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563546ed1839 cs:33 sp:7fabfd9df858 ax:0 si:563546f2a062 di:ffffffffff600000 [11549869.928825] exe[833586] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556d7fa8b839 cs:33 sp:7fd723b3eee8 ax:0 si:20000040 di:ffffffffff600000 [11549870.243345] exe[834928] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56062534e839 cs:33 sp:7f0757548ee8 ax:0 si:20000040 di:ffffffffff600000 [11549959.675292] exe[797744] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558fc8494839 cs:33 sp:7f29d40d3ee8 ax:0 si:20000040 di:ffffffffff600000 [11549964.327083] exe[816565] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d710109839 cs:33 sp:7f42012e0ee8 ax:0 si:20000040 di:ffffffffff600000 [11550011.778578] exe[785408] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.328909] exe[777936] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550012.464501] exe[784143] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e0baf9b40a cs:33 sp:7fb90ddfeee8 ax:12 si:ffffffffff600000 di:55e0bb007ff2 [11550449.411992] exe[840751] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d4deee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.543051] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.570209] exe[850183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.601466] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.628501] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.655874] exe[851400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.684944] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.711295] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.738186] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11550449.768990] exe[822640] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55845f473839 cs:33 sp:7f979d439ee8 ax:0 si:20004280 di:ffffffffff600000 [11551293.287525] warn_bad_vsyscall: 57 callbacks suppressed [11551293.287528] exe[872567] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.432824] exe[872441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64d6ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551293.635840] exe[878590] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5561c909440a cs:33 sp:7f70f64f7ee8 ax:12 si:ffffffffff600000 di:5561c9100ff2 [11551350.987871] exe[802426] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.133434] exe[801154] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551351.264861] exe[800782] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558be8bda839 cs:33 sp:7ff73a3fe858 ax:0 si:558be8c33062 di:ffffffffff600000 [11551739.212650] exe[891790] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.358004] exe[874588] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11551739.423302] exe[876706] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639410fe839 cs:33 sp:7ea58b4f5ee8 ax:0 si:20000880 di:ffffffffff600000 [11552746.340520] exe[917620] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552746.540849] exe[917777] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11552749.324099] exe[916114] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56519befd40a cs:33 sp:7feb2ab30ee8 ax:12 si:ffffffffff600000 di:56519bf69ff2 [11553787.312373] exe[918824] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd909c3bee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.233139] exe[932505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097feee8 ax:0 si:20000300 di:ffffffffff600000 [11553788.702294] exe[918368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55649198d839 cs:33 sp:7fd9097bcee8 ax:0 si:20000300 di:ffffffffff600000 [11556405.744028] exe[973340] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.888821] exe[974236] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556405.889344] exe[972981] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.769888] exe[966210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d40858 ax:0 si:55608d826070 di:ffffffffff600000 [11556408.770120] exe[966208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55608d7cd839 cs:33 sp:7fe6a7d1f858 ax:0 si:55608d826070 di:ffffffffff600000 [11556828.744398] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556828.924558] exe[26205] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.059181] exe[13280] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e49858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556829.100292] exe[12460] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c499aaa839 cs:33 sp:7fa356e28858 ax:0 si:55c499b03070 di:ffffffffff600000 [11556926.028445] exe[987233] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d8fe9a7839 cs:33 sp:7f1b02da7858 ax:0 si:55d8fea00070 di:ffffffffff600000 [11556931.514747] exe[2731] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ecfc56a839 cs:33 sp:7efc33043858 ax:0 si:55ecfc5c3070 di:ffffffffff600000 [11556932.678559] exe[32873] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c147b8d839 cs:33 sp:7f3ef85dc858 ax:0 si:55c147be6070 di:ffffffffff600000 [11556950.820318] exe[29772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561443faf839 cs:33 sp:7f0e531fe858 ax:0 si:561444008070 di:ffffffffff600000 [11557024.979366] exe[990140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557025.945778] exe[989269] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a46bc1e839 cs:33 sp:7f40030e2858 ax:0 si:55a46bc77070 di:ffffffffff600000 [11557026.183320] exe[36260] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556217b32839 cs:33 sp:7fddcd279858 ax:0 si:556217b8b070 di:ffffffffff600000 [11557026.761986] exe[18772] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e1290fa839 cs:33 sp:7fc527cc9858 ax:0 si:55e129153070 di:ffffffffff600000 [11557029.543342] exe[10486] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a4073da839 cs:33 sp:7ee9c91fe858 ax:0 si:55a407433070 di:ffffffffff600000 [11557029.565342] exe[955869] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f019e21839 cs:33 sp:7ec4f6665858 ax:0 si:55f019e7a070 di:ffffffffff600000 [11557070.452747] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557071.382941] exe[25068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a16b144839 cs:33 sp:7eb97babb858 ax:0 si:55a16b19d070 di:ffffffffff600000 [11557079.659895] exe[37699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557079.763841] exe[37791] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5571034ba839 cs:33 sp:7ff34c9be858 ax:0 si:557103513070 di:ffffffffff600000 [11557081.617680] exe[31464] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557081.699452] exe[32275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fc6e96839 cs:33 sp:7eeb3cbef858 ax:0 si:561fc6eef070 di:ffffffffff600000 [11557085.755120] exe[978697] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557086.768436] exe[984524] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561fb0741839 cs:33 sp:7f8e3ebe3858 ax:0 si:561fb079a070 di:ffffffffff600000 [11557092.839673] exe[19916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bb78120839 cs:33 sp:7fb79022c858 ax:0 si:55bb78179070 di:ffffffffff600000 [11557105.272126] exe[16964] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558fd61d839 cs:33 sp:7fb861029858 ax:0 si:5558fd676070 di:ffffffffff600000 [11557125.514096] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557127.078867] exe[13279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5614deb6c839 cs:33 sp:7f99305ae858 ax:0 si:5614debc5070 di:ffffffffff600000 [11557154.900378] exe[36166] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557159.639958] exe[39906] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc7ee8c839 cs:33 sp:7f9cc8367858 ax:0 si:55dc7eee5070 di:ffffffffff600000 [11557221.493537] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557226.224888] exe[950633] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5572e9170839 cs:33 sp:7eee94a41858 ax:0 si:5572e91c9070 di:ffffffffff600000 [11557248.504217] exe[43502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557250.866532] exe[43487] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564d3c75d839 cs:33 sp:7f7be5c91858 ax:0 si:564d3c7b6070 di:ffffffffff600000 [11557522.293434] exe[57221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.454602] exe[43299] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f0d858 ax:0 si:55b660720062 di:ffffffffff600000 [11557522.576325] exe[56829] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b6606c7839 cs:33 sp:7fe294f4f858 ax:0 si:55b660720062 di:ffffffffff600000 [11558001.442748] exe[17430] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.578829] exe[36871] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.610672] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558001.923774] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f171e5240a cs:33 sp:7ec66fd70ee8 ax:12 si:ffffffffff600000 di:55f171ebeff2 [11558002.987979] exe[17433] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.102566] exe[63630] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.246645] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.372957] exe[17438] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.494809] exe[20846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11558003.643478] exe[20903] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4e9b3a40a cs:33 sp:7ec3e1177ee8 ax:12 si:ffffffffff600000 di:55b4e9ba6ff2 [11560610.686110] warn_bad_vsyscall: 8 callbacks suppressed [11560610.686113] exe[99111] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560610.846189] exe[96849] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560611.008067] exe[96916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcd2858 ax:0 si:5595c2305062 di:ffffffffff600000 [11560620.483506] exe[100810] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5595c22ac839 cs:33 sp:7f821dcf3858 ax:0 si:5595c2305062 di:ffffffffff600000 [11561057.499685] exe[98831] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.289038] exe[108411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3eff858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561058.393219] exe[101690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ff2f6ca839 cs:33 sp:7fc2c3f41858 ax:0 si:55ff2f723097 di:ffffffffff600000 [11561923.921251] exe[152411] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3feee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.060175] exe[152385] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11561924.128957] exe[154085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5641c76f1839 cs:33 sp:7f701d3ddee8 ax:0 si:20000040 di:ffffffffff600000 [11562242.603414] exe[164541] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.658947] exe[164509] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562242.726852] exe[164557] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562b269e5839 cs:33 sp:7eb94489b858 ax:0 si:562b26a3e070 di:ffffffffff600000 [11562318.141986] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.185850] exe[165157] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562318.230040] exe[128799] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a7f317a40a cs:33 sp:7f8a42762ee8 ax:12 si:ffffffffff600000 di:55a7f31e6ff2 [11562508.870615] exe[162696] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562508.954821] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee79778e858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.041779] exe[152279] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.053797] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af6124c839 cs:33 sp:7ee7977af858 ax:0 si:55af612a5097 di:ffffffffff600000 [11562509.099380] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.158846] exe[154196] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.222873] exe[154184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.299400] exe[154206] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.361377] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562509.442875] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b097 di:ffffffffff600000 [11562513.886961] warn_bad_vsyscall: 78 callbacks suppressed [11562513.886964] exe[153246] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562513.966428] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.077335] exe[150507] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.160213] exe[166511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.255440] exe[152215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.324063] exe[148511] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.397110] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.417360] exe[153945] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562514.500074] exe[148482] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562514.657039] exe[153275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562518.891334] warn_bad_vsyscall: 242 callbacks suppressed [11562518.891337] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.918008] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.940541] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.962612] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562518.984566] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.004824] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.026469] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.052169] exe[153210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.077333] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562519.100492] exe[153211] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b070 di:ffffffffff600000 [11562523.895932] warn_bad_vsyscall: 195 callbacks suppressed [11562523.895936] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562523.979579] exe[153209] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.056179] exe[152285] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.153870] exe[157649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.235431] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.312684] exe[163330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.336197] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.425044] exe[157648] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.462329] exe[157710] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562524.531409] exe[148505] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.910818] warn_bad_vsyscall: 88 callbacks suppressed [11562528.910821] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562528.988209] exe[148466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.051915] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.121864] exe[148494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.148494] exe[157659] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.234883] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.511729] exe[150494] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.649601] exe[155191] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.693598] exe[155337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b61858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11562529.749781] exe[145592] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5624bc5c2839 cs:33 sp:7ea5d2b82858 ax:0 si:5624bc61b062 di:ffffffffff600000 [11563296.983914] warn_bad_vsyscall: 51 callbacks suppressed [11563296.983917] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.050803] exe[209501] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.121483] exe[210676] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11563297.191808] exe[245375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c2f8eec839 cs:33 sp:7faf5a44b858 ax:0 si:55c2f8f45062 di:ffffffffff600000 [11564162.444776] exe[282975] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.703356] exe[282980] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2faeee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.920885] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.952924] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564162.989739] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.026962] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.062712] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.106058] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.144988] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11564163.183482] exe[262059] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d283d56839 cs:33 sp:7f79d2f6cee8 ax:0 si:20000540 di:ffffffffff600000 [11565099.136493] warn_bad_vsyscall: 57 callbacks suppressed [11565099.136497] exe[293094] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565099.258727] exe[294155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.043336] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11565100.121398] exe[294167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560cf25c6839 cs:33 sp:7ee6c8d68858 ax:0 si:560cf261f062 di:ffffffffff600000 [11566632.890447] exe[349719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f764152839 cs:33 sp:7fdb7b72b858 ax:0 si:55f7641ab062 di:ffffffffff600000 [11567358.170812] exe[372737] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fda5a9a839 cs:33 sp:7f549c97e858 ax:0 si:55fda5af3062 di:ffffffffff600000 [11568031.388619] exe[351576] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558d82c2e839 cs:33 sp:7ecffe498858 ax:0 si:558d82c87062 di:ffffffffff600000 [11569260.474399] exe[375466] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569261.377312] exe[338184] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d08c1858 ax:0 si:559bde482062 di:ffffffffff600000 [11569262.181339] exe[382316] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bde429839 cs:33 sp:7eb7d087f858 ax:0 si:559bde482062 di:ffffffffff600000 [11569309.954783] exe[405267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.065111] exe[352156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.120066] exe[398935] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.176797] exe[393693] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.243561] exe[405400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569310.277532] exe[399019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55be1273a839 cs:33 sp:7faa9fcf6858 ax:0 si:55be12793070 di:ffffffffff600000 [11569310.333288] exe[393672] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556419f67839 cs:33 sp:7fd87549f858 ax:0 si:556419fc0070 di:ffffffffff600000 [11569717.914214] exe[406088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094052] exe[372314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bbcee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.094670] exe[337720] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bfeee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11569718.213977] exe[406250] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555b0971240a cs:33 sp:7f6cc9bddee8 ax:12 si:ffffffffff600000 di:555b0977eff2 [11570627.586664] exe[417752] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.638479] exe[417746] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11570627.766448] exe[441957] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55951d19e839 cs:33 sp:7ed5c464a858 ax:0 si:55951d1f7062 di:ffffffffff600000 [11572038.765476] exe[475895] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889db1ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572038.977536] exe[479441] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572039.176765] exe[479800] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5558cc51240a cs:33 sp:7fb889d90ee8 ax:12 si:ffffffffff600000 di:5558cc57eff2 [11572342.507294] exe[481351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf282c5839 cs:33 sp:7f5c28337858 ax:0 si:55cf2831e070 di:ffffffffff600000 [11572577.393150] exe[486689] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572577.473226] exe[486687] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572578.211498] exe[486677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562945374839 cs:33 sp:7eaf06950858 ax:0 si:5629453cd062 di:ffffffffff600000 [11572754.198775] exe[481332] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56477294c839 cs:33 sp:7f001edd1858 ax:0 si:5647729a5062 di:ffffffffff600000 [11574240.728150] exe[551421] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6f0ee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574241.487023] exe[545323] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6aeee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11574242.469682] exe[546003] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562aca5ab40a cs:33 sp:7f437c6cfee8 ax:12 si:ffffffffff600000 di:562aca617ff2 [11575422.643597] exe[620510] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.701376] exe[619500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575422.762542] exe[619046] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5570f7163839 cs:33 sp:7f949cdebee8 ax:0 si:200007c0 di:ffffffffff600000 [11575566.007915] exe[523991] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.091195] exe[551819] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11575566.166155] exe[628916] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf3a936b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:200400 [11576445.764659] exe[712019] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.878131] exe[712009] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576445.982369] exe[711902] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562e0dd1c839 cs:33 sp:7fed80ecdee8 ax:0 si:200000c0 di:ffffffffff600000 [11576887.854922] exe[723515] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576887.911232] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.005831] exe[716298] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11576888.078248] exe[710502] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d091bae839 cs:33 sp:7f3b9e182858 ax:0 si:55d091c07062 di:ffffffffff600000 [11578050.810150] exe[736914] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.915350] exe[806208] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578050.957314] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578050.969802] exe[799678] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.032458] exe[734055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.066640] exe[799655] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.100539] exe[801517] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11578051.138612] exe[806683] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5582b73eb839 cs:33 sp:7fd1e3a33858 ax:0 si:5582b7444070 di:ffffffffff600000 [11578051.200188] exe[801281] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561398ab3839 cs:33 sp:7f3359bb7858 ax:0 si:561398b0c070 di:ffffffffff600000 [11578051.222257] exe[734041] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55af392a0839 cs:33 sp:7fd75af3d858 ax:0 si:55af392f9070 di:ffffffffff600000 [11579845.499536] exe[851008] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e2109ed839 cs:33 sp:7f547858c858 ax:0 si:55e210a46062 di:ffffffffff600000 [11579884.100862] exe[859314] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.173286] exe[861221] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11579884.225785] exe[861085] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ecc06eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:44000000 [11580352.706875] exe[880278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dc72733839 cs:33 sp:7ece8f07f858 ax:0 si:55dc7278c062 di:ffffffffff600000 [11581411.682652] exe[910863] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555579041839 cs:33 sp:7eedc077f858 ax:0 si:55557909a062 di:ffffffffff600000 [11583407.177111] docker0: port 1(vethe259598) entered blocking state [11583407.183502] docker0: port 1(vethe259598) entered disabled state [11583407.190068] device vethe259598 entered promiscuous mode [11583408.741833] eth0: renamed from veth1e830bc [11583408.814556] IPv6: ADDRCONF(NETDEV_CHANGE): vethe259598: link becomes ready [11583408.822198] docker0: port 1(vethe259598) entered blocking state [11583408.828542] docker0: port 1(vethe259598) entered forwarding state [11583408.835194] IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready [11583412.300279] veth1e830bc: renamed from eth0 [11583412.448612] docker0: port 1(vethe259598) entered disabled state [11583412.462563] docker0: port 1(vethe259598) entered disabled state [11583412.479276] device vethe259598 left promiscuous mode [11583412.485146] docker0: port 1(vethe259598) entered disabled state [11583431.825145] docker0: port 1(vethc7abddf) entered blocking state [11583431.831533] docker0: port 1(vethc7abddf) entered disabled state [11583431.838215] device vethc7abddf entered promiscuous mode [11583432.494406] eth0: renamed from vethd633b4d [11583432.599425] IPv6: ADDRCONF(NETDEV_CHANGE): vethc7abddf: link becomes ready [11583432.607140] docker0: port 1(vethc7abddf) entered blocking state [11583432.613499] docker0: port 1(vethc7abddf) entered forwarding state [11583817.129561] vethd633b4d: renamed from eth0 [11583817.523399] docker0: port 1(vethc7abddf) entered disabled state [11583817.532193] docker0: port 1(vethc7abddf) entered disabled state [11583817.545763] device vethc7abddf left promiscuous mode [11583817.552461] docker0: port 1(vethc7abddf) entered disabled state [11584054.884518] audit: type=1326 audit(1689187802.116:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584055.879755] audit: type=1326 audit(1689187803.112:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103700 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584567.089744] audit: type=1326 audit(1689188314.320:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=182950 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584611.088374] audit: type=1326 audit(1689188358.312:13): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263707 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584672.762944] audit: type=1326 audit(1689188419.991:14): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584875.420389] audit: type=1326 audit(1689188622.651:15): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=188936 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11584965.440931] audit: type=1326 audit(1689188712.671:16): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585225.740695] audit: type=1326 audit(1689188972.971:17): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585229.617269] audit: type=1326 audit(1689188976.847:18): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585232.156357] audit: type=1326 audit(1689188979.387:19): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=272781 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585314.538060] audit: type=1326 audit(1689189061.767:20): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343964 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585378.674528] audit: type=1326 audit(1689189125.902:21): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=441825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585433.090919] audit: type=1326 audit(1689189180.318:22): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585457.504489] audit: type=1326 audit(1689189204.734:23): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585481.843203] audit: type=1326 audit(1689189229.070:24): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488144 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585504.254722] audit: type=1326 audit(1689189251.482:25): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.053267] audit: type=1326 audit(1689189275.282:26): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493114 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585528.807884] audit: type=1326 audit(1689189276.034:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585528.832541] audit: type=1326 audit(1689189276.038:28): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442984 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585545.824476] audit: type=1326 audit(1689189293.054:29): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585551.212031] audit: type=1326 audit(1689189298.438:30): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585623.106438] audit: type=1326 audit(1689189370.334:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=368087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585650.678959] audit: type=1326 audit(1689189397.906:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=503494 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585666.774803] audit: type=1326 audit(1689189413.998:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585672.549526] audit: type=1326 audit(1689189419.774:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585675.835169] audit: type=1326 audit(1689189423.062:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=519541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585680.990321] audit: type=1326 audit(1689189428.218:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585682.225303] audit: type=1326 audit(1689189429.454:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=523487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585692.507931] audit: type=1326 audit(1689189439.734:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529974 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585700.810773] audit: type=1326 audit(1689189448.038:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11585707.330135] audit: type=1326 audit(1689189454.558:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585707.355627] audit: type=1326 audit(1689189454.570:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585760.137664] audit: type=1326 audit(1689189507.366:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585842.181262] audit: type=1326 audit(1689189589.410:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=543905 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585953.240671] audit: type=1326 audit(1689189700.466:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=436527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585977.153008] audit: type=1326 audit(1689189724.382:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11585983.993412] audit: type=1326 audit(1689189731.222:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586006.672711] audit: type=1326 audit(1689189753.898:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586140.152824] audit: type=1326 audit(1689189887.377:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586207.321863] audit: type=1326 audit(1689189954.549:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586222.617377] audit: type=1326 audit(1689189969.845:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586222.733853] audit: type=1326 audit(1689189969.961:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=648549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586283.299802] audit: type=1326 audit(1689190030.525:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586425.211851] audit: type=1326 audit(1689190172.437:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=660268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586448.276864] audit: type=1326 audit(1689190195.501:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=709276 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586599.517442] audit: type=1326 audit(1689190346.745:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586697.763797] audit: type=1326 audit(1689190444.989:56): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=749851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586721.351015] audit: type=1326 audit(1689190468.577:57): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586855.921790] audit: type=1326 audit(1689190603.152:58): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796699 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11586945.894236] audit: type=1326 audit(1689190693.124:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=533305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.031898] audit: type=1326 audit(1689190744.260:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586997.140632] audit: type=1326 audit(1689190744.368:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=862850 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11586998.283858] audit: type=1326 audit(1689190745.512:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587012.567629] audit: type=1326 audit(1689190759.796:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879241 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587019.764188] audit: type=1326 audit(1689190766.992:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587033.584838] audit: type=1326 audit(1689190780.812:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895459 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587037.458391] audit: type=1326 audit(1689190784.688:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587047.438093] audit: type=1326 audit(1689190794.652:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587181.826148] audit: type=1326 audit(1689190929.056:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=905801 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587280.280946] audit: type=1326 audit(1689191027.508:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11587323.352812] audit: type=1326 audit(1689191070.580:70): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919549 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587345.059700] audit: type=1326 audit(1689191092.288:71): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=549018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587346.322122] audit: type=1326 audit(1689191093.552:72): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930804 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587481.789421] audit: type=1326 audit(1689191229.016:73): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587625.478553] audit: type=1326 audit(1689191372.707:74): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587708.307169] audit: type=1326 audit(1689191455.535:75): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=756034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587769.707671] audit: type=1326 audit(1689191516.935:76): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587868.987704] audit: type=1326 audit(1689191616.215:77): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587911.691294] audit: type=1326 audit(1689191658.919:78): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953497 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11587972.252639] audit: type=1326 audit(1689191719.479:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949672 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588027.579353] audit: type=1326 audit(1689191774.807:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=964425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11588054.186210] audit: type=1326 audit(1689191801.411:81): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=959048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588196.763380] audit: type=1326 audit(1689191943.991:82): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=966784 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588241.418032] audit: type=1326 audit(1689191988.643:83): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961678 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588257.524755] exe[970083] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563948302839 cs:33 sp:7f701577b858 ax:0 si:56394835b062 di:ffffffffff600000 [11588338.712384] audit: type=1326 audit(1689192085.938:84): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588361.040657] audit: type=1326 audit(1689192108.266:85): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588415.532026] audit: type=1326 audit(1689192162.758:86): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=601426 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588610.783264] audit: type=1326 audit(1689192358.006:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984049 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588726.496588] audit: type=1326 audit(1689192473.722:88): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588753.178927] audit: type=1326 audit(1689192500.402:89): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988316 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588776.098474] audit: type=1326 audit(1689192523.322:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992296 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588907.567479] audit: type=1326 audit(1689192654.790:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11588943.441393] audit: type=1326 audit(1689192690.666:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=997051 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589004.500919] audit: type=1326 audit(1689192751.725:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589049.699452] audit: type=1326 audit(1689192796.921:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589192.852319] audit: type=1326 audit(1689192940.077:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589224.823353] audit: type=1326 audit(1689192972.045:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=957390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589279.679649] audit: type=1326 audit(1689193026.901:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999123 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589317.854470] audit: type=1326 audit(1689193065.077:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9166 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589336.359512] audit: type=1326 audit(1689193083.581:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=3839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589429.636946] audit: type=1326 audit(1689193176.861:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589439.329881] audit: type=1326 audit(1689193186.553:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589452.248556] audit: type=1326 audit(1689193199.473:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=13669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589478.982418] audit: type=1326 audit(1689193226.205:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10335 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589556.277003] audit: type=1326 audit(1689193303.501:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589580.979071] audit: type=1326 audit(1689193328.201:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589586.686728] audit: type=1326 audit(1689193333.909:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589621.171546] audit: type=1326 audit(1689193368.393:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19657 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589724.809423] audit: type=1326 audit(1689193472.032:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=975428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589728.293279] audit: type=1326 audit(1689193475.516:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589733.237752] audit: type=1326 audit(1689193480.460:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589743.161653] audit: type=1326 audit(1689193490.388:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589764.186602] audit: type=1326 audit(1689193511.412:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589776.120531] audit: type=1326 audit(1689193523.348:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589831.237562] audit: type=1326 audit(1689193578.464:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=991342 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589866.353844] audit: type=1326 audit(1689193613.580:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589870.843852] audit: type=1326 audit(1689193618.068:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589881.503035] exe[37537] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589881.579767] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.310348] exe[38197] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589882.415993] exe[36950] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561bce54b839 cs:33 sp:7f4297a8d858 ax:0 si:561bce5a4062 di:ffffffffff600000 [11589905.778137] audit: type=1326 audit(1689193653.004:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=35962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11589907.278419] audit: type=1326 audit(1689193654.504:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11589910.766143] audit: type=1326 audit(1689193657.992:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36550 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590010.704598] audit: type=1326 audit(1689193757.928:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590013.206490] audit: type=1326 audit(1689193760.432:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43383 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590049.200088] audit: type=1326 audit(1689193796.424:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590068.122169] audit: type=1326 audit(1689193815.348:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590073.502291] audit: type=1326 audit(1689193820.728:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590120.931053] audit: type=1326 audit(1689193868.156:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590155.535046] audit: type=1326 audit(1689193902.760:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590175.976226] audit: type=1326 audit(1689193923.200:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981718 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590178.057670] audit: type=1326 audit(1689193925.284:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=60876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590190.713262] audit: type=1326 audit(1689193937.940:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56012 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590230.205782] audit: type=1326 audit(1689193977.432:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58703 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590235.472981] audit: type=1326 audit(1689193982.700:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590334.418166] audit: type=1326 audit(1689194081.644:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=62081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590356.564544] audit: type=1326 audit(1689194103.788:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68645 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590368.499637] audit: type=1326 audit(1689194115.724:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=69347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590393.106260] audit: type=1326 audit(1689194140.332:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590397.337896] audit: type=1326 audit(1689194144.564:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590421.065575] audit: type=1326 audit(1689194168.292:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55042 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590427.197777] audit: type=1326 audit(1689194174.424:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590480.784621] exe[70942] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563a6628c839 cs:33 sp:7fa6d27d0858 ax:0 si:563a662e5062 di:ffffffffff600000 [11590563.298809] audit: type=1326 audit(1689194310.523:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73853 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590570.174470] audit: type=1326 audit(1689194317.399:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74121 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590579.511563] audit: type=1326 audit(1689194326.735:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.165028] audit: type=1326 audit(1689194365.387:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590618.556131] audit: type=1326 audit(1689194365.779:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76917 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590659.789661] audit: type=1326 audit(1689194407.015:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72204 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590667.566138] audit: type=1326 audit(1689194414.791:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590713.717972] audit: type=1326 audit(1689194460.943:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590760.577913] audit: type=1326 audit(1689194507.803:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=85519 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590773.925188] audit: type=1326 audit(1689194521.147:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=86433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590829.878288] audit: type=1326 audit(1689194577.103:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=74440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590843.309873] audit: type=1326 audit(1689194590.535:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90249 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11590856.337400] audit: type=1326 audit(1689194603.563:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=91077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590883.659438] exe[98704] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.745839] exe[98692] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590883.804815] exe[73130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557e7e32c40a cs:33 sp:7ec2092f3ee8 ax:12 si:ffffffffff600000 di:557e7e398ff2 [11590905.357910] audit: type=1326 audit(1689194652.583:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590994.002065] audit: type=1326 audit(1689194741.227:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11590997.870766] audit: type=1326 audit(1689194745.095:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591045.573250] audit: type=1326 audit(1689194792.795:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=61248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591047.449319] audit: type=1326 audit(1689194794.671:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100862 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591140.220327] audit: type=1326 audit(1689194887.443:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103773 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591190.314804] audit: type=1326 audit(1689194937.538:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591282.744645] audit: type=1326 audit(1689195029.966:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=110698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591291.245979] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.293995] exe[114918] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.340272] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88ea858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591291.365662] exe[112133] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5637f8744839 cs:33 sp:7ee1f88c9858 ax:0 si:5637f879d062 di:ffffffffff600000 [11591332.697604] audit: type=1326 audit(1689195079.918:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=112617 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591355.547113] audit: type=1326 audit(1689195102.770:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=116982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591358.161112] audit: type=1326 audit(1689195105.382:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=98099 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591425.677450] audit: type=1326 audit(1689195172.898:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591448.624599] audit: type=1326 audit(1689195195.846:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=119555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591607.174755] audit: type=1326 audit(1689195354.398:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=120483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591633.329281] audit: type=1326 audit(1689195380.550:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=118107 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591699.123909] audit: type=1326 audit(1689195446.346:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591750.549397] audit: type=1326 audit(1689195497.770:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=124794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591808.120865] audit: type=1326 audit(1689195555.342:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591843.602538] audit: type=1326 audit(1689195590.826:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127514 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591873.374278] audit: type=1326 audit(1689195620.594:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591893.157685] audit: type=1326 audit(1689195640.377:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11591982.621819] audit: type=1326 audit(1689195729.841:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11591989.377409] audit: type=1326 audit(1689195736.597:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592022.574487] audit: type=1326 audit(1689195769.793:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87153 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592035.999430] audit: type=1326 audit(1689195783.221:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592132.313885] audit: type=1326 audit(1689195879.533:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135592 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592143.607778] audit: type=1326 audit(1689195890.829:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592178.641536] audit: type=1326 audit(1689195925.861:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592254.513447] audit: type=1326 audit(1689196001.733:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592273.875922] audit: type=1326 audit(1689196021.097:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140726 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592302.580569] audit: type=1326 audit(1689196049.801:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=135841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592321.531004] audit: type=1326 audit(1689196068.753:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=142352 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592339.728090] audit: type=1326 audit(1689196086.949:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130223 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592369.761746] audit: type=1326 audit(1689196116.981:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103571 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592410.933916] audit: type=1326 audit(1689196158.153:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=150341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592416.511036] audit: type=1326 audit(1689196163.733:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592462.058974] audit: type=1326 audit(1689196209.281:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=141810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592463.310936] audit: type=1326 audit(1689196210.533:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592485.344448] audit: type=1326 audit(1689196232.565:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153095 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592558.476558] audit: type=1326 audit(1689196305.697:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151044 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592615.624930] audit: type=1326 audit(1689196362.844:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592699.997739] audit: type=1326 audit(1689196447.220:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592710.156296] audit: type=1326 audit(1689196457.380:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=156955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592721.951674] audit: type=1326 audit(1689196469.176:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592736.718023] audit: type=1326 audit(1689196483.940:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=153479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592741.098019] audit: type=1326 audit(1689196488.320:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592755.557937] audit: type=1326 audit(1689196502.780:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=149411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592759.276627] audit: type=1326 audit(1689196506.500:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592769.332142] audit: type=1326 audit(1689196516.556:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592779.678505] audit: type=1326 audit(1689196526.900:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=144000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592781.810254] audit: type=1326 audit(1689196529.032:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11592864.422847] audit: type=1326 audit(1689196611.644:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=161799 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592924.228200] audit: type=1326 audit(1689196671.452:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11592972.503710] audit: type=1326 audit(1689196719.728:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593019.764197] audit: type=1326 audit(1689196766.988:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593032.140808] audit: type=1326 audit(1689196779.364:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593079.379374] audit: type=1326 audit(1689196826.600:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593114.910849] audit: type=1326 audit(1689196862.132:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.622118] audit: type=1326 audit(1689196921.844:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172979 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593174.825662] audit: type=1326 audit(1689196922.048:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=172978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593178.076737] audit: type=1326 audit(1689196925.300:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162576 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593234.654096] audit: type=1326 audit(1689196981.876:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593257.424976] audit: type=1326 audit(1689197004.648:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=177244 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593293.232827] audit: type=1326 audit(1689197040.456:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137729 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593317.825573] audit: type=1326 audit(1689197065.048:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=180616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593323.667486] audit: type=1326 audit(1689197070.888:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189200 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593328.061505] audit: type=1326 audit(1689197075.284:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148080 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593329.981467] audit: type=1326 audit(1689197077.204:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593338.759166] audit: type=1326 audit(1689197085.979:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=165105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593389.569262] audit: type=1326 audit(1689197136.791:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=186680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593396.219631] exe[152440] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d776adb40a cs:33 sp:7ed61def9ee8 ax:12 si:ffffffffff600000 di:55d776b47ff2 [11593399.988581] audit: type=1326 audit(1689197147.211:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187139 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593439.960246] exe[66056] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555be798b40a cs:33 sp:7f6af116aee8 ax:12 si:ffffffffff600000 di:555be79f7ff2 [11593461.573435] audit: type=1326 audit(1689197208.795:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=190626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593485.256569] audit: type=1326 audit(1689197232.479:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593497.873599] audit: type=1326 audit(1689197245.095:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593518.294739] audit: type=1326 audit(1689197265.515:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593521.883008] exe[199220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55da1a09d40a cs:33 sp:7f85f4e68ee8 ax:12 si:ffffffffff600000 di:55da1a109ff2 [11593544.715149] audit: type=1326 audit(1689197291.935:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=197050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593545.100259] audit: type=1326 audit(1689197292.323:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196843 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593575.000948] exe[134062] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5639deab340a cs:33 sp:7f755d14fee8 ax:12 si:ffffffffff600000 di:5639deb1fff2 [11593604.159283] audit: type=1326 audit(1689197351.379:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=200356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593640.473262] audit: type=1326 audit(1689197387.695:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=202521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593657.667580] exe[179402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5591c09e940a cs:33 sp:7f261affeee8 ax:12 si:ffffffffff600000 di:5591c0a55ff2 [11593674.309236] audit: type=1326 audit(1689197421.531:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593689.965207] audit: type=1326 audit(1689197437.187:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205540 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593691.547751] exe[160101] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5569db9d240a cs:33 sp:7fa8a79ccee8 ax:12 si:ffffffffff600000 di:5569dba3eff2 [11593699.961762] audit: type=1326 audit(1689197447.183:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=206003 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593728.160554] audit: type=1326 audit(1689197475.383:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593746.828768] audit: type=1326 audit(1689197494.051:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=207759 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593795.835659] audit: type=1326 audit(1689197543.055:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=209535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593832.663491] audit: type=1326 audit(1689197579.883:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593838.669590] exe[171215] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56258f57d40a cs:33 sp:7eee19bc0ee8 ax:12 si:ffffffffff600000 di:56258f5e9ff2 [11593855.337569] audit: type=1326 audit(1689197602.559:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=211977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593873.582187] exe[168156] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ea3654340a cs:33 sp:7ee36dc7fee8 ax:12 si:ffffffffff600000 di:55ea365afff2 [11593890.297485] audit: type=1326 audit(1689197637.519:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212765 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11593894.219651] audit: type=1326 audit(1689197641.439:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=203030 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593950.988419] audit: type=1326 audit(1689197698.211:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215006 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11593958.108331] exe[223988] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55790709f40a cs:33 sp:7fc0e2306ee8 ax:12 si:ffffffffff600000 di:55790710bff2 [11593975.515820] audit: type=1326 audit(1689197722.735:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=216520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594010.397443] audit: type=1326 audit(1689197757.615:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594030.252814] audit: type=1326 audit(1689197777.475:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594033.719885] audit: type=1326 audit(1689197780.939:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=220218 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594106.182590] audit: type=1326 audit(1689197853.402:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594117.815412] audit: type=1326 audit(1689197865.034:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=239115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594117.935385] audit: type=1326 audit(1689197865.154:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225643 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594165.847268] audit: type=1326 audit(1689197913.066:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=230078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594174.793835] audit: type=1326 audit(1689197922.014:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=244854 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594175.873367] audit: type=1326 audit(1689197923.094:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594199.462125] audit: type=1326 audit(1689197946.682:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594224.432971] audit: type=1326 audit(1689197971.654:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=249792 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594261.404105] audit: type=1326 audit(1689198008.622:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=241022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594318.932606] audit: type=1326 audit(1689198066.150:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594320.925806] audit: type=1326 audit(1689198068.146:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=247755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594356.854437] audit: type=1326 audit(1689198104.074:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=225506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594380.768141] audit: type=1326 audit(1689198127.986:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=240966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594390.465281] audit: type=1326 audit(1689198137.686:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594461.153994] audit: type=1326 audit(1689198208.374:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=255268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594476.069454] audit: type=1326 audit(1689198223.290:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=256911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594518.406656] audit: type=1326 audit(1689198265.626:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594523.088185] audit: type=1326 audit(1689198270.306:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=259805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594597.381921] audit: type=1326 audit(1689198344.602:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191172 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594603.685087] audit: type=1326 audit(1689198350.906:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=266554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594631.412121] audit: type=1326 audit(1689198378.630:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=268442 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594632.657909] audit: type=1326 audit(1689198379.878:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=258967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594662.779958] exe[279809] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594662.854447] exe[276685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713532] exe[277223] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bfeee8 ax:0 si:20000080 di:ffffffffff600000 [11594663.713638] exe[279858] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556661d7e839 cs:33 sp:7f28c9bddee8 ax:0 si:20000080 di:ffffffffff600000 [11594665.693757] audit: type=1326 audit(1689198412.914:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594673.507995] audit: type=1326 audit(1689198420.726:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=270821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594730.359948] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.445155] exe[278569] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.446222] exe[278851] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.540368] exe[278597] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.552108] exe[285100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594730.612605] exe[281701] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:555ff3ea6839 cs:33 sp:7f701d7f6858 ax:0 si:555ff3eff070 di:ffffffffff600000 [11594730.638579] exe[278601] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d073b64839 cs:33 sp:7ff3ea13b858 ax:0 si:55d073bbd070 di:ffffffffff600000 [11594746.644836] audit: type=1326 audit(1689198493.862:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=277230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594768.991618] audit: type=1326 audit(1689198516.210:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=291770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594786.336470] audit: type=1326 audit(1689198533.553:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594808.089645] audit: type=1326 audit(1689198555.309:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=281516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594828.717418] audit: type=1326 audit(1689198575.937:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=284014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594880.645359] audit: type=1326 audit(1689198627.865:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=276757 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594915.736039] audit: type=1326 audit(1689198662.953:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=296537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594941.113632] audit: type=1326 audit(1689198688.333:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11594951.088221] audit: type=1326 audit(1689198698.305:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=294128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11594973.980095] audit: type=1326 audit(1689198721.197:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=298957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595018.844858] audit: type=1326 audit(1689198766.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295651 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595030.820319] audit: type=1326 audit(1689198778.037:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=263124 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595032.223366] audit: type=1326 audit(1689198779.441:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=231245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595145.554563] audit: type=1326 audit(1689198892.773:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300890 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595161.269631] audit: type=1326 audit(1689198908.489:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=301412 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595170.431765] audit: type=1326 audit(1689198917.649:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595185.313809] audit: type=1326 audit(1689198932.533:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595201.280000] audit: type=1326 audit(1689198948.497:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=304270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595223.038909] audit: type=1326 audit(1689198970.257:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=305529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595268.993349] audit: type=1326 audit(1689199016.209:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280239 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595304.435314] audit: type=1326 audit(1689199051.653:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595356.370847] audit: type=1326 audit(1689199103.589:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595366.975635] audit: type=1326 audit(1689199114.193:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595426.830311] audit: type=1326 audit(1689199174.049:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595427.662370] audit: type=1326 audit(1689199174.881:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=303097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595446.025545] audit: type=1326 audit(1689199193.241:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595464.682020] audit: type=1326 audit(1689199211.901:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=318190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595509.649702] audit: type=1326 audit(1689199256.864:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595510.657426] audit: type=1326 audit(1689199257.872:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595542.116878] audit: type=1326 audit(1689199289.332:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595581.328126] audit: type=1326 audit(1689199328.548:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328777 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595587.640931] audit: type=1326 audit(1689199334.860:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595651.155320] audit: type=1326 audit(1689199398.376:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=333972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595702.302607] audit: type=1326 audit(1689199449.524:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595730.144192] audit: type=1326 audit(1689199477.364:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=337996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595740.233803] audit: type=1326 audit(1689199487.452:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338460 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595792.585821] audit: type=1326 audit(1689199539.804:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=341419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595825.580712] audit: type=1326 audit(1689199572.800:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595875.108425] audit: type=1326 audit(1689199622.328:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=343368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595901.852174] audit: type=1326 audit(1689199649.072:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344849 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595905.389538] audit: type=1326 audit(1689199652.608:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=314916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11595925.496842] audit: type=1326 audit(1689199672.716:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=335810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595934.736760] audit: type=1326 audit(1689199681.956:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=345386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595971.418522] audit: type=1326 audit(1689199718.640:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=308731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11595980.227077] audit: type=1326 audit(1689199727.448:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596018.056630] audit: type=1326 audit(1689199765.276:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596056.500390] audit: type=1326 audit(1689199803.720:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=361636 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596075.947223] audit: type=1326 audit(1689199823.168:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=363826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596134.937184] audit: type=1326 audit(1689199882.156:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=373258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596159.034584] audit: type=1326 audit(1689199906.256:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=375929 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596177.422094] audit: type=1326 audit(1689199924.640:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383229 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596180.530915] audit: type=1326 audit(1689199927.752:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362258 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596187.965307] audit: type=1326 audit(1689199935.184:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=362876 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596211.290275] audit: type=1326 audit(1689199958.508:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596218.125572] audit: type=1326 audit(1689199965.344:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=378952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596246.667371] audit: type=1326 audit(1689199993.887:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=389789 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596290.009508] audit: type=1326 audit(1689200037.227:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=382687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596301.649961] audit: type=1326 audit(1689200048.867:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383548 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596322.674538] audit: type=1326 audit(1689200069.891:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=385382 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596359.395258] audit: type=1326 audit(1689200106.615:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=388832 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596368.814653] audit: type=1326 audit(1689200116.035:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=401516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596443.646206] audit: type=1326 audit(1689200190.863:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=396416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596466.257416] audit: type=1326 audit(1689200213.475:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596502.013601] audit: type=1326 audit(1689200249.231:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=403529 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596564.211893] audit: type=1326 audit(1689200311.431:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=406533 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596594.833485] audit: type=1326 audit(1689200342.051:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420557 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596642.054964] audit: type=1326 audit(1689200389.275:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596644.775799] audit: type=1326 audit(1689200391.995:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=412267 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596718.281279] audit: type=1326 audit(1689200465.499:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420908 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596748.828125] exe[433668] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:558b25822839 cs:33 sp:7f1f6d4d3858 ax:0 si:558b2587b062 di:ffffffffff600000 [11596786.178383] audit: type=1326 audit(1689200533.395:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=425510 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596794.175733] audit: type=1326 audit(1689200541.395:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426145 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596845.812515] audit: type=1326 audit(1689200593.031:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596871.244869] audit: type=1326 audit(1689200618.463:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596896.868375] audit: type=1326 audit(1689200644.087:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=405560 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596929.235998] audit: type=1326 audit(1689200676.455:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11596963.597646] audit: type=1326 audit(1689200710.814:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431840 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11596988.259748] audit: type=1326 audit(1689200735.478:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=440156 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597030.957935] audit: type=1326 audit(1689200778.174:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597070.847230] audit: type=1326 audit(1689200818.066:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443447 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597089.178816] audit: type=1326 audit(1689200836.394:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444711 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597129.189094] audit: type=1326 audit(1689200876.406:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597150.586654] audit: type=1326 audit(1689200897.802:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597150.630455] audit: type=1326 audit(1689200897.846:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=447357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597213.244332] audit: type=1326 audit(1689200960.462:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=455277 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597271.316230] audit: type=1326 audit(1689201018.534:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=460261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597310.051733] audit: type=1326 audit(1689201057.270:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597313.276441] audit: type=1326 audit(1689201060.494:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597314.610726] audit: type=1326 audit(1689201061.826:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=464050 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597357.135100] audit: type=1326 audit(1689201104.350:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=468066 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597413.137470] audit: type=1326 audit(1689201160.354:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=443184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597414.535659] audit: type=1326 audit(1689201161.754:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597474.924098] audit: type=1326 audit(1689201222.142:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597476.117154] audit: type=1326 audit(1689201223.334:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476538 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597498.269056] audit: type=1326 audit(1689201245.486:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597555.566526] audit: type=1326 audit(1689201302.782:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482783 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597641.232540] audit: type=1326 audit(1689201388.450:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=489586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597669.950313] exe[494500] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e652697839 cs:33 sp:7f7b088e1858 ax:0 si:55e6526f0070 di:ffffffffff600000 [11597698.119005] audit: type=1326 audit(1689201445.333:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597723.766240] audit: type=1326 audit(1689201470.981:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=494635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597725.580971] audit: type=1326 audit(1689201472.797:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=487339 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597778.424545] audit: type=1326 audit(1689201525.641:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497122 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597782.912946] audit: type=1326 audit(1689201530.129:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=497346 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597839.779249] audit: type=1326 audit(1689201586.993:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500302 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597924.949065] audit: type=1326 audit(1689201672.165:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597927.023142] audit: type=1326 audit(1689201674.237:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=509301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11597928.907409] audit: type=1326 audit(1689201676.121:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=484211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597933.552953] audit: type=1326 audit(1689201680.769:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=510701 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597976.279809] audit: type=1326 audit(1689201723.493:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11597982.541467] audit: type=1326 audit(1689201729.757:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=513162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598067.159794] audit: type=1326 audit(1689201814.373:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=518642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598088.313475] audit: type=1326 audit(1689201835.529:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598125.471872] audit: type=1326 audit(1689201872.685:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522253 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598131.148243] audit: type=1326 audit(1689201878.365:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598204.492781] audit: type=1326 audit(1689201951.709:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=520390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598208.863021] audit: type=1326 audit(1689201956.077:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=526331 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598243.575830] audit: type=1326 audit(1689201990.789:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598268.259679] audit: type=1326 audit(1689202015.473:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=528775 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598286.099005] audit: type=1326 audit(1689202033.313:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=529554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598350.997125] audit: type=1326 audit(1689202098.213:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598352.184658] audit: type=1326 audit(1689202099.401:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541070 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598410.602708] audit: type=1326 audit(1689202157.816:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535596 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598458.134205] audit: type=1326 audit(1689202205.352:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=530585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598471.516156] audit: type=1326 audit(1689202218.732:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=541069 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598480.334947] audit: type=1326 audit(1689202227.552:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=531824 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598482.921116] audit: type=1326 audit(1689202230.140:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=522091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598493.766116] audit: type=1326 audit(1689202240.984:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=542354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598537.882169] audit: type=1326 audit(1689202285.100:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552304 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598552.794779] audit: type=1326 audit(1689202300.012:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598601.517055] audit: type=1326 audit(1689202348.736:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550148 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598636.422226] audit: type=1326 audit(1689202383.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598696.930725] audit: type=1326 audit(1689202444.148:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598699.992536] audit: type=1326 audit(1689202447.208:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=555330 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598764.002598] audit: type=1326 audit(1689202511.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=558821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598778.707897] audit: type=1326 audit(1689202525.924:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=559751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598781.495884] audit: type=1326 audit(1689202528.712:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571608 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598838.336938] audit: type=1326 audit(1689202585.556:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598851.686782] audit: type=1326 audit(1689202598.904:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557043 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598921.757010] audit: type=1326 audit(1689202668.976:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11598946.863553] audit: type=1326 audit(1689202694.080:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=574758 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11598979.367746] audit: type=1326 audit(1689202726.584:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599001.943831] audit: type=1326 audit(1689202749.160:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577673 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599054.749238] audit: type=1326 audit(1689202801.968:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=573675 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599065.610701] audit: type=1326 audit(1689202812.828:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599121.528672] audit: type=1326 audit(1689202868.744:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=583090 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599156.266882] audit: type=1326 audit(1689202903.483:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599198.828291] audit: type=1326 audit(1689202946.043:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599208.132916] audit: type=1326 audit(1689202955.347:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586082 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599230.502686] audit: type=1326 audit(1689202977.719:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=576573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599296.025793] audit: type=1326 audit(1689203043.243:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=589839 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599311.286462] audit: type=1326 audit(1689203058.503:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=590816 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599353.781004] audit: type=1326 audit(1689203100.995:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592776 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599357.016179] audit: type=1326 audit(1689203104.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599357.503764] audit: type=1326 audit(1689203104.719:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=592880 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599379.763425] audit: type=1326 audit(1689203126.979:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598499 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599466.065105] audit: type=1326 audit(1689203213.279:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=597822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599499.137048] audit: type=1326 audit(1689203246.351:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598470 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599505.276837] audit: type=1326 audit(1689203252.491:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595019 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599507.683755] audit: type=1326 audit(1689203254.899:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=598796 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599570.540316] audit: type=1326 audit(1689203317.755:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=586185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599584.813655] audit: type=1326 audit(1689203332.031:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602286 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599642.444173] audit: type=1326 audit(1689203389.659:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=603065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599671.529067] audit: type=1326 audit(1689203418.743:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596545 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599691.211475] audit: type=1326 audit(1689203438.427:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599691.379627] audit: type=1326 audit(1689203438.595:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=605508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599727.545269] audit: type=1326 audit(1689203474.759:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.062166] audit: type=1326 audit(1689203509.279:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599762.086813] audit: type=1326 audit(1689203509.279:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599794.446274] audit: type=1326 audit(1689203541.663:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604351 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599853.075039] audit: type=1326 audit(1689203600.290:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599854.839725] audit: type=1326 audit(1689203602.054:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11599869.641444] audit: type=1326 audit(1689203616.854:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=612658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11599904.012459] audit: type=1326 audit(1689203651.226:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=613836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600015.137399] audit: type=1326 audit(1689203762.350:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616585 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600016.195425] audit: type=1326 audit(1689203763.410:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600047.639331] audit: type=1326 audit(1689203794.854:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=609967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600049.671506] audit: type=1326 audit(1689203796.886:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614957 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600093.041099] audit: type=1326 audit(1689203840.254:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620895 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600136.261927] audit: type=1326 audit(1689203883.474:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600176.566249] audit: type=1326 audit(1689203923.778:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622882 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600177.846245] audit: type=1326 audit(1689203925.062:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=622980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600245.983660] audit: type=1326 audit(1689203993.198:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=608272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600255.622819] audit: type=1326 audit(1689204002.838:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627117 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600301.130225] audit: type=1326 audit(1689204048.342:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=627116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600313.685675] audit: type=1326 audit(1689204060.898:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600338.550728] audit: type=1326 audit(1689204085.766:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600339.475173] audit: type=1326 audit(1689204086.690:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=630211 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600346.117313] audit: type=1326 audit(1689204093.330:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600389.332439] audit: type=1326 audit(1689204136.546:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633029 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600413.679225] exe[552330] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.533366] exe[616525] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd58c61ee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600414.845071] exe[553784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:556c0e6c540a cs:33 sp:7ebd587feee8 ax:12 si:ffffffffff600000 di:556c0e731ff2 [11600444.823774] audit: type=1326 audit(1689204192.038:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=628939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600454.783559] audit: type=1326 audit(1689204201.998:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=633825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600460.297963] audit: type=1326 audit(1689204207.510:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=634120 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600501.054928] audit: type=1326 audit(1689204248.270:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600501.459095] audit: type=1326 audit(1689204248.674:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=636052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600522.075266] audit: type=1326 audit(1689204269.290:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600532.895480] audit: type=1326 audit(1689204280.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600542.361069] audit: type=1326 audit(1689204289.574:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600618.878528] audit: type=1326 audit(1689204366.089:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=646857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600662.564294] audit: type=1326 audit(1689204409.777:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=642395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600712.374259] audit: type=1326 audit(1689204459.585:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=644142 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600758.320683] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.381302] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.435987] exe[549955] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600758.460840] exe[547147] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55557d28eb31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:2004400 [11600791.517421] audit: type=1326 audit(1689204538.729:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=647911 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600796.510774] audit: type=1326 audit(1689204543.721:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=643074 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600821.804316] audit: type=1326 audit(1689204569.017:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639053 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600824.112759] audit: type=1326 audit(1689204571.325:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=649500 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600837.837171] audit: type=1326 audit(1689204585.049:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=650926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600838.202708] audit: type=1326 audit(1689204585.413:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=639619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11600862.491741] audit: type=1326 audit(1689204609.705:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635997 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600952.331157] audit: type=1326 audit(1689204699.545:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655568 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11600984.800020] audit: type=1326 audit(1689204732.013:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=658564 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601000.447556] audit: type=1326 audit(1689204747.661:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659232 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601000.483579] audit: type=1326 audit(1689204747.697:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=659242 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601093.169914] audit: type=1326 audit(1689204840.381:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=656730 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601098.482808] audit: type=1326 audit(1689204845.693:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=657512 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601113.225254] audit: type=1326 audit(1689204860.437:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666002 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601141.312313] audit: type=1326 audit(1689204888.525:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601145.359933] audit: type=1326 audit(1689204892.573:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=666990 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601274.291260] audit: type=1326 audit(1689205021.505:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=671926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601306.606072] audit: type=1326 audit(1689205053.816:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674163 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601309.957748] audit: type=1326 audit(1689205057.168:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=674553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601341.904200] audit: type=1326 audit(1689205089.120:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=675836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601352.797313] audit: type=1326 audit(1689205100.012:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601367.443182] audit: type=1326 audit(1689205114.656:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601405.264683] audit: type=1326 audit(1689205152.480:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=678379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601436.248250] audit: type=1326 audit(1689205183.464:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=679261 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601467.634913] audit: type=1326 audit(1689205214.848:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=680833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601505.709842] audit: type=1326 audit(1689205252.924:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681793 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601506.056017] audit: type=1326 audit(1689205253.272:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=681794 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601511.171917] audit: type=1326 audit(1689205258.388:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601597.695181] audit: type=1326 audit(1689205344.908:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=685750 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601628.435570] audit: type=1326 audit(1689205375.652:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687165 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601639.279190] audit: type=1326 audit(1689205386.492:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=693456 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601646.751183] audit: type=1326 audit(1689205393.964:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687780 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601648.323195] audit: type=1326 audit(1689205395.536:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=687910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601704.970538] audit: type=1326 audit(1689205452.184:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601726.438303] audit: type=1326 audit(1689205473.652:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=696962 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601790.231890] audit: type=1326 audit(1689205537.448:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=694256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601870.281316] audit: type=1326 audit(1689205617.496:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601888.842697] audit: type=1326 audit(1689205636.056:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=698719 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601905.721655] audit: type=1326 audit(1689205652.936:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=699618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601947.458397] audit: type=1326 audit(1689205694.672:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700466 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601952.073376] audit: type=1326 audit(1689205699.288:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11601958.768477] audit: type=1326 audit(1689205705.984:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11601988.295493] audit: type=1326 audit(1689205735.508:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=692547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602050.588332] audit: type=1326 audit(1689205797.803:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=706687 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602092.633316] audit: type=1326 audit(1689205839.847:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710024 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602109.458983] audit: type=1326 audit(1689205856.671:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.463185] audit: type=1326 audit(1689205857.675:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711039 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602110.945264] audit: type=1326 audit(1689205858.159:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711022 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602113.494614] audit: type=1326 audit(1689205860.707:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=711578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602167.835209] audit: type=1326 audit(1689205915.047:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705931 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602212.164413] audit: type=1326 audit(1689205959.379:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=719035 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602228.614047] audit: type=1326 audit(1689205975.827:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602251.890213] audit: type=1326 audit(1689205999.103:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=723451 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602263.451544] audit: type=1326 audit(1689206010.663:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=714805 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602274.588673] audit: type=1326 audit(1689206021.803:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=726182 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602370.143134] audit: type=1326 audit(1689206117.355:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602373.347637] audit: type=1326 audit(1689206120.559:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735693 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602393.590611] audit: type=1326 audit(1689206140.803:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=737207 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602422.998822] audit: type=1326 audit(1689206170.211:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602436.005176] audit: type=1326 audit(1689206183.219:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739202 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602484.595155] audit: type=1326 audit(1689206231.807:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602507.546522] audit: type=1326 audit(1689206254.759:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602535.958765] audit: type=1326 audit(1689206283.171:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=742213 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602560.451117] audit: type=1326 audit(1689206307.663:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602579.163230] exe[728877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.244070] exe[732313] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602579.318329] exe[741075] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55989475c40a cs:33 sp:7edf22273ee8 ax:12 si:ffffffffff600000 di:5598947c8ff2 [11602597.777330] audit: type=1326 audit(1689206344.991:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745885 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602603.869164] audit: type=1326 audit(1689206351.083:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754999 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.285215] audit: type=1326 audit(1689206425.499:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=755000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602678.677713] audit: type=1326 audit(1689206425.891:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=743633 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602696.843980] audit: type=1326 audit(1689206444.055:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=753602 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602743.097537] audit: type=1326 audit(1689206490.311:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602743.122326] audit: type=1326 audit(1689206490.311:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602759.499374] audit: type=1326 audit(1689206506.710:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602854.344933] audit: type=1326 audit(1689206601.558:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602859.040813] audit: type=1326 audit(1689206606.254:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=765875 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602884.867590] audit: type=1326 audit(1689206632.078:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=767807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602895.802192] audit: type=1326 audit(1689206643.014:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=750390 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602921.417882] audit: type=1326 audit(1689206668.630:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769293 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11602934.284216] audit: type=1326 audit(1689206681.494:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=763696 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11602998.074154] audit: type=1326 audit(1689206745.286:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=771543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603001.490232] audit: type=1326 audit(1689206748.702:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772848 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603019.886473] exe[728911] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603019.961263] exe[723449] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.012456] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.033883] exe[723112] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f3da57b839 cs:33 sp:7edf5d573ee8 ax:0 si:20000080 di:ffffffffff600000 [11603020.390766] audit: type=1326 audit(1689206767.602:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603082.847524] audit: type=1326 audit(1689206830.058:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=775665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603138.090907] audit: type=1326 audit(1689206885.302:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603172.298141] audit: type=1326 audit(1689206919.510:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=777217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603182.461434] audit: type=1326 audit(1689206929.674:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780255 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603243.896847] audit: type=1326 audit(1689206991.106:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786666 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603279.127507] audit: type=1326 audit(1689207026.338:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=787634 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603309.589653] audit: type=1326 audit(1689207056.802:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774472 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603335.471219] audit: type=1326 audit(1689207082.682:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=788938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603343.797267] audit: type=1326 audit(1689207091.010:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=790140 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603405.836680] audit: type=1326 audit(1689207153.046:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792319 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603420.441739] audit: type=1326 audit(1689207167.654:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603427.753376] audit: type=1326 audit(1689207174.966:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=774364 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603505.176389] audit: type=1326 audit(1689207252.385:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=796183 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603533.829677] audit: type=1326 audit(1689207281.041:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=797063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603562.278422] audit: type=1326 audit(1689207309.489:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603667.052521] audit: type=1326 audit(1689207414.261:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=805774 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603667.905373] audit: type=1326 audit(1689207415.113:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807621 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603676.505802] audit: type=1326 audit(1689207423.717:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603684.820900] audit: type=1326 audit(1689207432.029:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=793728 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603795.965747] audit: type=1326 audit(1689207543.177:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=812556 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603804.637990] audit: type=1326 audit(1689207551.849:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603810.551130] audit: type=1326 audit(1689207557.761:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603820.309874] audit: type=1326 audit(1689207567.521:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=811185 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603836.504336] audit: type=1326 audit(1689207583.713:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=800972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603841.793876] audit: type=1326 audit(1689207589.005:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603870.199020] audit: type=1326 audit(1689207617.409:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603951.796356] audit: type=1326 audit(1689207699.005:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=816857 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11603957.195581] audit: type=1326 audit(1689207704.405:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817252 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11603991.129069] audit: type=1326 audit(1689207738.337:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604091.585729] audit: type=1326 audit(1689207838.793:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604093.722432] audit: type=1326 audit(1689207840.933:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=821440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604119.143756] audit: type=1326 audit(1689207866.353:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=822836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604204.469045] audit: type=1326 audit(1689207951.676:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=817690 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604217.655924] audit: type=1326 audit(1689207964.864:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818547 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604224.651590] audit: type=1326 audit(1689207971.860:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604234.352201] audit: type=1326 audit(1689207981.564:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604235.997704] audit: type=1326 audit(1689207983.208:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826343 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604256.614441] audit: type=1326 audit(1689208003.828:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831317 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604263.313503] audit: type=1326 audit(1689208010.524:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604308.646673] audit: type=1326 audit(1689208055.860:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831393 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604427.403379] audit: type=1326 audit(1689208174.616:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=833669 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604450.026228] audit: type=1326 audit(1689208197.240:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=834371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604459.830108] audit: type=1326 audit(1689208207.040:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604476.678391] audit: type=1326 audit(1689208223.892:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=829944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604506.595388] audit: type=1326 audit(1689208253.808:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=836737 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604536.910472] audit: type=1326 audit(1689208284.124:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824480 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604588.801578] audit: type=1326 audit(1689208336.012:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604590.878115] audit: type=1326 audit(1689208338.088:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=840555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604613.330191] audit: type=1326 audit(1689208360.540:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=849945 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604648.014559] audit: type=1326 audit(1689208395.228:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844081 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604655.910760] audit: type=1326 audit(1689208403.124:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604731.191216] audit: type=1326 audit(1689208478.404:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=841978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604750.453981] audit: type=1326 audit(1689208497.664:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850369 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604790.297089] audit: type=1326 audit(1689208537.508:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=851838 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604911.917454] audit: type=1326 audit(1689208659.128:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=855574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11604932.248331] audit: type=1326 audit(1689208679.459:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856349 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11604979.039220] audit: type=1326 audit(1689208726.251:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=854027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605001.217428] audit: type=1326 audit(1689208748.427:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605004.825105] audit: type=1326 audit(1689208752.035:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=850698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605073.388168] audit: type=1326 audit(1689208820.599:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605073.905125] audit: type=1326 audit(1689208821.115:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=861403 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605096.082181] audit: type=1326 audit(1689208843.291:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865622 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605129.878423] audit: type=1326 audit(1689208877.087:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=866278 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605177.031421] audit: type=1326 audit(1689208924.243:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=865008 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605235.963087] exe[867632] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559bc192d40a cs:33 sp:7f06f0682ee8 ax:12 si:ffffffffff600000 di:559bc1999ff2 [11605242.250840] audit: type=1326 audit(1689208989.459:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=863306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11605259.396277] exe[729169] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.444946] exe[734784] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605259.493436] exe[735065] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56357af8940a cs:33 sp:7ee774990ee8 ax:12 si:ffffffffff600000 di:56357aff5ff2 [11605345.057961] audit: type=1326 audit(1689209092.267:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=867457 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605366.290442] audit: type=1326 audit(1689209113.499:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=872748 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605379.568477] audit: type=1326 audit(1689209126.779:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=868919 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605400.381802] audit: type=1326 audit(1689209147.591:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605499.168636] audit: type=1326 audit(1689209246.379:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=873036 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605641.112938] audit: type=1326 audit(1689209388.322:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=878736 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605650.594619] audit: type=1326 audit(1689209397.802:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879055 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605769.011148] audit: type=1326 audit(1689209516.218:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897739 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605783.192934] audit: type=1326 audit(1689209530.402:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=888577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605785.006125] audit: type=1326 audit(1689209532.214:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=874679 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605792.566409] audit: type=1326 audit(1689209539.774:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=899333 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605803.584285] audit: type=1326 audit(1689209550.794:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605917.107175] audit: type=1326 audit(1689209664.314:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=900168 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11605999.175587] audit: type=1326 audit(1689209746.386:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=903724 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606057.989861] audit: type=1326 audit(1689209805.198:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=908771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606081.023977] audit: type=1326 audit(1689209828.234:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901681 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606081.049199] audit: type=1326 audit(1689209828.234:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=901680 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606140.480349] audit: type=1326 audit(1689209887.690:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606161.551475] audit: type=1326 audit(1689209908.758:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606199.187532] audit: type=1326 audit(1689209946.394:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=916010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606218.913397] audit: type=1326 audit(1689209966.122:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922661 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606232.077547] audit: type=1326 audit(1689209979.282:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=923826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606380.343966] audit: type=1326 audit(1689210127.553:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922822 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606411.655428] audit: type=1326 audit(1689210158.861:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927181 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606523.891076] audit: type=1326 audit(1689210271.097:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931063 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606544.833841] audit: type=1326 audit(1689210292.041:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=932874 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606553.082384] audit: type=1326 audit(1689210300.289:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=934463 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606576.113741] audit: type=1326 audit(1689210323.321:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606603.669625] audit: type=1326 audit(1689210350.877:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918032 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606666.104511] audit: type=1326 audit(1689210413.313:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=938428 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606700.273078] audit: type=1326 audit(1689210447.481:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=922650 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606722.409710] audit: type=1326 audit(1689210469.617:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=944587 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606723.591484] audit: type=1326 audit(1689210470.797:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918004 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11606726.625428] audit: type=1326 audit(1689210473.833:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=925543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606749.842751] audit: type=1326 audit(1689210497.049:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606774.216268] audit: type=1326 audit(1689210521.421:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946755 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606775.272993] audit: type=1326 audit(1689210522.481:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946844 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606808.022043] audit: type=1326 audit(1689210555.229:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=942712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606825.235825] audit: type=1326 audit(1689210572.441:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=943616 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606903.854733] audit: type=1326 audit(1689210651.061:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=951196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11606950.408866] audit: type=1326 audit(1689210697.617:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=949230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607046.030686] audit: type=1326 audit(1689210793.237:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=955433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607082.153088] audit: type=1326 audit(1689210829.361:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963715 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607091.177801] audit: type=1326 audit(1689210838.384:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607204.949220] audit: type=1326 audit(1689210952.160:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=961511 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607214.149455] audit: type=1326 audit(1689210961.360:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607234.203101] audit: type=1326 audit(1689210981.412:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=965279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607246.591122] audit: type=1326 audit(1689210993.800:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607346.908337] audit: type=1326 audit(1689211094.116:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607347.810535] audit: type=1326 audit(1689211095.020:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=976275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607373.022204] audit: type=1326 audit(1689211120.232:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607377.243731] audit: type=1326 audit(1689211124.452:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607487.048913] audit: type=1326 audit(1689211234.256:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946299 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607489.734138] audit: type=1326 audit(1689211236.944:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607499.561410] audit: type=1326 audit(1689211246.772:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=969537 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607519.191537] audit: type=1326 audit(1689211266.400:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979626 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607624.457049] audit: type=1326 audit(1689211371.664:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=985128 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607631.705291] audit: type=1326 audit(1689211378.916:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=983126 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607638.204050] audit: type=1326 audit(1689211385.412:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979517 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607751.083724] audit: type=1326 audit(1689211498.292:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989206 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607766.193883] audit: type=1326 audit(1689211513.404:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607770.820805] audit: type=1326 audit(1689211518.028:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=972203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607889.548013] audit: type=1326 audit(1689211636.755:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=995356 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607890.272191] audit: type=1326 audit(1689211637.479:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984084 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11607892.217788] audit: type=1326 audit(1689211639.427:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=994449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607973.414133] audit: type=1326 audit(1689211720.623:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2977 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11607997.840992] audit: type=1326 audit(1689211745.047:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608009.823096] exe[880088] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.862814] exe[908958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7e9858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608009.905875] exe[880060] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5567c3cf3839 cs:33 sp:7ea2ec7a7858 ax:0 si:5567c3d4c062 di:ffffffffff600000 [11608031.274871] audit: type=1326 audit(1689211778.483:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998191 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608034.038701] audit: type=1326 audit(1689211781.247:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998422 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608075.873755] audit: type=1326 audit(1689211823.083:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608174.269361] audit: type=1326 audit(1689211921.475:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=6993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608175.997697] audit: type=1326 audit(1689211923.203:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608317.934996] audit: type=1326 audit(1689212065.143:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16671 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608318.010584] audit: type=1326 audit(1689212065.219:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16326 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608345.573784] audit: type=1326 audit(1689212092.779:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11133 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608451.296340] audit: type=1326 audit(1689212198.503:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=29829 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608460.035472] audit: type=1326 audit(1689212207.243:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608462.176738] audit: type=1326 audit(1689212209.383:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=25141 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608503.267767] audit: type=1326 audit(1689212250.475:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=34498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608533.390892] audit: type=1326 audit(1689212280.598:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=999989 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608586.343765] audit: type=1326 audit(1689212333.550:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11132 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608603.172815] audit: type=1326 audit(1689212350.378:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608604.375648] audit: type=1326 audit(1689212351.582:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=31518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608625.227797] audit: type=1326 audit(1689212372.434:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40856 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608653.653041] audit: type=1326 audit(1689212400.858:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996310 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11608746.810007] audit: type=1326 audit(1689212494.014:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=40920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608759.068622] audit: type=1326 audit(1689212506.274:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=41674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608844.060417] audit: type=1326 audit(1689212591.266:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=47509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608849.979155] audit: type=1326 audit(1689212597.186:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=26927 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608866.192620] audit: type=1326 audit(1689212613.398:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=50432 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11608900.419588] audit: type=1326 audit(1689212647.626:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=48313 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609041.941064] audit: type=1326 audit(1689212789.146:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=43723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609043.267962] audit: type=1326 audit(1689212790.474:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=51808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609101.039399] exe[19846] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.200826] exe[42029] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857168ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.233088] exe[21925] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609101.359654] exe[14202] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b4a67a2839 cs:33 sp:7fd857147ee8 ax:0 si:200000c0 di:ffffffffff600000 [11609114.859756] audit: type=1326 audit(1689212862.066:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=53392 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609136.468568] audit: type=1326 audit(1689212883.674:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63106 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609184.539557] audit: type=1326 audit(1689212931.746:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=55835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609224.389789] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.508861] exe[66337] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.664605] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.692561] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.721718] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.758715] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.820055] exe[60252] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.852642] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.874621] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609224.926286] exe[60263] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20001980 di:ffffffffff600000 [11609296.412170] audit: type=1326 audit(1689213043.617:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=38807 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609346.942415] audit: type=1326 audit(1689213094.145:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67199 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609386.199827] audit: type=1326 audit(1689213133.405:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=70379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609407.497500] audit: type=1326 audit(1689213154.701:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=80674 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609489.512442] audit: type=1326 audit(1689213236.717:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=78397 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609536.734812] audit: type=1326 audit(1689213283.937:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609540.467947] audit: type=1326 audit(1689213287.673:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=82162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609578.029249] audit: type=1326 audit(1689213325.233:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94920 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11609580.700973] audit: type=1326 audit(1689213327.905:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95574 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609630.673391] audit: type=1326 audit(1689213377.877:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609672.894466] audit: type=1326 audit(1689213420.097:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609673.764769] audit: type=1326 audit(1689213420.969:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=56076 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609682.185992] audit: type=1326 audit(1689213429.389:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=93458 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609689.245620] audit: type=1326 audit(1689213436.449:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=39787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609704.620136] audit: type=1326 audit(1689213451.825:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=103151 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609718.303851] audit: type=1326 audit(1689213465.509:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609732.024113] audit: type=1326 audit(1689213479.229:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609746.654594] audit: type=1326 audit(1689213493.857:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609891.802556] audit: type=1326 audit(1689213639.005:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=107746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11609980.959613] audit: type=1326 audit(1689213728.164:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111400 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610037.921958] warn_bad_vsyscall: 57 callbacks suppressed [11610037.921961] exe[104886] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557cf1f3e40a cs:33 sp:7f9740193ee8 ax:12 si:ffffffffff600000 di:557cf1faaff2 [11610091.078793] audit: type=1326 audit(1689213838.284:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=114972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610124.942162] audit: type=1326 audit(1689213872.148:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=115939 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610177.285395] audit: type=1326 audit(1689213924.492:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102441 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610193.441605] audit: type=1326 audit(1689213940.648:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610225.810101] audit: type=1326 audit(1689213973.016:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=123167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610233.553409] audit: type=1326 audit(1689213980.760:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610256.024194] audit: type=1326 audit(1689214003.232:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610300.269297] audit: type=1326 audit(1689214047.476:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=76644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610367.800104] audit: type=1326 audit(1689214115.008:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=128262 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610392.269170] audit: type=1326 audit(1689214139.476:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610463.704357] audit: type=1326 audit(1689214210.912:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610509.525530] audit: type=1326 audit(1689214256.732:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=133363 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610534.233051] audit: type=1326 audit(1689214281.440:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610535.552490] audit: type=1326 audit(1689214282.760:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=102360 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610558.818901] audit: type=1326 audit(1689214306.024:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138968 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610563.001154] audit: type=1326 audit(1689214310.208:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125930 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610652.067752] audit: type=1326 audit(1689214399.272:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=137958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610675.976391] audit: type=1326 audit(1689214423.180:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610794.201252] audit: type=1326 audit(1689214541.407:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146110 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610817.416788] audit: type=1326 audit(1689214564.623:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=147787 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610824.164743] audit: type=1326 audit(1689214571.371:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=132652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11610917.045624] audit: type=1326 audit(1689214664.247:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155879 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610935.100843] audit: type=1326 audit(1689214682.307:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154665 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11610957.386648] audit: type=1326 audit(1689214704.591:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160285 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611044.973755] audit: type=1326 audit(1689214792.179:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=104427 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611052.355082] exe[161359] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.396817] exe[161402] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.417215] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9fe858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611052.458817] exe[161406] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564cba4b6839 cs:33 sp:7eeecb9dd858 ax:0 si:564cba50f097 di:ffffffffff600000 [11611057.686547] audit: type=1326 audit(1689214804.891:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159476 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611080.561894] audit: type=1326 audit(1689214827.767:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162305 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611091.751769] audit: type=1326 audit(1689214838.955:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=163210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611106.510657] audit: type=1326 audit(1689214853.715:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=164175 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611206.621679] audit: type=1326 audit(1689214953.827:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611226.105804] audit: type=1326 audit(1689214973.311:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157532 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611328.860902] audit: type=1326 audit(1689215076.067:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=136219 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611349.685728] audit: type=1326 audit(1689215096.891:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166089 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611355.989960] audit: type=1326 audit(1689215103.195:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=166685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611470.897001] exe[173131] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611470.982692] exe[172685] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611471.068495] exe[172788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d1fe58b839 cs:33 sp:7f08fad43858 ax:0 si:55d1fe5e4062 di:ffffffffff600000 [11611491.624312] audit: type=1326 audit(1689215238.826:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611498.281194] audit: type=1326 audit(1689215245.486:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=171656 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611545.887586] audit: type=1326 audit(1689215293.090:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=140912 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611556.965422] audit: type=1326 audit(1689215304.170:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=127798 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11611636.098091] audit: type=1326 audit(1689215383.302:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611641.171130] audit: type=1326 audit(1689215388.374:769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176464 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611712.598686] audit: type=1326 audit(1689215459.802:770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=170100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611779.405216] audit: type=1326 audit(1689215526.606:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=183629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611784.275845] audit: type=1326 audit(1689215531.478:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611807.175705] audit: type=1326 audit(1689215554.378:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139924 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611845.278909] exe[175719] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.131823] exe[175495] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.132343] exe[62220] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d6cee8 ax:0 si:20000700 di:ffffffffff600000 [11611846.255247] exe[192224] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563eb644a839 cs:33 sp:7f9c97d8dee8 ax:0 si:20000700 di:ffffffffff600000 [11611865.951902] exe[193267] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96258cee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.843870] exe[194427] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611866.849440] exe[193278] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.684536] exe[193231] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96256bee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611867.685047] exe[193276] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55699d07b40a cs:33 sp:7fc96254aee8 ax:12 si:ffffffffff600000 di:55699d0e7ff2 [11611923.773068] audit: type=1326 audit(1689215670.974:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192078 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611927.131634] audit: type=1326 audit(1689215674.334:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=192265 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11611946.855512] audit: type=1326 audit(1689215694.058:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612069.445142] audit: type=1326 audit(1689215816.646:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=199539 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612092.184084] audit: type=1326 audit(1689215839.386:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205940 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612109.628298] audit: type=1326 audit(1689215856.830:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=167586 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612169.655524] audit: type=1326 audit(1689215916.857:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=179867 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612196.158283] audit: type=1326 audit(1689215943.361:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=205282 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612321.757529] audit: type=1326 audit(1689216068.961:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=181741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612338.198911] audit: type=1326 audit(1689216085.401:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210033 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612341.930437] audit: type=1326 audit(1689216089.133:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=210184 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612480.723412] audit: type=1326 audit(1689216227.925:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612484.182272] audit: type=1326 audit(1689216231.385:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215515 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612623.704171] audit: type=1326 audit(1689216370.905:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219810 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612627.491761] audit: type=1326 audit(1689216374.693:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=219947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612650.811661] audit: type=1326 audit(1689216398.017:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612725.881937] audit: type=1326 audit(1689216473.081:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=215502 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11612768.073479] audit: type=1326 audit(1689216515.273:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=222552 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612911.907957] exe[230755] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55784c9cc40a cs:33 sp:7f8d98f46ee8 ax:12 si:ffffffffff600000 di:55784ca38ff2 [11612912.026179] audit: type=1326 audit(1689216659.232:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229411 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612928.029305] audit: type=1326 audit(1689216675.232:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=228871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11612933.884371] audit: type=1326 audit(1689216681.088:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613007.977947] audit: type=1326 audit(1689216755.180:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=242949 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613034.707467] exe[210137] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55ed66be340a cs:33 sp:7fd40805cee8 ax:12 si:ffffffffff600000 di:55ed66c4fff2 [11613067.683364] audit: type=1326 audit(1689216814.888:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613090.757129] audit: type=1326 audit(1689216837.960:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246266 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613156.842452] audit: type=1326 audit(1689216904.048:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=162031 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613176.892347] audit: type=1326 audit(1689216924.096:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=187836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613225.327240] audit: type=1326 audit(1689216972.532:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=246495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613257.820594] audit: type=1326 audit(1689217005.024:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248201 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613259.764460] exe[113089] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.896766] exe[129485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613259.994509] exe[113108] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613260.035649] exe[167068] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:560f4eadb839 cs:33 sp:7ec9bdfcdee8 ax:0 si:200000c0 di:ffffffffff600000 [11613367.064209] audit: type=1326 audit(1689217114.268:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=257164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613389.920266] audit: type=1326 audit(1689217137.124:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=265247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613400.171681] audit: type=1326 audit(1689217147.376:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=261413 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613423.461311] audit: type=1326 audit(1689217170.664:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=267746 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613556.820936] audit: type=1326 audit(1689217304.024:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=269567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613639.322076] audit: type=1326 audit(1689217386.523:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=271970 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613662.359245] audit: type=1326 audit(1689217409.563:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=279508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613699.545408] audit: type=1326 audit(1689217446.747:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=274933 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613729.742873] audit: type=1326 audit(1689217476.947:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11613758.457839] audit: type=1326 audit(1689217505.659:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=208877 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613841.828755] audit: type=1326 audit(1689217589.031:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=280663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613865.039411] audit: type=1326 audit(1689217612.243:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=285941 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613909.215817] exe[280649] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613909.285023] exe[281621] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613910.102687] exe[280647] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fe261bc839 cs:33 sp:7ef570ac7858 ax:0 si:55fe26215070 di:ffffffffff600000 [11613911.927175] audit: type=1326 audit(1689217659.131:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=283958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613926.880021] audit: type=1326 audit(1689217674.083:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=250982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613951.214334] audit: type=1326 audit(1689217698.415:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11613994.384142] audit: type=1326 audit(1689217741.587:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=289847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614054.357636] audit: type=1326 audit(1689217801.559:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=287127 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614197.565657] audit: type=1326 audit(1689217944.767:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=293965 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614243.930801] audit: type=1326 audit(1689217991.131:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=295865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614340.962187] audit: type=1326 audit(1689218088.162:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=300981 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614378.700022] audit: type=1326 audit(1689218125.902:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=302653 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614436.168021] audit: type=1326 audit(1689218183.370:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=306526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614488.028688] audit: type=1326 audit(1689218235.230:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=311362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614531.437813] audit: type=1326 audit(1689218278.638:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=313198 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614546.864834] audit: type=1326 audit(1689218294.066:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614567.377282] audit: type=1326 audit(1689218314.578:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=299618 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614623.636542] audit: type=1326 audit(1689218370.838:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=315967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614629.720322] audit: type=1326 audit(1689218376.922:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=316747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614697.032081] audit: type=1326 audit(1689218444.234:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319591 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614708.565361] audit: type=1326 audit(1689218455.766:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=321370 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614725.059201] audit: type=1326 audit(1689218472.258:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614725.083797] audit: type=1326 audit(1689218472.270:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=323371 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614763.316197] audit: type=1326 audit(1689218510.518:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=328052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614783.657848] audit: type=1326 audit(1689218530.858:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=329235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.377379] audit: type=1326 audit(1689218572.578:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331215 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614825.954441] audit: type=1326 audit(1689218573.154:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331274 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614826.473984] audit: type=1326 audit(1689218573.674:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=331273 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614849.192210] audit: type=1326 audit(1689218596.394:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347434 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614869.432839] audit: type=1326 audit(1689218616.634:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339235 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614904.547842] audit: type=1326 audit(1689218651.746:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11614919.904813] audit: type=1326 audit(1689218667.106:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344659 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11614989.331061] audit: type=1326 audit(1689218736.530:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=339164 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615026.778194] audit: type=1326 audit(1689218773.978:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=342623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615046.792010] audit: type=1326 audit(1689218793.989:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=353766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615075.957721] audit: type=1326 audit(1689218823.157:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=355648 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615092.070251] audit: type=1326 audit(1689218839.269:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=356959 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615105.006673] audit: type=1326 audit(1689218852.205:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=338914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615115.088959] audit: type=1326 audit(1689218862.289:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=374087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615140.436699] audit: type=1326 audit(1689218887.637:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=379563 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615189.321653] audit: type=1326 audit(1689218936.521:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=369018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615249.883397] audit: type=1326 audit(1689218997.081:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=377300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615278.181181] audit: type=1326 audit(1689219025.381:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=365614 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615285.687507] audit: type=1326 audit(1689219032.885:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383294 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615334.361923] audit: type=1326 audit(1689219081.561:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=386918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615358.021042] audit: type=1326 audit(1689219105.221:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=397046 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615372.830891] audit: type=1326 audit(1689219120.029:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615392.629913] audit: type=1326 audit(1689219139.829:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=391869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615418.819110] audit: type=1326 audit(1689219166.017:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=383910 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615534.998711] audit: type=1326 audit(1689219282.197:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400105 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615536.639688] audit: type=1326 audit(1689219283.837:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=400210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.252941] audit: type=1326 audit(1689219319.453:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=407652 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615572.566380] audit: type=1326 audit(1689219319.765:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=402658 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615607.239874] audit: type=1326 audit(1689219354.437:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=404197 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615682.174935] audit: type=1326 audit(1689219429.373:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=395486 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615749.676438] audit: type=1326 audit(1689219496.873:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=409554 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615772.856758] audit: type=1326 audit(1689219520.056:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=415966 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615782.603424] audit: type=1326 audit(1689219529.800:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=393960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11615837.996675] audit: type=1326 audit(1689219585.196:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414088 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.905148] audit: type=1326 audit(1689219603.108:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615855.959406] audit: type=1326 audit(1689219603.160:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=414743 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11615907.170690] audit: type=1326 audit(1689219654.372:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616016.968741] audit: type=1326 audit(1689219764.168:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419234 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616018.174727] audit: type=1326 audit(1689219765.376:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=419205 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616049.790873] audit: type=1326 audit(1689219796.992:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=420016 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616179.467941] audit: type=1326 audit(1689219926.668:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616180.555813] audit: type=1326 audit(1689219927.756:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423518 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616192.430465] audit: type=1326 audit(1689219939.632:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=423958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616204.730256] audit: type=1326 audit(1689219951.932:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426323 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616215.467880] audit: type=1326 audit(1689219962.668:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426686 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616342.057416] audit: type=1326 audit(1689220089.260:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616344.197343] audit: type=1326 audit(1689220091.400:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427038 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616349.922513] audit: type=1326 audit(1689220097.124:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=427482 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616463.003124] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117536ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.155216] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec1174f4ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.334664] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.365978] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.395492] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.434812] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.469559] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.499013] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.528098] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.559286] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55a161690839 cs:33 sp:7ec117515ee8 ax:0 si:20000240 di:ffffffffff600000 [11616463.856088] audit: type=1326 audit(1689220211.056:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=433896 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616468.036730] warn_bad_vsyscall: 56 callbacks suppressed [11616468.036733] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.143022] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.346868] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.476775] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.602391] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616468.747206] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:0 di:ffffffffff600000 [11616468.905526] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.069465] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.228264] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616469.373763] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55774d087839 cs:33 sp:7ef3ac5feee8 ax:0 si:20000240 di:ffffffffff600000 [11616478.212932] audit: type=1326 audit(1689220225.412:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=399179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616486.892502] audit: type=1326 audit(1689220234.092:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616504.636883] audit: type=1326 audit(1689220251.835:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616506.387296] audit: type=1326 audit(1689220253.587:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=434742 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616618.325394] audit: type=1326 audit(1689220365.523:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437309 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616624.272672] audit: type=1326 audit(1689220371.471:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616641.156448] audit: type=1326 audit(1689220388.355:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616646.887273] audit: type=1326 audit(1689220394.087:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=416646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616669.130945] audit: type=1326 audit(1689220416.331:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439543 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616671.357319] audit: type=1326 audit(1689220418.555:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=439483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616685.822247] audit: type=1326 audit(1689220433.023:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=426318 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616727.733883] warn_bad_vsyscall: 14 callbacks suppressed [11616727.733887] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.854758] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616727.896011] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.024074] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.060517] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.174456] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.285948] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.286187] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.433658] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616728.542871] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.745666] warn_bad_vsyscall: 149 callbacks suppressed [11616732.745670] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.778992] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.807892] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.837387] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.866886] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616732.895047] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.005828] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.156311] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.302872] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616733.344866] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.937508] warn_bad_vsyscall: 156 callbacks suppressed [11616737.937511] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616737.978420] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.107496] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.221153] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.332316] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.371403] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.516981] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.646772] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.793750] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616738.925501] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616742.938460] warn_bad_vsyscall: 95 callbacks suppressed [11616742.938463] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.139113] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.249995] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.287426] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.799359] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616743.961896] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.123243] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.277308] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.579977] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616744.680400] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.059194] warn_bad_vsyscall: 179 callbacks suppressed [11616748.059198] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.099340] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.218641] exe[376125] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.353244] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.514493] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.675188] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616748.816625] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616748.957631] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.061746] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000000 di:ffffffffff600000 [11616749.178713] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.071882] warn_bad_vsyscall: 129 callbacks suppressed [11616753.071903] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.188917] exe[376189] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.305604] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.308145] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.434246] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.463792] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000040 di:ffffffffff600000 [11616753.573550] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.690786] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616753.948656] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616754.057794] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.088841] warn_bad_vsyscall: 69 callbacks suppressed [11616758.088845] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.198407] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.325846] exe[385773] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.452371] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.611864] exe[376121] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616758.848362] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.023674] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.223697] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.378129] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616759.414350] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.247975] warn_bad_vsyscall: 67 callbacks suppressed [11616763.247978] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.379531] exe[392352] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.506568] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.576974] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.712296] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616763.868809] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.012072] exe[436566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.044986] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.075153] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616764.105612] exe[376176] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.632673] warn_bad_vsyscall: 72 callbacks suppressed [11616768.632677] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.764563] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.797201] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.945297] exe[376116] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616768.977094] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.105815] exe[445097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.219603] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.319274] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.446879] exe[392788] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616769.586043] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.407661] warn_bad_vsyscall: 20 callbacks suppressed [11616774.407665] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.443917] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.480792] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.515412] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.549287] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.577325] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.615687] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.650789] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.680564] exe[376212] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616774.712742] exe[376126] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.732922] warn_bad_vsyscall: 59 callbacks suppressed [11616779.732927] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616779.873482] exe[376099] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.015511] exe[385825] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.144019] exe[376140] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.148245] exe[385826] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.292227] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a53ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.408584] exe[436890] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.554021] exe[376100] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.587092] exe[376175] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a32ee8 ax:0 si:20000240 di:ffffffffff600000 [11616780.707671] exe[376145] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55cf154e1839 cs:33 sp:7ecaa4a74ee8 ax:0 si:20000240 di:ffffffffff600000 [11616831.354738] audit: type=1326 audit(1689220578.555:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616849.536866] audit: type=1326 audit(1689220596.735:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=431018 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616891.400048] audit: type=1326 audit(1689220638.599:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=445340 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11616955.867342] audit: type=1326 audit(1689220703.067:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444368 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11616993.610115] audit: type=1326 audit(1689220740.811:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448725 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617027.425260] warn_bad_vsyscall: 1 callbacks suppressed [11617027.425263] exe[423335] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559734aa5839 cs:33 sp:7f1166de5ee8 ax:0 si:20000240 di:ffffffffff600000 [11617031.423364] audit: type=1326 audit(1689220778.623:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442960 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617034.068901] audit: type=1326 audit(1689220781.267:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=450336 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617036.395177] exe[403877] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b2071a9839 cs:33 sp:7f1205849ee8 ax:0 si:20000240 di:ffffffffff600000 [11617110.112230] exe[450940] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:563710d72839 cs:33 sp:7fb6768c9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617120.897024] audit: type=1326 audit(1689220868.095:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=452760 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617155.771686] audit: type=1326 audit(1689220902.971:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617163.858912] audit: type=1326 audit(1689220911.059:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=456904 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617173.909893] audit: type=1326 audit(1689220921.107:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=359483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617177.166434] audit: type=1326 audit(1689220924.363:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453803 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617199.530594] audit: type=1326 audit(1689220946.731:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458135 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617242.071168] exe[456653] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d54535f839 cs:33 sp:7fddbdecbee8 ax:0 si:20000240 di:ffffffffff600000 [11617242.806185] exe[452415] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f7ccdb9839 cs:33 sp:7f37b6bf9ee8 ax:0 si:20000240 di:ffffffffff600000 [11617285.999616] exe[453136] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55772e5b8839 cs:33 sp:7ea5ab3feee8 ax:0 si:20000240 di:ffffffffff600000 [11617310.725595] exe[352485] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:564403af1839 cs:33 sp:7fe27b9feee8 ax:0 si:20000240 di:ffffffffff600000 [11617320.633665] audit: type=1326 audit(1689221067.830:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458087 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617333.963647] audit: type=1326 audit(1689221081.162:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=458926 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617344.534053] exe[456677] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:561b6142f839 cs:33 sp:7fcfb7eebee8 ax:0 si:20000240 di:ffffffffff600000 [11617407.485335] audit: type=1326 audit(1689221154.682:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617407.510562] audit: type=1326 audit(1689221154.682:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=462220 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617450.603853] audit: type=1326 audit(1689221197.802:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=444772 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617458.156564] exe[464010] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55932fcf1839 cs:33 sp:7fadc19c2ee8 ax:0 si:20000240 di:ffffffffff600000 [11617470.363479] exe[373491] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56224fbf2839 cs:33 sp:7f9f309ccee8 ax:0 si:20000240 di:ffffffffff600000 [11617473.971610] audit: type=1326 audit(1689221221.170:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=448685 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617475.605465] exe[461182] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796b1a858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.707828] exe[462051] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617475.818558] exe[462052] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55dd7a812839 cs:33 sp:7fd796ad8858 ax:0 si:55dd7a86b062 di:ffffffffff600000 [11617485.057212] audit: type=1326 audit(1689221232.254:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463642 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617570.056481] audit: type=1326 audit(1689221317.254:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=465697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617597.277555] audit: type=1326 audit(1689221344.474:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=463449 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617616.134916] exe[368535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b36f85f839 cs:33 sp:7ecb96446ee8 ax:0 si:20000240 di:ffffffffff600000 [11617648.439900] audit: type=1326 audit(1689221395.638:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=467841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617678.970527] audit: type=1326 audit(1689221426.166:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=457982 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617700.643689] audit: type=1326 audit(1689221447.842:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470993 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617732.017925] audit: type=1326 audit(1689221479.214:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469314 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617738.589958] audit: type=1326 audit(1689221485.786:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466971 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617740.351068] audit: type=1326 audit(1689221487.550:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=469544 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617792.775079] exe[470535] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55f93a6ea839 cs:33 sp:7ea8e19feee8 ax:0 si:20000240 di:ffffffffff600000 [11617809.463896] audit: type=1326 audit(1689221556.662:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=470733 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617812.958637] exe[473479] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5578a49e9839 cs:33 sp:7f4af18abee8 ax:0 si:20000240 di:ffffffffff600000 [11617850.443757] audit: type=1326 audit(1689221597.642:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476094 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617882.299739] audit: type=1326 audit(1689221629.498:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472723 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11617893.147005] audit: type=1326 audit(1689221640.346:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=473353 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617934.186694] audit: type=1326 audit(1689221681.382:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11617983.641154] audit: type=1326 audit(1689221730.833:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=476496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618007.754035] exe[479109] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557bc7088839 cs:33 sp:7f115bb4aee8 ax:0 si:20000240 di:ffffffffff600000 [11618023.408403] exe[477266] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.501534] exe[471958] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618023.601684] exe[471707] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5580b5e0040a cs:33 sp:7f230e0caee8 ax:12 si:ffffffffff600000 di:5580b5e6cff2 [11618024.400520] audit: type=1326 audit(1689221771.597:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=477359 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618074.174434] audit: type=1326 audit(1689221821.369:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=478483 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618146.086115] audit: type=1326 audit(1689221893.281:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=480365 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618165.619972] audit: type=1326 audit(1689221912.817:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=482007 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.009828] audit: type=1326 audit(1689221982.205:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=437493 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618235.035898] audit: type=1326 audit(1689221982.233:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=485075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618257.120281] audit: type=1326 audit(1689222004.317:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488337 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618306.553982] audit: type=1326 audit(1689222053.749:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618309.160749] audit: type=1326 audit(1689222056.357:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=486567 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618328.009567] audit: type=1326 audit(1689222075.205:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=491196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618396.215364] audit: type=1326 audit(1689222143.413:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618458.057109] audit: type=1326 audit(1689222205.253:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=492301 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618471.167306] audit: type=1326 audit(1689222218.365:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=493625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618558.971085] audit: type=1326 audit(1689222306.165:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=498306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618599.005616] audit: type=1326 audit(1689222346.201:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=500998 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618614.605767] audit: type=1326 audit(1689222361.801:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=471350 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618616.160870] audit: type=1326 audit(1689222363.357:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=453695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618632.621352] audit: type=1326 audit(1689222379.817:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=502952 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618740.688253] audit: type=1326 audit(1689222487.888:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=511011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618794.782232] audit: type=1326 audit(1689222541.980:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=516208 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618828.244900] audit: type=1326 audit(1689222575.444:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=442795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618883.250327] audit: type=1326 audit(1689222630.448:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=527662 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618905.654237] audit: type=1326 audit(1689222652.852:952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=539741 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11618955.994306] audit: type=1326 audit(1689222703.192:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=535791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618991.070845] audit: type=1326 audit(1689222738.268:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=538243 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11618995.914657] exe[531498] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae92ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.576485] exe[545055] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618996.698654] exe[515605] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55740d69c839 cs:33 sp:7fc25ae71ee8 ax:0 si:20000500 di:ffffffffff600000 [11618998.466088] audit: type=1326 audit(1689222745.664:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=545946 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619039.105891] audit: type=1326 audit(1689222786.304:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=540251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619081.481628] audit: type=1326 audit(1689222828.680:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=472579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619132.788973] audit: type=1326 audit(1689222879.988:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=546430 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619169.205197] audit: type=1326 audit(1689222916.404:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=552581 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619181.529368] audit: type=1326 audit(1689222928.728:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=548478 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619204.740432] audit: type=1326 audit(1689222951.940:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=554938 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619231.628546] audit: type=1326 audit(1689222978.828:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=488720 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619294.278304] audit: type=1326 audit(1689223041.476:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=466747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11619302.932977] audit: type=1326 audit(1689223050.132:964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=553420 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619324.619811] audit: type=1326 audit(1689223071.816:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619336.253946] audit: type=1326 audit(1689223083.452:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560808 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619398.879385] exe[536155] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.939422] exe[516375] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619398.982844] exe[535671] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562d70706839 cs:33 sp:7eb2e16b5858 ax:0 si:562d7075f070 di:ffffffffff600000 [11619453.791031] audit: type=1326 audit(1689223200.987:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619465.706772] audit: type=1326 audit(1689223212.903:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=550448 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619487.423938] exe[566400] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563c4858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.482399] exe[562461] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619487.528570] exe[563319] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55deab428839 cs:33 sp:7ea2563a3858 ax:0 si:55deab481062 di:ffffffffff600000 [11619585.499945] audit: type=1326 audit(1689223332.695:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565379 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619596.902218] audit: type=1326 audit(1689223344.099:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=565827 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619607.979102] audit: type=1326 audit(1689223355.175:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=571806 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619689.631929] audit: type=1326 audit(1689223436.827:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=572275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619831.695309] audit: type=1326 audit(1689223578.891:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=575570 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619856.886854] audit: type=1326 audit(1689223604.083:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=577025 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11619974.006322] audit: type=1326 audit(1689223721.203:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=579928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620035.655078] audit: type=1326 audit(1689223782.851:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=581361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620114.896040] audit: type=1326 audit(1689223862.090:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=547279 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620115.147632] audit: type=1326 audit(1689223862.342:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=585834 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620215.428928] exe[578382] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.470748] exe[578378] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620215.508820] exe[545514] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5627b48ee839 cs:33 sp:7ecd8e0eb858 ax:0 si:5627b4947062 di:ffffffffff600000 [11620227.851853] audit: type=1326 audit(1689223975.046:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=588747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620256.627986] audit: type=1326 audit(1689224003.822:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=591341 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620370.738511] audit: type=1326 audit(1689224117.934:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=595623 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620399.160346] audit: type=1326 audit(1689224146.354:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=596641 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620513.054444] audit: type=1326 audit(1689224260.250:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=599303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620514.934894] audit: type=1326 audit(1689224262.130:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=600527 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620580.941265] audit: type=1326 audit(1689224328.134:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=557075 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620643.919662] audit: type=1326 audit(1689224391.114:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602747 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620654.467678] audit: type=1326 audit(1689224401.662:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=602612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620678.185533] audit: type=1326 audit(1689224425.382:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512100 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620753.378385] audit: type=1326 audit(1689224500.574:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606613 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620775.839985] audit: type=1326 audit(1689224523.034:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610097 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620787.380160] audit: type=1326 audit(1689224534.574:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=606348 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620878.192117] audit: type=1326 audit(1689224625.385:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=593770 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11620910.511245] audit: type=1326 audit(1689224657.705:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=610376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620929.852560] audit: type=1326 audit(1689224677.045:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=611154 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620952.654833] audit: type=1326 audit(1689224699.849:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=615888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11620975.728228] exe[616067] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.809466] exe[616334] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11620975.900989] exe[616113] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5568d6168839 cs:33 sp:7efec8140858 ax:0 si:5568d61c1070 di:ffffffffff600000 [11621052.917706] audit: type=1326 audit(1689224800.113:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614987 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621080.863296] audit: type=1326 audit(1689224828.057:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=566561 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621086.905149] audit: type=1326 audit(1689224834.097:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=616503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621093.759891] audit: type=1326 audit(1689224840.953:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=604697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621116.237723] audit: type=1326 audit(1689224863.429:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620684 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621196.426285] audit: type=1326 audit(1689224943.621:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=619071 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621228.541993] audit: type=1326 audit(1689224975.737:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621254.426277] audit: type=1326 audit(1689225001.621:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=625916 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621296.541965] audit: type=1326 audit(1689225043.737:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=512347 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621338.665441] audit: type=1326 audit(1689225085.857:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=624649 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621388.698603] audit: type=1326 audit(1689225135.893:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=626245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621531.083825] audit: type=1326 audit(1689225278.277:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=631487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621601.363569] audit: type=1326 audit(1689225348.560:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=629565 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621641.234574] audit: type=1326 audit(1689225388.432:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=635600 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621743.423222] audit: type=1326 audit(1689225490.620:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=637147 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621783.864792] audit: type=1326 audit(1689225531.060:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=638357 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621809.898362] audit: type=1326 audit(1689225557.092:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652187 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race-cover/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11621826.174675] audit: type=1326 audit(1689225573.372:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=620203 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621885.405910] audit: type=1326 audit(1689225632.600:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=645644 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621926.533008] audit: type=1326 audit(1689225673.728:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=652011 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11621949.459338] audit: type=1326 audit(1689225696.656:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662571 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11621949.730129] audit: type=1326 audit(1689225696.924:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662605 comm="exe" exe="/syzkaller/managers/ci-gvisor-systrap-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11622002.580862] audit: type=1326 audit(1689225749.776:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=614578 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622027.131721] audit: type=1326 audit(1689225774.328:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=655663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622069.015849] audit: type=1326 audit(1689225816.212:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=662354 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622089.768391] audit: type=1326 audit(1689225836.964:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=653611 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622168.625168] audit: type=1326 audit(1689225915.820:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=670119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622169.672061] audit: type=1326 audit(1689225916.868:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=676306 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622191.522526] audit: type=1326 audit(1689225938.716:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682767 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622312.206917] audit: type=1326 audit(1689226059.399:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=682951 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622325.849714] audit: type=1326 audit(1689226073.043:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=683978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622348.404390] audit: type=1326 audit(1689226095.599:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=701496 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622362.583610] audit: type=1326 audit(1689226109.779:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=704093 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622455.088113] audit: type=1326 audit(1689226202.283:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=700283 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622466.935089] audit: type=1326 audit(1689226214.127:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=705187 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622477.541452] audit: type=1326 audit(1689226224.735:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710134 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622557.455601] audit: type=1326 audit(1689226304.651:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=607978 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622607.655309] audit: type=1326 audit(1689226354.851:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=717863 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622608.716470] audit: type=1326 audit(1689226355.911:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=710766 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622691.701380] audit: type=1326 audit(1689226438.895:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=621731 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622713.800154] audit: type=1326 audit(1689226460.995:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=677619 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622751.328494] audit: type=1326 audit(1689226498.523:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=718888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622762.643571] audit: type=1326 audit(1689226509.839:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=727402 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622857.536823] audit: type=1326 audit(1689226604.731:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=724188 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622886.710765] audit: type=1326 audit(1689226633.903:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=669577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622895.764400] audit: type=1326 audit(1689226642.959:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=727948 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622897.145368] audit: type=1326 audit(1689226644.339:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=728115 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622929.466357] audit: type=1326 audit(1689226676.659:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=735287 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11622956.410483] audit: type=1326 audit(1689226703.603:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=722520 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11622978.960508] audit: type=1326 audit(1689226726.155:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=738227 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623001.003074] audit: type=1326 audit(1689226748.195:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=732248 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623039.810310] audit: type=1326 audit(1689226787.002:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=734521 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623143.007157] audit: type=1326 audit(1689226890.198:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=739865 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623181.887500] audit: type=1326 audit(1689226929.078:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=741553 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623285.059938] audit: type=1326 audit(1689227032.254:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=745101 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623305.303399] audit: type=1326 audit(1689227052.494:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=736691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11623325.244781] audit: type=1326 audit(1689227072.438:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=747270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623428.088017] audit: type=1326 audit(1689227175.282:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=752283 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623463.547698] audit: type=1326 audit(1689227210.738:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754498 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623474.427571] audit: type=1326 audit(1689227221.618:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=738468 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623495.937493] audit: type=1326 audit(1689227243.130:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=761376 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623568.906516] audit: type=1326 audit(1689227316.098:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=758566 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623595.832182] exe[730275] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623595.961141] exe[644712] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623596.000996] exe[652865] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623596.743131] exe[637295] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55c07ac44b31 cs:33 sp:ffffffffff600000 ax:0 si:ffffffffff600000 di:85000 [11623604.447949] audit: type=1326 audit(1689227351.638:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=760384 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623658.555316] audit: type=1326 audit(1689227405.746:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=560888 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11623710.394610] audit: type=1326 audit(1689227457.586:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=764275 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623726.609203] audit: type=1326 audit(1689227473.801:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=766143 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623747.678166] audit: type=1326 audit(1689227494.869:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=770150 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623851.594772] audit: type=1326 audit(1689227598.785:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=769254 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623880.762779] audit: type=1326 audit(1689227627.953:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=770395 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11623966.702688] audit: type=1326 audit(1689227713.893:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=772847 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624021.714876] audit: type=1326 audit(1689227768.905:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=773928 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624107.271418] audit: type=1326 audit(1689227854.461:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=776320 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624163.256303] audit: type=1326 audit(1689227910.445:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=778098 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624190.491756] audit: type=1326 audit(1689227937.681:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624190.516497] audit: type=1326 audit(1689227937.681:1070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=780487 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624304.302834] audit: type=1326 audit(1689228051.493:1071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=781625 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624308.164373] audit: type=1326 audit(1689228055.353:1072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=754509 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11624331.516421] audit: type=1326 audit(1689228078.705:1073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=782698 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624445.669622] audit: type=1326 audit(1689228192.861:1074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=785440 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624473.221794] audit: type=1326 audit(1689228220.412:1075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624555.592591] exe[793350] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104af6ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.750660] exe[793763] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104af6ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.917923] exe[794368] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.959425] exe[792613] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624555.991400] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.018684] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.046809] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.077658] exe[792445] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.109453] exe[794436] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624556.141961] exe[792456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55bd13d9e839 cs:33 sp:7f2104a93ee8 ax:0 si:200036c0 di:ffffffffff600000 [11624587.760151] audit: type=1326 audit(1689228334.952:1076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=791612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624614.813722] audit: type=1326 audit(1689228362.008:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=792821 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624618.861142] warn_bad_vsyscall: 25 callbacks suppressed [11624618.861146] exe[794214] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951732ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624618.991086] exe[784251] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.109805] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.131399] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.152622] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.173362] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.193902] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.214545] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.235685] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624619.256595] exe[758504] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:559a8656640a cs:33 sp:7f5951711ee8 ax:12 si:ffffffffff600000 di:559a865d2ff2 [11624732.224293] audit: type=1326 audit(1689228479.416:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=794869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624753.931616] audit: type=1326 audit(1689228501.124:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798425 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624758.040439] audit: type=1326 audit(1689228505.232:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=795639 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624767.348557] audit: type=1326 audit(1689228514.540:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798670 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11624833.344804] warn_bad_vsyscall: 25 callbacks suppressed [11624833.344807] exe[800273] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.429199] exe[800476] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.462524] exe[800159] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7922858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.541509] exe[800004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7943858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624833.578722] exe[800004] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55e926cfc839 cs:33 sp:7f78a7922858 ax:0 si:55e926d55070 di:ffffffffff600000 [11624899.299493] audit: type=1326 audit(1689228646.492:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=798894 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625016.749456] audit: type=1326 audit(1689228763.944:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=801453 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625040.759280] audit: type=1326 audit(1689228787.952:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802295 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625158.624329] audit: type=1326 audit(1689228905.816:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=806217 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625180.785519] audit: type=1326 audit(1689228927.975:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810169 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625183.324190] audit: type=1326 audit(1689228930.515:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=807481 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625274.601942] audit: type=1326 audit(1689229021.795:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625274.626774] audit: type=1326 audit(1689229021.795:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810996 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625314.783822] audit: type=1326 audit(1689229061.975:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=810362 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625416.747406] audit: type=1326 audit(1689229163.939:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=814251 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625456.396419] audit: type=1326 audit(1689229203.587:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=815492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625478.400977] audit: type=1326 audit(1689229225.591:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=819367 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625559.615083] audit: type=1326 audit(1689229306.807:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=818268 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625581.523653] audit: type=1326 audit(1689229328.715:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824092 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625595.643023] audit: type=1326 audit(1689229342.835:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=824605 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625608.211350] audit: type=1326 audit(1689229355.403:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825162 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625619.033525] audit: type=1326 audit(1689229366.223:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825508 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625632.774332] audit: type=1326 audit(1689229379.967:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=826762 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625647.248629] audit: type=1326 audit(1689229394.439:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=827431 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625647.274488] audit: type=1326 audit(1689229394.439:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=827431 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625691.645735] exe[759702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd892ee8 ax:0 si:20000140 di:ffffffffff600000 [11625691.722394] exe[759702] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd892ee8 ax:0 si:20000140 di:ffffffffff600000 [11625691.788927] exe[759679] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557a9e17d839 cs:33 sp:7f1fbd871ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.603423] exe[805730] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.659667] exe[777097] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.711809] exe[759699] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.768562] exe[762237] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625693.823356] exe[760291] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5557d2f3f839 cs:33 sp:7f3992dc3ee8 ax:0 si:20000140 di:ffffffffff600000 [11625725.681681] exe[830444] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485284ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.785481] exe[831134] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485263ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.787596] exe[831141] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485242ee8 ax:0 si:20002140 di:ffffffffff600000 [11625725.901955] exe[830351] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:5603ec851839 cs:33 sp:7fb485242ee8 ax:0 si:20002140 di:ffffffffff600000 [11625728.991542] audit: type=1326 audit(1689229476.183:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=825245 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625749.908122] audit: type=1326 audit(1689229497.099:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=831791 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625780.587397] audit: type=1326 audit(1689229527.779:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=828014 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625923.389938] audit: type=1326 audit(1689229670.578:1105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=835161 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11625999.663124] audit: type=1326 audit(1689229746.854:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=842077 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626029.740163] audit: type=1326 audit(1689229776.930:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=768381 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626030.055739] audit: type=1326 audit(1689229777.246:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=762300 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626053.289519] audit: type=1326 audit(1689229800.478:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=856967 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626060.094477] audit: type=1326 audit(1689229807.286:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=734646 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626065.611638] audit: type=1326 audit(1689229812.802:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=844994 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626115.632108] audit: type=1326 audit(1689229862.822:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=853899 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626207.428319] audit: type=1326 audit(1689229954.618:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=859579 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626229.347667] audit: type=1326 audit(1689229976.538:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=869176 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626257.801803] audit: type=1326 audit(1689230004.990:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=864812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626281.709351] audit: type=1326 audit(1689230028.898:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=786513 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626362.915375] audit: type=1326 audit(1689230110.106:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=869647 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626384.676313] audit: type=1326 audit(1689230131.866:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=879535 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626400.465790] audit: type=1326 audit(1689230147.654:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=871948 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626431.889582] exe[824456] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5ab9858 ax:0 si:557385f24062 di:ffffffffff600000 [11626431.977003] exe[822566] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5a98858 ax:0 si:557385f24062 di:ffffffffff600000 [11626432.752727] exe[868912] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:557385ecb839 cs:33 sp:7fbbb5a98858 ax:0 si:557385f24062 di:ffffffffff600000 [11626449.844604] audit: type=1326 audit(1689230197.034:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=859247 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626467.900586] audit: type=1326 audit(1689230215.090:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=858178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626471.085337] audit: type=1326 audit(1689230218.274:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=884835 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626518.208159] audit: type=1326 audit(1689230265.398:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=880419 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626541.520466] audit: type=1326 audit(1689230288.710:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=882137 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626621.306742] audit: type=1326 audit(1689230368.493:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=802627 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626661.669412] audit: type=1326 audit(1689230408.857:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=889407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626682.654851] audit: type=1326 audit(1689230429.841:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=857778 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626683.322679] audit: type=1326 audit(1689230430.509:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=891507 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626685.102443] exe[763210] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092f0858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626685.897261] exe[760292] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092cf858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626685.947864] exe[759743] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55fc0745a839 cs:33 sp:7fc5092cf858 ax:0 si:55fc074b3097 di:ffffffffff600000 [11626802.478088] audit: type=1326 audit(1689230549.665:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=898944 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626802.608213] audit: type=1326 audit(1689230549.797:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=897429 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626870.811131] audit: type=1326 audit(1689230617.997:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=887503 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11626884.103833] audit: type=1326 audit(1689230631.293:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=895716 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626944.498138] audit: type=1326 audit(1689230691.685:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=906454 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626945.317806] audit: type=1326 audit(1689230692.505:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=906607 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11626967.298336] audit: type=1326 audit(1689230714.485:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913573 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627084.586021] audit: type=1326 audit(1689230831.773:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=885479 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627085.711150] audit: type=1326 audit(1689230832.897:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=913506 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627216.037403] audit: type=1326 audit(1689230963.225:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=918841 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627226.699396] audit: type=1326 audit(1689230973.885:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919683 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627292.565800] audit: type=1326 audit(1689231039.753:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=926237 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627306.809578] audit: type=1326 audit(1689231053.997:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=898956 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627326.411262] audit: type=1326 audit(1689231073.597:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=927027 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627329.171050] audit: type=1326 audit(1689231076.357:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=929663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627343.697582] audit: type=1326 audit(1689231090.884:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=929991 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627347.341765] audit: type=1326 audit(1689231094.528:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=919635 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627387.724194] audit: type=1326 audit(1689231134.916:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=911230 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627460.083551] audit: type=1326 audit(1689231207.272:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=930161 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627471.117425] audit: type=1326 audit(1689231218.308:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=928833 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627602.515828] audit: type=1326 audit(1689231349.708:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=935893 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627612.770608] audit: type=1326 audit(1689231359.960:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=936377 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627702.324683] audit: type=1326 audit(1689231449.516:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=876414 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627718.852703] audit: type=1326 audit(1689231466.044:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931270 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627744.507821] audit: type=1326 audit(1689231491.696:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=939972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627747.677132] audit: type=1326 audit(1689231494.868:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=940246 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627883.851097] audit: type=1326 audit(1689231631.040:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=947704 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11627889.977150] audit: type=1326 audit(1689231637.168:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=948272 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628024.911620] audit: type=1326 audit(1689231772.100:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=952771 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628031.160290] audit: type=1326 audit(1689231778.352:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=953010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628040.642956] audit: type=1326 audit(1689231787.832:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=875034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11628046.113827] audit: type=1326 audit(1689231793.304:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958380 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628172.389002] audit: type=1326 audit(1689231919.579:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958541 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628179.234029] audit: type=1326 audit(1689231926.423:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=958842 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628314.064309] audit: type=1326 audit(1689232061.251:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=962918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628322.164937] audit: type=1326 audit(1689232069.355:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=963597 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628455.457515] audit: type=1326 audit(1689232202.647:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968091 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628464.666558] audit: type=1326 audit(1689232211.855:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=946366 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628465.406719] audit: type=1326 audit(1689232212.595:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=968407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628570.305980] audit: type=1326 audit(1689232317.495:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=931969 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628597.543731] audit: type=1326 audit(1689232344.731:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973452 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628607.168180] audit: type=1326 audit(1689232354.355:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973826 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628620.077308] audit: type=1326 audit(1689232367.267:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978694 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628686.349336] audit: type=1326 audit(1689232433.539:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=945407 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628716.179608] audit: type=1326 audit(1689232463.367:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=978986 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628753.935398] audit: type=1326 audit(1689232501.123:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=979334 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628770.433520] audit: type=1326 audit(1689232517.623:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=933516 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628827.383465] exe[951513] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bfe7cee8 ax:0 si:2001a180 di:ffffffffff600000 [11628830.369955] exe[947115] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bfe3aee8 ax:0 si:2001a180 di:ffffffffff600000 [11628830.550136] exe[929130] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55b75558c839 cs:33 sp:7eb6bf9feee8 ax:0 si:2001a180 di:ffffffffff600000 [11628832.839056] exe[953074] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628832.962027] exe[916409] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628833.786893] exe[955401] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:55d4422bb40a cs:33 sp:7f991b73fee8 ax:12 si:ffffffffff600000 di:55d442327ff2 [11628842.002990] audit: type=1326 audit(1689232589.190:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=984756 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628857.897703] audit: type=1326 audit(1689232605.086:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=982954 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11628984.531869] audit: type=1326 audit(1689232731.718:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=988722 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629025.421318] audit: type=1326 audit(1689232772.606:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=989495 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629126.804451] audit: type=1326 audit(1689232873.990:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=992416 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629148.856386] audit: type=1326 audit(1689232896.042:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=996756 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629167.381892] audit: type=1326 audit(1689232914.570:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=993836 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629194.884387] audit: type=1326 audit(1689232942.070:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=977629 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629208.030223] audit: type=1326 audit(1689232955.218:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=973790 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629230.447902] audit: type=1326 audit(1689232977.634:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=4116 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629283.572378] audit: type=1326 audit(1689233030.758:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=998418 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629309.223026] audit: type=1326 audit(1689233056.410:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=1131 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629402.127757] exe[15167] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629402.925691] exe[15173] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629403.044266] exe[13690] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:56552e3c6839 cs:33 sp:7f930ad20858 ax:0 si:56552e41f070 di:ffffffffff600000 [11629412.163848] audit: type=1326 audit(1689233159.350:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18136 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629425.210591] audit: type=1326 audit(1689233172.398:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10800 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629451.501171] audit: type=1326 audit(1689233198.686:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12290 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629473.439893] audit: type=1326 audit(1689233220.626:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=23052 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629546.455933] audit: type=1326 audit(1689233293.641:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19086 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629606.448034] audit: type=1326 audit(1689233353.633:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=24065 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629607.009921] audit: type=1326 audit(1689233354.197:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=5631 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629609.955561] audit: type=1326 audit(1689233357.141:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=981256 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629627.321516] audit: type=1326 audit(1689233374.505:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36433 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629707.742545] audit: type=1326 audit(1689233454.929:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=33526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629850.465525] audit: type=1326 audit(1689233597.649:1198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=45171 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11629868.399707] audit: type=1326 audit(1689233615.585:1199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=44717 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11629872.952680] audit: type=1326 audit(1689233620.137:1200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=52721 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630030.618773] audit: type=1326 audit(1689233777.805:1201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=54149 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630045.395436] audit: type=1326 audit(1689233792.581:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=911851 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630106.444998] audit: type=1326 audit(1689233853.629:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=58555 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630109.684123] audit: type=1326 audit(1689233856.869:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36525 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630122.415862] audit: type=1326 audit(1689233869.601:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=59663 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630133.035799] audit: type=1326 audit(1689233880.221:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65386 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630145.615898] audit: type=1326 audit(1689233892.801:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65800 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630159.315944] audit: type=1326 audit(1689233906.501:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=960226 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630160.574939] audit: type=1326 audit(1689233907.761:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630178.188428] audit: type=1326 audit(1689233925.373:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2937 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630208.508185] audit: type=1326 audit(1689233955.693:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=63231 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630268.539316] audit: type=1326 audit(1689234015.728:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=66010 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630294.692266] audit: type=1326 audit(1689234041.880:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=67332 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630400.813582] audit: type=1326 audit(1689234148.000:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=73111 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630430.900562] audit: type=1326 audit(1689234178.088:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=72864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630432.555274] audit: type=1326 audit(1689234179.744:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=65961 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630472.924734] audit: type=1326 audit(1689234220.112:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=36697 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630543.165758] audit: type=1326 audit(1689234290.352:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=77048 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630592.902117] audit: type=1326 audit(1689234340.088:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=79980 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630612.779733] audit: type=1326 audit(1689234359.968:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=71421 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630671.563741] exe[933990] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.656538] exe[935243] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e8f2858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.657094] exe[934183] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.775717] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.796107] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.817615] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.838102] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.858928] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.879745] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630671.900515] exe[934069] vsyscall read attempt denied -- look up the vsyscall kernel parameter if you need a workaround ip:562066a44839 cs:33 sp:7f713e913858 ax:0 si:562066a9d062 di:ffffffffff600000 [11630686.088924] audit: type=1326 audit(1689234433.276:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=84298 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630754.429805] audit: type=1326 audit(1689234501.616:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=87437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630797.015329] audit: type=1326 audit(1689234544.204:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94361 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630803.172429] audit: type=1326 audit(1689234550.360:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68809 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630803.316628] audit: type=1326 audit(1689234550.504:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=68744 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630826.140992] audit: type=1326 audit(1689234573.328:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95385 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630828.789712] audit: type=1326 audit(1689234575.976:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=90871 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630931.941194] audit: type=1326 audit(1689234679.128:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=94864 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11630960.968341] audit: type=1326 audit(1689234708.155:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=95691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630971.081558] audit: type=1326 audit(1689234718.267:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=96327 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11630993.604507] audit: type=1326 audit(1689234740.791:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100210 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631095.668165] audit: type=1326 audit(1689234842.855:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=99577 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631128.093354] audit: type=1326 audit(1689234875.279:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=100868 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631257.642898] audit: type=1326 audit(1689235004.827:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=105488 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631270.385609] audit: type=1326 audit(1689235017.571:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=106057 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631419.419518] audit: type=1326 audit(1689235166.607:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=111526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631582.300448] audit: type=1326 audit(1689235329.487:1237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=121859 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631624.654817] audit: type=1326 audit(1689235371.839:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125492 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631699.023697] audit: type=1326 audit(1689235446.210:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=81303 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11631736.259800] audit: type=1326 audit(1689235483.442:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=125186 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11631759.179290] audit: type=1326 audit(1689235506.362:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=126745 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631800.686165] audit: type=1326 audit(1689235547.870:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=130695 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631856.695284] audit: type=1326 audit(1689235603.878:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=88236 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631900.127702] audit: type=1326 audit(1689235647.310:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=134034 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631916.772415] audit: type=1326 audit(1689235663.954:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=131196 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11631942.479555] audit: type=1326 audit(1689235689.662:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=138955 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632080.328408] audit: type=1326 audit(1689235827.514:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=139436 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632164.881969] audit: type=1326 audit(1689235912.066:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=126954 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632208.737639] audit: type=1326 audit(1689235955.922:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=151918 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632215.574738] audit: type=1326 audit(1689235962.758:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=152768 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632242.906806] audit: type=1326 audit(1689235990.090:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=148869 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632259.274629] audit: type=1326 audit(1689236006.458:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=129914 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632286.126517] audit: type=1326 audit(1689236033.310:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=157913 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632408.470177] audit: type=1326 audit(1689236155.653:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=146569 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632535.457323] audit: type=1326 audit(1689236282.641:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=160861 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632540.257343] audit: type=1326 audit(1689236287.441:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168975 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632540.286544] audit: type=1326 audit(1689236287.469:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=168972 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/latest.tmp/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11632542.632756] audit: type=1326 audit(1689236289.817:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=158102 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632697.975936] audit: type=1326 audit(1689236445.157:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=169691 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11632735.256192] audit: type=1326 audit(1689236482.437:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=154417 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632862.166502] audit: type=1326 audit(1689236609.349:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=155712 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11632869.895056] audit: type=1326 audit(1689236617.077:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=173000 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633011.322614] audit: type=1326 audit(1689236758.505:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=145378 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633014.331009] audit: type=1326 audit(1689236761.513:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159475 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633032.164525] audit: type=1326 audit(1689236779.345:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184437 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633074.646811] audit: type=1326 audit(1689236821.825:1266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=194947 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633178.382123] audit: type=1326 audit(1689236925.568:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=193526 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633210.844870] audit: type=1326 audit(1689236958.028:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=196118 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633237.472180] audit: type=1326 audit(1689236984.656:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=189795 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633320.216899] audit: type=1326 audit(1689237067.400:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=212167 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633372.631508] audit: type=1326 audit(1689237119.816:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=218119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633442.080125] audit: type=1326 audit(1689237189.264:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=224638 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633451.953592] audit: type=1326 audit(1689237199.140:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=191551 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633534.694699] audit: type=1326 audit(1689237281.880:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=227751 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633583.260228] audit: type=1326 audit(1689237330.444:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=229288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633605.153463] audit: type=1326 audit(1689237352.336:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=238358 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633618.327114] audit: type=1326 audit(1689237365.512:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=176708 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633674.629388] audit: type=1326 audit(1689237421.812:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=159190 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11633695.748765] audit: type=1326 audit(1689237442.932:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=237130 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633775.199511] audit: type=1326 audit(1689237522.384:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=184119 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11633856.443829] audit: type=1326 audit(1689237603.627:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248399 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633857.100887] audit: type=1326 audit(1689237604.283:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=248583 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11633879.369215] audit: type=1326 audit(1689237626.551:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=262612 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11633894.013646] audit: type=1326 audit(1689237641.195:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=273812 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x278fc0b code=0x80000000 [11634019.963746] audit: type=1326 audit(1689237767.147:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=275224 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11634029.100027] host.test[300842] bad frame in rt_sigreturn frame:000000009bf7b9ad ip:ffffffffffffd8ef sp:ffffffffffffd8ef orax:ffffffffffffffff [11634062.961914] audit: type=1326 audit(1689237810.147:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=312178 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11634077.117957] audit: type=1326 audit(1689237824.303:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=319405 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-1-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x28270cb code=0x80000000 [11634282.233788] audit: type=1326 audit(1689238029.415:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=344958 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11634293.058728] audit: type=1326 audit(1689238040.243:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=346288 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11634302.224646] audit: type=1326 audit(1689238049.407:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=347825 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2790b0b code=0x80000000 [11634311.707146] audit: type=1326 audit(1689238058.891:1291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349103 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-3-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000 [11634322.546546] audit: type=1326 audit(1689238069.731:1292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=349179 comm="exe" exe="/syzkaller/managers/ci-gvisor-ptrace-2-race-cover/current/image" sig=31 arch=c000003e syscall=204 compat=0 ip=0x2827e0b code=0x80000000